


default search action
55th DSN 2025: Naples, Italy - Supplemental Volume
- 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2025 - Supplemental Volume, Naples, Italy, June 23-26, 2025. IEEE 2025, ISBN 979-8-3315-1203-3
- Zhihan Jiang, Rui Ren, Guangba Yu, Yulun Wu, Wenwei Gu, Yichen Li, Yujie Huang, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu:
LLMPrism: Black-box Performance Diagnosis for Production LLM Training Platforms. 1-7 - Nawel Benarba, Mathieu Chevalier, Sara Bouchenak, Benjamin Bertin, Olivier Jung:
Anomaly Detection in Energy Performance Certificates - From Oblivious to Enlightened. 8-14 - Odd Ivar Haugen, Aleks Karlsen, Steven Mearns, Jan van Tiggelen:
Beyond Component Failures: Safety Challenges in Complex Maritime Control Systems. 15-21 - Zhilong Wang, Neha Nagaraja, Lan Zhang, Hayretdin Bahsi, Pawan Patil, Peng Liu:
To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic Prompt. 22-28 - Elisa Chiapponi, Umberto Fontana, Elyssa Boulila
, Claudio Costanza, Vincent Rigal, Olivier Thonnard:
When Features Gets Exploited: Functional Abuse and the Future of Industrial Fraud Prevention. 29-35 - Majed Valad Beigi, Yi Cao, Grace Tsai, Sudhanva Gurumurthi, Vilas Sridharan:
DDR5 DRAM Faults in the Field. 36-41 - Stephan Kleber, Jeremias Eppler, Tim Palm, Dennis Eisermann, Frank Kargl:
Assessing the Transferability of Adversarial Patches in Real-World Systems: Implications for Adversarial Testing of Image Recognition Security. 42-48 - Carmine Cesarano, Alessio Foggia, Gianluca Roscigno, Luca Andreani, Roberto Natella:
Security-by-Design at the Telco Edge with OSS: Challenges and Lessons Learned. 49-55 - Larry Huynh, Jake Hesford, Daniel Cheng, Alan Wan, Seungho Kim, Hyoungshick Kim, Jin B. Hong:
Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice. 56-62 - Mario Fiorentino, Michele Caggiano, Alessandro Magliacane, Angelo Coppola, Andrea Marchetta:
Bridging the Safety Gap: A C-ITS Solution for Protecting Vulnerable Road Users. 63-69 - Andrea Bastoni, Alexander Zuepke, Marco Solieri:
Observe and Regulate Memory Interference on MPSoC: a Practical Approach. 70-76 - Wenwei Gu, Jiazhen Gu, Renyi Zhong, Wenyu Zhang, Ming Li, Michael R. Lyu:
Cordial: Cross-row Failure Prediction Method Based on Bank-level Error Locality for HBMs. 77-83 - Daeho Kim, Eun-Kyu Lee, Jiwoo Lee:
Energy-Efficient Anomaly Detection in Autonomous Vehicles Using RSNNs. 84-90 - Yilin Sun, Dian Lyu, Cheng Cui, Hui Xu:
KubeChecker: Detecting Configuration Bugs in Container Orchestration. 91-97 - Mike Da Silva, Nga Nguyen:
Quantitative Security Metrics: Assessment of Cyberattack Scenarios for Cyber-Physical Systems. 98-104 - Alfredo Petruolo, Luigi Coppolino, Roberto Nardone, Luigi Romano:
Regulating Prosumer Device Security: a Key Priority in Power Grid Protection. 105-111 - Hisham Unniyankal, Davide Ancona, Angelo Ferrando, Fabio Parodi, Alessandro Alessi, Federico Bottino:
Runtime Verification of Program Organization Units in Safe Programmable Logic Controller Systems. 112-118 - Leonardo da Costa, Witor Oliveira, Caio Peres, Rene de Mello, Jonghun Song, Seokwon Jeong, Hyungchul Jung:
On the Feasibility of Exploiting the USB Power Line for Side-Channel Attacks against Samsung Smartphone Models. 119-125 - Roberto Moratore, Eduardo Barbaro, Yury Zhauniarovich:
IAM Role Diet: A Scalable Approach to Detecting RBAC Data Inefficiencies. 126-132 - Matthieu Bettinger
, Sonia Ben Mokhtar, Anthony Simonet-Boulogne:
An Open-source Implementation and Security Analysis of Triad's TEE Trusted Time Protocol. 133-139 - Xun Jiao, Abhinav Pandey, Karthik Pattabiraman, Fan Fred Lin:
Large-Scale AI Infra Reliability: Challenges, Strategies, and Llama 3 Training Experience. 140-146 - Olusiji Medaiyese, Fred Lin, Harish Dattatraya Dixit, Richa Mishra, Andrea Baglioni, Leandro Silva, Mike Elkin, Andrei Ilyashenko, Gor Safaryan, Dhankaran Singh Ajravat, Xun Jiao, Vineet Parekh:
Hardware Telemetry at Scale: A Case Study on SSDs Endurance Monitoring in Datacenters. 147-152 - Davide Ancona, Stefano Avola, Angelo Ferrando, Pierpaolo Baglietto, Maurice H. ter Beek, Andrea Parodi, Giancarlo Camera, Matteo Pinasco:
Integrating Testing with Runtime Verification for Mission-Critical Distributed Control Systems. 153-159 - Michal Nazarewicz, Dhruv D. Jain, Miguel Matos, Blas Rodriguez:
Be My Guest: Welcoming Interoperability into IBC-Incompatible Blockchains. 160-166 - Sebastian Schroder, Yao Deng, Alice James, Avishkar Seth, Kye Morton, Subhas Mukhopadhyay, Richard Han, Xi Zheng:
Towards Robust Autonomous Landing Systems: Iterative Solutions and Key Lessons Learned. 167-173 - Pietro Liguori, Roberto Natella, Domenico Cotroneo:
Generative AI in Cybersecurity: Generating Offensive Code from Natural Language. 174-175 - Hazel Murray, George O'Mahony, Anila Mjeda:
Quantum Computing and Post-Quantum Cryptography: Preparing for the Next Era of Cybersecurity. 176-177 - Jackson Clark, Rohan R. Arora, Saurabh Jha:
Benchmarking AI Agents for IT Automation Tasks with ITBench. 178-179 - Antonella Del Pozzo, Maxence Perion:
Decentralized Federated Learning: Enhancing Reliability with Blockchain. 180-181 - Vincent Gramoli, Rachid Guerraoui, Andrei Lebedev, Gauthier Voron:
Evaluating Blockchain Fault Tolerance with Stabl. 182-183 - András Földvári, András Pataricza:
Model-based Qualitative Dependability and Security Evaluation : Half-Day Tutorial. 184-185 - Michael Kevvay, Vladislav Gryaznykh, Oleg Kirovskii, Anton Korolev:
Assessing the Validity of LLM-Driven Hazard Analysis: An Assessor's Perspective. 186-190 - Roy Shadmon, Owen Arden:
Enhancing Accuracy in Approximate Byzantine Agreement with Bayesian Inference. 191-195 - Nathanaël Denis, Roberto Di Pietro
:
Replicating Human Immune System via Harmonic Radar: A Framework and Preliminary Results in Thwarting Cyber-physical Attacks. 196-200 - Davide Rovelli, Patrick Eugster:
Digital Cluster Circuits for Reliable Datacenters. 201-205 - Yannis Formery, Léo Mendiboure, Jonathan Villain, Virginie Deniau, Christophe Gransart, Stéphane Delbruel:
Trusted Federated Learning: Towards a Partial Zero-Knowledge Proof Approach. 206-210 - Stéphane Delbruel, Léo Mendiboure, Yannis Formery, Joachim Bruneau-Queyreix, Laurent Réveillère:
UniPHY: Unified Physical Layer Security for LPWANs. 211-215 - João Imperadeiro, Ana Nunes Alonso, José Pereira:
Rethinking BFT: Leveraging Diverse Software Components with LLMs. 216-220 - Tommaso Puccetti:
Strategies to Describe and Timely Detect Attacks. 221-223 - Yuriko Ueda, Marin Wada, Miho Adachi, Ryusuke Miyamoto:
Effect of Human-Selected Hard Examples to Improve Accuracy of Semantic Segmentation. 224-226 - Paul R. B. Houssel, Sylvie Laniepce, Olivier Levillain:
Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure. 227-229 - Francesco Marchiori, Mauro Conti:
Leaving No Blind Spots: Toward Automotive Cybersecurity. 230-232 - Antonio Iannaccone, Roberto Nardone:
Enhanced Cybersecurity Monitoring in Multi-Plant Flexible Manufacturing Environments. 233-235 - Trishna Rajkumar, Johnny Öberg:
On Predictive Modeling of Multi-Bit Upsets for Emulated Fault Injection. 236-238 - Qingyang Zhang, Fumio Machida:
AI Agent-based Adaptive Task Offloading for Autonomous Drones in Dynamic Environments. 239-241 - Pasquale De Rosa
, Pascal Felber, Valerio Schiavoni:
ScamDetect: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts. 242-244 - Seong-Su Yoon, Dong-Hyuk Shin, Ieck-Chae Euom:
DeepICS: Deep Causal Relationship Modeling for Multi-Source Log-Based Anomaly Detection in Industrial Control Systems. 245-246 - Lewis Tseng, Yu-Tsun Shao:
Poster: Designing Scalable, Secure Systems for Atomic-Scale Physical AI: Enabling Open Science and Collaborative Data Management and Analytics. 247-248 - Lewis Tseng:
Poster: Agree to Disagree: Revisiting the Comparison of (Multi-)Paxos and Raft. 249-230 - Rina Mishra, Gaurav Varshney, Shreya Singh:
Jailbreaking Generative AI: Empowering Novices to Conduct Phishing Attacks. 251-252 - Min-Chieh Wu, Yu-Sung Wu:
Adaptive Identity Management: Unified Personalization and Privacy Protection for Web Apps. 253-254 - Hyejin Kim, Seunghyun Yoon, Dan Dongseong Kim
, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim:
Intrusion Detection System with Domain-incremental Continual Learning. 255-256 - Umberto Fontana, Elisa Chiapponi, Claudio Costanza, Vincent Rigal, Olivier Thonnard, Martynas Buozis, Hervé Debar:
Detecting Scrapers on E-commerce Websites Using a Reduced Feature Set. 257-258 - Ijaz Ahmad, Joongheon Kim, Seokjoo Shin:
Learnable Encryption with a Diffusion Property. 259-260 - Sora Okada, Masaya Shimakawa, Takashi Minohara:
Security Vulnerability Risk Growth Model based on CVSS 4.0. 261-262 - Xinzhang Chen, Hassan Ali, Arash Shaghaghi, Salil S. Kanhere, Sanjay K. Jha:
TOSense: We Read, You Click. 263-264 - Pasquale De Rosa, Simon Queyrut, Yérom-David Bromberg, Pascal Felber, Valerio Schiavoni:
PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes. 265-266 - Tetsuro Takahashi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki:
Study of Appropriate Information Combination in Image-based Obfuscated Malware Detection. 267-268 - André Augusto, Rafael Belchior, Jonas Pfannschmidt, André Vasconcelos, Miguel Correia:
Looking for Anomalies in Cross-Chain Bridges. 269-270 - Seunghyun Yoon, Ryangsoo Kim, Hark Yoo, Hyuk Lim:
Real-Time GOOSE Attack Detection in IEC 61850 Substations Using SDN-Based Traffic Inspection. 271-272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.