Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DSN
DSN 2023
Generate Citations
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
June 27 2023 to June 30 2023
Porto, Portugal
ISBN: 979-8-3503-4793-7
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 1-1
Copyright Page
Freely available from IEEE.
pp. 1-1
Table of Contents
Freely available from IEEE.
pp. v-xii
Welcome Message from the DSN 2023 General Chairs
Freely available from IEEE.
pp. xiii-xiv
Message from the DSN 2023 Program Chairs
Freely available from IEEE.
pp. xv-xvi
by
Onur Mutlu
,
Xavier Defago
DSN 2023 Organizing Committee
Freely available from IEEE.
pp. xvii-xviii
DSN 2023 Steering Committee
Freely available from IEEE.
pp. xix-xix
DSN 2023 Research Track Program Committee
Freely available from IEEE.
pp. xx-xxii
William C. Carter Award
Freely available from IEEE.
pp. xxiii-xxiv
Rising Star in Dependability Award
Freely available from IEEE.
pp. xxv-xxvi
Test of Time Award
Freely available from IEEE.
pp. xxvii-xxvii
Jean-Claude Laprie Award
Freely available from IEEE.
pp. xxviii-xxix
Keynotes
Freely available from IEEE.
pp. xxx-xxxii
SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-13
by
Nur Imtiazul Haque
,
Maurice Ngouen
,
Mohammad Ashiqur Rahman
,
Selcuk Uluagac
,
Laurent Njilla
SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-27
by
Ali Fakhrzadehgan
,
Prakash Ramrakhyani
,
Moinuddin K. Qureshi
,
Mattan Erez
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-41
by
Jiadong Lou
,
Xiaohan Zhang
,
Yihe Zhang
,
Xinghua Li
,
Xu Yuan
,
Ning Zhang
Breaking Geographic Routing Among Connected Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-54
by
Zizheng Liu
,
Shaan Shekhar
,
Chunyi Peng
NPTSN: RL-Based Network Planning with Guaranteed Reliability for In-Vehicle TSSDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-66
by
Weijiang Kong
,
Majid Nabi
,
Kees Goossens
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-80
by
Aolin Ding
,
Matthew Chan
,
Amin Hass
,
Nils Ole Tippenhauer
,
Shiqing Ma
,
Saman Zonouz
Compiler-Implemented Differential Checksums: Effective Detection and Correction of Transient and Permanent Memory Errors
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-94
by
Christoph Borchert
,
Horst Schirmeier
,
Olaf Spinczyk
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-108
by
Anish Saxena
,
Gururaj Saileshwar
,
Jonas Juffinger
,
Andreas Kogler
,
Daniel Gruss
,
Moinuddin Qureshi
Don't Knock! Rowhammer at the Backdoor of DNN Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-122
by
M. Caner Tol
,
Saad Islam
,
Andrew J. Adiletta
,
Berk Sunar
,
Ziming Zhang
Micro Replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-137
by
Tobias Distler
,
Michael Eischer
,
Laura Lawniczak
Heron: Scalable State Machine Replication on Shared Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-150
by
Mojtaba Eslahi-Kelorazi
,
Long Hoang Le
,
Fernando Pedone
Analyzing the Performance of the Inter-Blockchain Communication Protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-164
by
João Otávio Chervinski
,
Diego Kreutz
,
Xiwei Xu
,
Jiangshan Yu
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-178
by
Xiaohui Chen
,
Lei Cui
,
Hui Wen
,
Zhi Li
,
Hongsong Zhu
,
Zhiyu Hao
,
Limin Sun
Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-192
by
Xingchen Chen
,
Baizhu Wang
,
Ze Jin
,
Yun Feng
,
Xianglong Li
,
Xincheng Feng
,
Qixu Liu
TagClass: A Tool for Extracting Class-Determined Tags from Massive Malware Labels via Incremental Parsing
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-200
by
Yongkang Jiang
,
Gaolei Li
,
Shenghong Li
Āpta: Fault-tolerant object-granular CXL disaggregated memory for accelerating FaaS
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-215
by
Adarsh Patil
,
Vijay Nagarajan
,
Nikos Nikoleris
,
Nicolai Oswald
HiMFP: Hierarchical Intelligent Memory Failure Prediction for Cloud Service Reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-228
by
Qiao Yu
,
Wengui Zhang
,
Paolo Notaro
,
Soroush Haeri
,
Jorge Cardoso
,
Odej Kao
SGX Switchless Calls Made Configless
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-238
by
Peterson Yuhala
,
Michael Paper
,
Timothée Zerbib
,
Pascal Felber
,
Valerio Schiavoni
,
Alain Tchana
Poisoning Online Learning Filters by Shifting on the Move
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-251
by
Wesley Joon-Wie Tann
,
Ee-Chien Chang
YODA: Covert Communication Channel over Public DNS Resolvers
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-260
by
Sandip Saha
,
Sareena Karapoola
,
Chester Rebeiro
,
Kamakoti V
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-273
by
Jaejong Baek
,
Pradeep Kumar Duraisamy Soundrapandian
,
Sukwha Kyung
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
Fabricated Flips: Poisoning Federated Learning without Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-287
by
Jiyue Huang
,
Zilong Zhao
,
Lydia Y. Chen
,
Stefanie Roos
Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-301
by
Yuchen Yang
,
Haolin Yuan
,
Bo Hui
,
Neil Gong
,
Neil Fendley
,
Philippe Burlina
,
Yinzhi Cao
ReFace: Adversarial Transformation Networks for Real-time Attacks on Face Recognition Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 302-312
by
Shehzeen Hussain
,
Todd Huster
,
Chris Mesterharm
,
Paarth Neekhara
,
Farinaz Koushanfar
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-326
by
Naiqian Zhang
,
Daroc Alden
,
Dongpeng Xu
,
Shuai Wang
,
Trent Jaeger
,
Wheeler Ruml
TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-338
by
Yan Qin
,
Weiping Wang
,
Zixian Chen
,
Hong Song
,
Shigeng Zhang
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-351
by
Kunlun Ren
,
Weizhong Qiang
,
Yueming Wu
,
Yi Zhou
,
Deqing Zou
,
Hai Jin
Detection of e-Mobility-Based Attacks on the Power Grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-365
by
Dustin Kern
,
Christoph Krauß
SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-375
by
Yingao Elaine Yao
,
Pritam Dash
,
Karthik Pattabiraman
DNAttest: Digital-twin-based Non-intrusive Attestation under Transient Uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-388
by
Wei Lin
,
Heng Chuan Tan
,
Binbin Chen
,
Fan Zhang
IRIS: a Record and Replay Framework to Enable Hardware-assisted Virtualization Fuzzing
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-401
by
Carmine Cesarano
,
Marcello Cinque
,
Domenico Cotroneo
,
Luigi De Simone
,
Giorgio Farina
Rewind & Discard: Improving Software Resilience using Isolated Domains
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-416
by
Merve Gülmez
,
Thomas Nyman
,
Christoph Baumann
,
Jan Tobias Mühlberg
Intrusion Injection for Virtualized Systems: Concepts and Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-430
by
Charles F. Gonçalves
,
Nuno Antunes
,
Marco Vieira
vWitness: Certifying Web Page Interactions with Computer Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-444
by
He Shuang
,
Lianying Zhao
,
David Lie
Adaptive Webpage Fingerprinting from TLS Traces
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-458
by
Vasilios Mavroudis
,
Jamie Hayes
IDTracker: Discovering Illicit Website Communities via Third-party Service IDs
Full-text access may be available. Sign in or learn about subscription options.
pp. 459-469
by
Chenxu Wang
,
Zhao Li
,
Jiangyi Yin
,
Zhenni Liu
,
Zhongyi Zhang
,
Qingyun Liu
Creating a Large-scale Memory Error IoT Botnet Using NS3DockerEmulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-479
by
Islam Obaidat
,
Bennett Kahn
,
Fatemeh Tavakoli
,
Meera Sridhar
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-493
by
Zhaoxin Cai
,
Yuhong Nan
,
Xueqiang Wang
,
Mengyi Long
,
Qihua Ou
,
Min Yang
,
Zibin Zheng
IoT Anomaly Detection Via Device Interaction Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-507
by
Jincheng Wang
,
Zhuohua Li
,
Mingshen Sun
,
Bin Yuan
,
John C.S. Lui
Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-521
by
Khalid Ayed Alharthi
,
Arshad Jhumka
,
Sheng Di
,
Lin Gui
,
Franck Cappello
,
Simon McIntosh-Smith
How Different are the Cloud Workloads? Characterizing Large-Scale Private and Public Cloud Workloads
Full-text access may be available. Sign in or learn about subscription options.
pp. 522-530
by
Xiaoting Qin
,
Minghua Ma
,
Yuheng Zhao
,
Jue Zhang
,
Chao Du
,
Yudong Liu
,
Anjaly Parayil
,
Chetan Bansal
,
Saravan Rajmohan
,
Íñigo Goiri
,
Eli Cortez
,
Si Qin
,
Qingwei Lin
,
Dongmei Zhang
On Adversarial Robustness of Point Cloud Semantic Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-544
by
Jiacen Xu
,
Zhe Zhou
,
Boyuan Feng
,
Yufei Ding
,
Zhou Li
Cost-Damage Analysis of Attack Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 545-558
by
Milan Lopuhaä-Zwakenberg
,
Mariëlle Stoelinga
PASTA: Pragmatic Automated System-Theoretic Process Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 559-567
by
Jette Petzold
,
Jana Kreiß
,
Reinhard von Hanxleden
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 568-581
by
Haibin Zhang
,
Sisi Duan
,
Chao Liu
,
Boxin Zhao
,
Xuanji Meng
,
Shengli Liu
,
Yong Yu
,
Fangguo Zhang
,
Liehuang Zhu
VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers
Full-text access may be available. Sign in or learn about subscription options.
pp. 582-596
by
Xuening Xu
,
Chenglong Fu
,
Xiaojiang Du
,
E. Paul Ratazzi
Speaker Orientation-Aware Privacy Control to Thwart Misactivation of Voice Assistants
Full-text access may be available. Sign in or learn about subscription options.
pp. 597-610
by
Shaohu Zhang
,
Aafaq Sabir
,
Anupam Das
Author Index
Freely available from IEEE.
pp. 611-614
Showing 62 out of 62