default search action
53rd DSN 2023: Porto, Portugal - Supplemental Volume
- 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023 - Supplemental Volume, Porto, Portugal, June 27-30, 2023. IEEE 2023, ISBN 979-8-3503-2545-4
- Alysson Neves Bessani:
Byzantine State Machine Replication in the Age of Blockchains: Fundamentals and Recent Results (Tutorial). 1 - Edoardo Giusto, Emanuele Dri, Bartolomeo Montrucchio, Betis Baheri, Qiang Guan, Devesh Tiwari, Paolo Rech:
Quantum Computing Reliability: Problems, Tools, and Potential Solutions. 2-3 - Gernot Heiser, Ivan Velickovic:
Tutorial: Using the seL4 Microkernel. 4 - Luigi Coppolino, Giovanni Mazzeo, Luigi Romano:
Awesome Trusted Execution Environment. 5-6 - Zhixian Chu, Lingqi Guo, Jingyu Wang, Qi Qi, Zirui Zhuang, Haifeng Sun, Cheng Zhou:
HIRN: A Hierarchical Intent Refinement Approach for Dependable Network Slicing with Multi-path Resource Allocation. 7-13 - Gabriel Fré, Bilghean Erman, Catello Di Martino:
Data Shower in Electronics Manufacturing: Measuring Wi-Fi 4, Wi-Fi 6, and 5G SA behavior in production assembly lines. 14-20 - Zach Miller, Olusiji Medaiyese, Madhavan Ravi, Alex Beatty, Fred Lin:
Hard Disk Drive Failure Analysis and Prediction: An Industry View. 21-27 - Jeoungwon Lee, Heekwon Park, Gunhee Choi, Bryan S. Kim, Seehwan Yoo, Jaedong Lee, Jongmoo Choi:
ACE: An Analog Cell Emulator for Dependability Study of NAND Flash Memory. 28-34 - Xiangjun Peng, Zheng Huang, Alex Cantrell, Bihua Shu, Ke Ke Xie, Yi Li, Yu Li, Li Jiang, Qiang Xu, Ming-Chang Yang:
EXPERT: EXPloiting DRAM ERror Types to Improve the Effective Forecasting Coverage in the Field. 35-41 - Alexander Will, Aidan G. Collins, Robert Grizzard, Smitha Gautham, Patrick Martin, Evan Dill, Carl R. Elks:
An Integrated Runtime Verification and Simulation Testbed for UAM Hazard Assessment. 42-48 - Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalberczyk, S. M. Suhail Hussain, Ee-Chien Chang:
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training. 49-55 - Ralf Gräfe, Syed Sha Qutub, Florian Geissler, Michael Paulitsch:
Large-Scale Application of Fault Injection into PyTorch Models -an Extension to PyTorchFI for Validation Efficiency. 56-62 - Karthik Swaminathan, Ramon Bertran, Doug Balazich, Alper Buyuktosunoglu, Arvind Haran, Sean M. Carey, Karl Anderson, Hans M. Jacobson, Matthias Pflanz, Pradip Bose:
Characterization and Exploration of Latch Checkers for Efficient RAS Protection. 63-69 - Jan Ruh, Wilfried Steiner, Gerhard Fohler:
IEEE 802.1AS Multi-Domain Aggregation for Virtualized Distributed Real-Time Systems. 70-76 - Abdullah Al-Mamun, Dongfang Zhao:
ECHAIN: Securing Electronic Device Provenance through Privacy-Preserving Consortium Blockchains. 77-83 - Marco Barletta, Marcello Cinque, Luigi De Simone, Raffaele Della Corte, Giorgio Farina, Daniele Ottaviano:
Partitioned Containers: Towards Safe Clouds for Industrial Applications. 84-88 - Xuhua Ding:
How to Resuscitate a Sick VM in the Cloud. 89-93 - Jayashree Srinivasan, Sai Ritvik Tanksalkar, Paschal C. Amusuo, James C. Davis, Aravind Machiry:
Towards Rehosting Embedded Applications as Linux Applications. 94-99 - Alain Tchana, Raphaël Colin, Adrien Le Berre, Vincent Berger, Benoît Combemale, Ludovic Pailler:
rgpdOS: GDPR Enforcement By The Operating System. 100-104 - Iliès Benhabbour, Yérom-David Bromberg, Marc Dacier, Sven Dietrich, Rodrigo Seromenho Miragaia Rodrigues, Paulo Esteves Veríssimo:
Attacks on tomorrow's virtual world. 105-110 - Tadeu Freitas, João Soares, Manuel Eduardo Correia, Rolando Martins:
Skynet: a Cyber-Aware Intrusion Tolerant Overseer. 111-116 - Jiangshan Yu:
Fault Independence in Blockchain. 117-121 - Atul Sharma, Joshua C. Zhao, Wei Chen, Qiang Qiu, Saurabh Bagchi, Somali Chaterji:
How to Learn Collaboratively - Federated Learning to Peer-to-Peer Learning and What's at Stake. 122-126 - Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia:
Automatic Generation of Distributed Algorithms with Generative AI. 127-131 - Marta Catillo, Antonio Pecchia, Umberto Villano:
Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS? 132-136 - Wei-Yang Chiu, Weizhi Meng, Brooke Lampe:
No Free Wireless Charge: Covert Channels via Wireless Charging on Mobile Devices. 137-141 - Susmit Shannigrahi, Craig Partridge:
Big Data, Transmission Errors, and the Internet. 142-145 - Songsong Liu, Shu Wang, Kun Sun:
Enhancing Honeypot Fidelity with Real-Time User Behavior Emulation. 146-150 - Ataberk Olgun, Majd Osseiran, Abdullah Giray Yaglikçi, Yahya Can Tugrul, Haocong Luo, Steve Rhyner, Behzad Salami, Juan Gómez-Luna, Onur Mutlu:
An Experimental Analysis of RowHammer in HBM2 DRAM Chips. 151-156 - Ali Shoker, Paulo Esteves Veríssimo, Marcus Völp:
The Path to Fault- and Intrusion-Resilient Manycore Systems on a Chip. 157-162 - Bohan Zhang, Lishan Yang, Guanpeng Li, Hui Xu:
Investigating the Impact of High-Level Software Design on Low-Level Hardware Fault Resilience. 163-167 - Jose Luis de la Vara, Barbara Gallina, Antonio Fernández-Caballero, José Pascual Molina, Arturo S. García, Clara Ayora:
Assurance of Software-Intensive Medical Devices: What About Mental Harm? 168-172 - Anna Galanou:
Tailoring and Verification of the Trust Boundaries in a Heterogeneous TEE Landscape. 173-175 - Peterson Yuhala:
Enhancing IoT Security and Privacy with Trusted Execution Environments and Machine Learning. 176-178 - Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro:
Advancing Blockchain Security: from Vulnerability Detection to Transaction Revocation. 179-181 - Paulo Antunes, Ibéria Medeiros, Nuno Neves:
Towards PHP Vulnerability Detection at an Intermediate Language Level. 182-184 - Alessandro Palma, Silvia Bonomi:
A Workflow for Distributed and Resilient Attack Graph Generation. 185-187 - Horacio L. França, César Alexandre Teixeira, Nuno Laranjeiro:
Automating Vulnerability Management in the Software Development Lifecycle. 188-190 - Jessica Castro, Nuno Laranjeiro, Marco Vieira:
Techniques and Tools for Runtime Security Monitoring and Analysis of Microservices. 191-193 - João Rafael Pinto Soares, Luís Rodrigues:
Multi-Consistency Transactional Support for Function-as-a-Service. 194-196 - Thomas Flinkow, Barak A. Pearlmutter, Rosemary Monahan:
Rich and Expressive Specification of Continuous-Learning Cyber-Physical Systems. 197-199 - Zeng Wang, Lilas Alrahis, Dominik Sisejkovic, Ozgur Sinanoglu:
AutoLock: Automatic Design of Logic Locking with Evolutionary Computation. 200-202 - Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg:
Exploring the Environmental Benefits of In-Process Isolation for Software Resilience. 203-205 - Keerthi K., Chester Rebeiro:
Secure Compiler Framework to Design Fault Attack Resistant Software. 206-208 - Pritam Dash, Karthik Pattabiraman:
Beyond Detection: Securing Robotic Vehicles. 209-210 - Alessio Colucci:
Towards Transient Fault Mitigation Techniques Optimized for Compressed Neural Networks. 211-213 - Qiang Wen, Fumio Machida:
Bayesian Network Reliability Modeling for Three-version Machine Learning Systems. 214-216 - Daniele Rizzieri, Sarah Azimi, Luca Sterpone, Corrado De Sio, Thomas Borel, Viyas Gupta, Margherita Cardi:
Programmable SEL Test Monitoring System for Radiation Hardness Assurance. 217-223 - Pegdwende Romaric Nikiema, Angeliki Kritikakou, Marcello Traiola, Olivier Sentieys:
Design with low complexity fine-grained Dual Core Lock-Step (DCLS) RISC-V processors. 224-229 - Udit Kumar Agarwal, Abraham Chan, Ali Asgari Khoshouyeh, Karthik Pattabiraman:
Towards Reliability Assessment of Systolic Arrays against Stuck-at Faults. 230-236
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.