default search action
47th DSN 2017: Denver, CO, USA
- 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017, Denver, CO, USA, June 26-29, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-0542-4
Best Paper Award Nominees
- Jingwei Li, Chuan Qin, Patrick P. C. Lee, Xiaosong Zhang:
Information Leakage in Encrypted Deduplication via Frequency Analysis. 1-12 - Jingyao Fan, Qinghua Li, Guohong Cao:
Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense. 13-24 - Guosai Wang, Lifei Zhang, Wei Xu:
What Can We Learn from Four Years of Data Center Hardware Failures? 25-36
Algorithms and Agreement
- Paulo R. Coelho, Nicolas Schiper, Fernando Pedone:
Fast Atomic Multicast. 37-48 - Balaji Arun, Sebastiano Peluso, Roberto Palmieri, Giuliano Losa, Binoy Ravindran:
Speeding up Consensus by Chasing Fast Decisions. 49-60 - Sisi Duan, Michael K. Reiter, Haibin Zhang:
Secure Causal Atomic Broadcast, Revisited. 61-72
Hardware
- Meng Wang, Huixiang Chen, Tao Li:
Reducing the "Tax" of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile Devices. 73-84 - Amin Jadidi, Mohammad Arjomand, Mohammad Khavari Tavana, David R. Kaeli, Mahmut T. Kandemir, Chita R. Das:
Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in PCM Memories. 85-96 - Behrooz Sangchoolie, Karthik Pattabiraman, Johan Karlsson:
One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip Errors. 97-108
Symbolic Execution and Synthesis Tools
- Fan Yao, Yongbo Li, Yurong Chen, Hongfa Xue, Tian Lan, Guru Venkataramani:
StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution. 109-120 - Ilya Tuzov, David de Andrés, Juan Carlos Ruiz:
Dependability-Aware Design Space Exploration for Optimal Synthesis Parameters Tuning. 121-132 - Qixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao, Shize Guo, Yuanchun Shi:
pbSE: Phase-Based Symbolic Execution. 133-144
Trusted Execution
- Chen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang, Zhen Xu:
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone. 145-156 - Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza:
Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory. 157-168 - Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste:
Secure Tera-scale Data Crunching with a Small TCB. 169-180
Binaries
- Hui Xu, Yangfan Zhou, Yu Kang, Michael R. Lyu:
Concolic Execution on Small-Size Binaries: Challenges and Empirical Study. 181-188 - Benjamin Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz:
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables. 189-200 - Rui Qiao, R. Sekar:
Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries. 201-212
Cloud
- Bernardo Ferreira, João Leitão, Henrique João L. Domingos:
Multimodal Indexable Encryption for Mobile Cloud-Based Applications. 213-224 - Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, Jinming Li:
Secure Live Migration of SGX Enclaves on Untrusted Cloud. 225-236 - Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang:
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. 237-248
Anomaly Detection
- Seunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran:
Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks. 249-260 - Cheng Feng, Tingting Li, Deeph Chana:
Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks. 261-272 - Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong:
Random Walk Based Fake Account Detection in Online Social Networks. 273-284
Wireless and Sensors
- Zhili Chen, Lin Chen, Hong Zhong:
Towards Secure and Verifiable Database-Driven Spectrum Sharing. 285-296 - Wei-Han Lee, Ruby B. Lee:
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning. 297-308 - Wei-Han Lee, Ruby B. Lee:
Sensor-Based Implicit Authentication of Smartphone Users. 309-320 - Varun Badrinath Krishna, Michael J. Rausch, Benjamin E. Ujcich, Indranil Gupta, William H. Sanders:
REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks. 321-332
Dependable Systems and Software
- Rainer Schiekofer, Johannes Behl, Tobias Distler:
Agora: A Dependable High-Performance Coordination Service for Multi-cores. 333-344 - Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan:
Load-Optimal Local Fast Rerouting for Resilient Networks. 345-356 - Julia Lawall, Gilles Muller:
JMake: Dependable Compilation for Kernel Janitors. 357-366
Measurement Studies
- Amit Klein, Haya Schulmann, Michael Waidner:
Counting in the Dark: DNS Caches Discovery and Enumeration in the Internet. 367-378 - Marcello Cinque, Raffaele Della Corte, Antonio Pecchia:
Entropy-Based Security Analytics: Measurements from a Critical Information System. 379-390 - Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci:
Exploring the Long Tail of (Malicious) Software Downloads. 391-402
Android
- Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, Michael Grace:
Ghost Installer in the Shadow: Security Analysis of App Installation on Android. 403-414 - Zhengyang Qu, Shahid Alam, Yan Chen, Xiaoyong Zhou, Wangjun Hong, Ryan D. Riley:
DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android Applications. 415-426 - Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. 427-438
Privacy and Security
- Rachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, Mahammad Valiyev, Jingjing Wang:
I Know Nothing about You But Here is What You Might Like. 439-450 - Ping Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu:
What You See is Not What You Get! Thwarting Just-in-Time ROP with Chameleon. 451-462 - Birhanu Eshete, V. N. Venkatakrishnan:
DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware Detection. 463-474
Analytic Models
- Carina Pilch, Anne Remke:
Statistical Model Checking for Hybrid Petri Nets with Multiple General Transitions. 475-486 - Laurent Chuat, Adrian Perrig, Yih-Chun Hu:
Deadline-Aware Multipath Communication: An Optimization Problem. 487-498 - Daniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, Ming Li:
Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated Vehicles. 499-510
Power System and Smart Grid
- Yan Liu, Yue Wu, Zbigniew Kalbarczyk:
Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System. 511-518 - Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi:
RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters. 519-530 - Devendra Shelar, Pengfei Sun, Saurabh Amin, Saman A. Zonouz:
Compromising Security of Economic Dispatch in Power System Operations. 531-542
Tool/Demo Security and Testing Tools
- Oleksii Oleksenko, Dmitrii Kuvaiskii, Pramod Bhatotia, Christof Fetzer:
Fex: A Software Systems Evaluator. 543-550 - Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia:
Demonstrating a Tool for Injection Attack Prevention in MySQL. 551-558 - William H. Hawkins, Jason D. Hiser, Michele Co, Anh Nguyen-Tuong, Jack W. Davidson:
Zipr: Efficient Static Binary Rewriting for Security. 559-566
Attacks
- Benjamin E. Ujcich, Uttam Thakore, William H. Sanders:
ATTAIN: An Attack Injection Framework for Software-Defined Networking. 567-578 - Christopher Natoli, Vincent Gramoli:
The Balance Attack or Why Forkable Blockchains are Ill-Suited for Consortium. 579-590 - Yuan Yao, Bin Xiao, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou:
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs. 591-602
Protocol and Behavioral Analysis
- Guido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie:
Analysing Selfishness Flooding with SEINE. 603-614 - Daiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou:
Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. 615-626 - Md. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li:
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. 627-638
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.