Default Cover Image

2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

June 27 2023 to June 30 2023

Porto, Portugal

ISBN: 979-8-3503-4793-7

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 1-1
Copyright PageFreely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-xii
Welcome Message from the DSN 2023 General ChairsFreely available from IEEE.pp. xiii-xiv
Message from the DSN 2023 Program ChairsFreely available from IEEE.pp. xv-xvi
DSN 2023 Organizing CommitteeFreely available from IEEE.pp. xvii-xviii
DSN 2023 Steering CommitteeFreely available from IEEE.pp. xix-xix
DSN 2023 Research Track Program CommitteeFreely available from IEEE.pp. xx-xxii
William C. Carter AwardFreely available from IEEE.pp. xxiii-xxiv
Rising Star in Dependability AwardFreely available from IEEE.pp. xxv-xxvi
Test of Time AwardFreely available from IEEE.pp. xxvii-xxvii
Jean-Claude Laprie AwardFreely available from IEEE.pp. xxviii-xxix
KeynotesFreely available from IEEE.pp. xxx-xxxii
SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR InterfaceFull-text access may be available. Sign in or learn about subscription options.pp. 14-27
Breaking Geographic Routing Among Connected VehiclesFull-text access may be available. Sign in or learn about subscription options.pp. 42-54
NPTSN: RL-Based Network Planning with Guaranteed Reliability for In-Vehicle TSSDNFull-text access may be available. Sign in or learn about subscription options.pp. 55-66
Don't Knock! Rowhammer at the Backdoor of DNN ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 109-122
Micro ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 123-137
Heron: Scalable State Machine Replication on Shared MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 138-150
Analyzing the Performance of the Inter-Blockchain Communication ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 151-164
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware DetectorsFull-text access may be available. Sign in or learn about subscription options.pp. 165-178
Tabby: Automated Gadget Chain Detection for Java Deserialization VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 179-192
TagClass: A Tool for Extracting Class-Determined Tags from Massive Malware Labels via Incremental ParsingFull-text access may be available. Sign in or learn about subscription options.pp. 193-200
Āpta: Fault-tolerant object-granular CXL disaggregated memory for accelerating FaaSFull-text access may be available. Sign in or learn about subscription options.pp. 201-215
HiMFP: Hierarchical Intelligent Memory Failure Prediction for Cloud Service ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 216-228
SGX Switchless Calls Made ConfiglessFull-text access may be available. Sign in or learn about subscription options.pp. 229-238
Poisoning Online Learning Filters by Shifting on the MoveFull-text access may be available. Sign in or learn about subscription options.pp. 239-251
YODA: Covert Communication Channel over Public DNS ResolversFull-text access may be available. Sign in or learn about subscription options.pp. 252-260
Fabricated Flips: Poisoning Federated Learning without DataFull-text access may be available. Sign in or learn about subscription options.pp. 274-287
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 313-326
TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 327-338
JSRevealer: A Robust Malicious JavaScript Detector against ObfuscationFull-text access may be available. Sign in or learn about subscription options.pp. 339-351
Detection of e-Mobility-Based Attacks on the Power GridFull-text access may be available. Sign in or learn about subscription options.pp. 352-365
SwarmFuzz: Discovering GPS Spoofing Attacks in Drone SwarmsFull-text access may be available. Sign in or learn about subscription options.pp. 366-375
DNAttest: Digital-twin-based Non-intrusive Attestation under Transient UncertaintyFull-text access may be available. Sign in or learn about subscription options.pp. 376-388
Rewind & Discard: Improving Software Resilience using Isolated DomainsFull-text access may be available. Sign in or learn about subscription options.pp. 402-416
Intrusion Injection for Virtualized Systems: Concepts and ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 417-430
vWitness: Certifying Web Page Interactions with Computer VisionFull-text access may be available. Sign in or learn about subscription options.pp. 431-444
Adaptive Webpage Fingerprinting from TLS TracesFull-text access may be available. Sign in or learn about subscription options.pp. 445-458
IDTracker: Discovering Illicit Website Communities via Third-party Service IDsFull-text access may be available. Sign in or learn about subscription options.pp. 459-469
Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulatorFull-text access may be available. Sign in or learn about subscription options.pp. 470-479
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View DecoratorFull-text access may be available. Sign in or learn about subscription options.pp. 480-493
IoT Anomaly Detection Via Device Interaction GraphFull-text access may be available. Sign in or learn about subscription options.pp. 494-507
On Adversarial Robustness of Point Cloud Semantic SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 531-544
Cost-Damage Analysis of Attack TreesFull-text access may be available. Sign in or learn about subscription options.pp. 545-558
PASTA: Pragmatic Automated System-Theoretic Process AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 559-567
Speaker Orientation-Aware Privacy Control to Thwart Misactivation of Voice AssistantsFull-text access may be available. Sign in or learn about subscription options.pp. 597-610
Author IndexFreely available from IEEE.pp. 611-614
Showing 62 out of 62