Abstract is missing.
- Guided Importance Sampling for Safety and Reliability: A Pragmatic Comparison of Symbolic and Simulation-Based ApproachesTim Gonschorek, Frank Ortmeier. 1-11 [doi]
- Speeding Up the Development for the Computing Continuum with WebAssemblyMehmet Cihan Sakman, Josef Spillner, Valerio Schiavoni. 12-22 [doi]
- Integrating Threat Analysis and Formal Verification for Secure OTA UpdatesSheraz Mazhar, Abdur Rakib, Robin Doss, Adnan Anwar, Frank Jiang 0001. 23-33 [doi]
- GALAXY: Generalized Attention-Based LSTM Architecture with External Query for Intrusion Detection in UAV CommunicationJae Yeon Lee, Huy Kang Kim. 34-44 [doi]
- Orchestrating Fail-Safe, Black-Box Models Within Federated Learning ScenariosFahad Ahmed KhoKhar, Tommaso Zoppi, Jamal Hussain Shah. 45-57 [doi]
- Towards Secure Containerized Applications with Seccomp Profile RefinementLinh Nguyen-Thuy, Long Nguyen-Vu, Thien-Phuc Doan, Jungsoo Park, Souhwan Jung. 58-67 [doi]
- TZmediator: Secure Cooperative Execution of Cloud Applications Using POSIX APIs on Arm TrustZoneTaiyo Sato, Kenichi Kourai. 68-78 [doi]
- An Analysis of Sui's Transactions and ConflictsDvir Biton, Roy Friedman. 79-90 [doi]
- Efficient Scheduling of Smart Contract Transactions via Conflict Graph ColoringAnkit Ravish, Yaron Hay, Manaswini Piduguralla, Rishabh Jain, Roy Friedman, Sathya Peri. 91-101 [doi]
- Keyspector: Secure Monitoring of IoT Devices Using RISC-V KeystoneTakahito Iwano, Kenichi Kourai. 102-112 [doi]
- SIROCCO: A Dry Wind to Warn you from Bluetooth AttacksPaul L. R. Olivier, Florent Galtier, Guillaume Auriol, Vincent Nicomette, Romain Cayre. 113-122 [doi]
- Support System for Creating Medical Incident and Accident Reports Utilizing Two Types of Medical Accident DatabasesKoichi Bando, Kenjiro Inaba, Sachiko Honda, Tetsuro Yumoto, Atsunobu Sagara, Kenji Tanaka 0001. 123-129 [doi]
- Physics-Guided and Explainable Anomaly Detection for IEC 61850 Sampled ValuesSunoh Ryu, Ryangsoo Kim, Hark Yoo, Hyuk Lim, Seunghyun Yoon 0001. 130-131 [doi]
- CLGuard: A Context-Aware Suppression Framework for Resilient Driving ControlYeongju Seong, Hyuk Lim, Seunghyun Yoon 0001. 132-133 [doi]
- Robustness Evaluation Under RGB-Camera Attacks in CARLA: A Systematic Evaluation of Color Modes and Attack TypesYufeng Lin, Sangmin Park, Hyunjae Kang, Huy Kang Kim, Dan Dongseong Kim. 134-139 [doi]
- A Study on User Approval Criteria and User Interfaces for Dependability of AI-based Code Generation ToolsMinseo Ju, Hyung Kook Jun, Taeho Kim, Hyung-Jong Kim. 140-145 [doi]
- A Self-Synchronizing Cyber Deception Framework via Infrastructure as Code ReflectionJunyeong Park, Sayeon Kim, Woohyun Jang, Yeon-Jae Kim, Shinwoo Shim, Olmi Lee, Ki-Woong Park. 146-151 [doi]
- An Approach to Creating the Optimal Attack Path Based on Reinforcement LearningHyo Sun Lee, Min-Geun Song, Huy Kang Kim. 152-157 [doi]
- Toward Dependability Simulation for Intelligent Transportation Systems in Connected Vehicle EnvironmentsSaehoon Oh, Sangbeom Park, Gang Min Kim, Huy Kang Kim. 158-163 [doi]
- Automated Vulnerability Repair of Obfuscated and Non-Obfuscated Smart Contracts Using Large Language ModelsChihiro Kado, Tatsuhiro Tsuchiya. 164-169 [doi]
- Automated Timeline-Based Forensic Report Generation with Anomaly Detection and LLM-Based CTI MappingYongsik Kim, Saehee Jun, Junho Jang, Huy Kang Kim. 170-175 [doi]
- Dependable Code Repair with LLMs: AI-Driven Vulnerability Detection and Automated PatchingSungmin Han, Hyoungshick Kim, HoJoon Lee, Hyungon Moon, Yuseok Jeon, Ho Bae, Donghyun Yeo, Gail-Joon Ahn, Sangkyun Lee. 176-181 [doi]
- Toward an Autonomous Purple Teaming Framework for Security and Safety in Large Language ModelsLeo Hyun Park, Yoonsik Kim, Eunbi Hwang, Sangsoo Han, Hyoungshick Kim, Taekyoung Kwon 0002. 182-187 [doi]