Regular Track
Data-centric Reliability Management in GPUs |
|
Gurunath Kadam (William & Mary)
Evgenia Smirni (William & Mary)
Adwait Jog (William & Mary) |
Data-driven Design of Context-aware Monitors for Hazard Prediction in Artificial Pancreas Systems |
|
Xugui Zhou (University of Virginia, USA)
Bulbul Ahmed (University of Florida, USA)
James H.,Aylor (University of Virginia, USA)
Philip Asare (University of Toronto, Canada)
Homa Alemzadeh (University of Virginia, USA) |
Practical and Efficient in-Enclave Verification of Privacy Compliance |
|
Weijie Liu (Indiana University Bloomington, USA)
Wenhao Wang (Institute of Information Engineering, CAS, China)
Hongbo Chen (Indiana University Bloomington, USA)
XiaoFeng Wang (Indiana University Bloomington, USA)
Yaosong Lu (Institute of Information Engineering, CAS, China)
Kai Chen (Institute of Information Engineering, CAS, China)
Xinyu Wang (Shanghai Jiao Tong University, China)
Qintao Shen (Institute of Information Engineering, CAS, China)
Yi Chen (The Chinese University of Hong Kong, China)
Haixu Tang (Indiana University Bloomington, USA) |
Conservative Confidence Bounds in Safety, from Generalised Claims of Improvement & Statistical Evidence |
|
Kizito Salako (City, University of London)
Lorenzo Strigini (City, University of London)
Xingyu Zhao (University of Liverpool) |
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation |
|
Pietro Borrello (Sapienza University of Rome, Italy)
Emilio Coppa (Sapienza University of Rome, Italy)
Daniele Cono,D'Elia (Sapienza University of Rome, Italy) |
ADAM-CS: Advanced Asynchronous Monotonic Counter Service |
|
André Martin (TU Dresden)
Cong Lian (TU Dresden)
Franz Gregor (TU Dresden)
Robert Krahn (TU Dresden)
Valerio Schiavoni (University of Neuchatel)
Pascal
Felber(University of Neuchatel)
Christof Fetzer (TU Dresden) |
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users |
|
ALun-Pin Yuan (Pennsylvania State University)
Euijin Choo (Qatar Computing
Research Institute)
Ting Yu (Qatar Computing Research Institute)
Issa Khalil (Qatar Computing Research Institute)
Sencun Zhu (Pennsylvania State University) |
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild |
|
Marvin Moog (CISPA Helmholtz Center for Information Security - Saarland
University, Germany)
Markus Demmel (Saarland University, Germany)
Michael
Backes (CISPA Helmholtz Center for Information Security, Germany)
Aurore Fass (CISPA Helmholtz Center for Information Security, Germany) |
Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony |
|
Zhengxian He (Georgia Institute of Technology, United States)
Mohit Narayan (Citrix Systems, United States)
Mustaque Ahamad (Georgia Institute of
Technology, United States) |
EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves |
|
Fuhry Benny (SAP Security Research)
H A,Jayanth Jain (SAP Security Research)
Kerschbaum Florian (University of Waterloo) |
The Master and Parasite Attack |
|
Lukas Baumann (Fraunhofer Institute for Secure Information Technology,
Germany)
Elias Heftrig (Fraunhofer Institute for Secure Information Technology,
Germany)
Haya Shulman (Fraunhofer Institute for Secure Information
Technology, Germany)
Michael Waidner (Fraunhofer Institute for Secure
Information Technology, Germany) |
Plinius: Secure and Persistent Machine Learning Model Training |
|
Peterson Yuhala (University of Neuchâtel, Switzerland)
Pascal Felber (University
of Neuchâtel, Switzerland)
Valerio Schiavoni (University of Neuchâtel,
Switzerland)
Alain Tchana (ENS Lyon (Inria), France) |
A Low-cost Fault Corrector for Deep Neural Networks through Range Restriction |
|
Zitao Chen (University of British Columbia)
Guanpeng Li (University of Iowa)
Karthik Pattabiraman (University of British Columbia) |
BigMap: Future-proofing Fuzzers with Efficient Large Maps |
|
Alif Ahmed (University of Virginia)
Jason D. ziser (University of Virginia)
Anh
Nguyen,Tuong (University of Virginia)
Jack W.,Davidson (University of Virginia)
Kevin Skadron (University of Virginia) |
Towards Optimal Use of Exception Handling Information for Function Detection |
|
Chengbin Pang (Nanjing University, China; Stevens Institute of Technology, USA)
Ruotong Yu (Stevens Institute of Technology, USA)
Dongpeng Xu (University of
New Hampshire, USA)
Eric Koskinen (Stevens Institute of Technology, USA)
Georgios Portokalidis (Stevens Institute of Technology, USA)
Jun Xu (Stevens
Institute of Technology, USA) |
Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers |
|
Sriharsha Etigowni (Rutgers University) Sizhuang Liang (Georgia Institute of
Technology) Saman Zonouz (Rutgers University) Raheem Beyah (Georgia
Institute of Technology)
|
Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements |
|
Morteza Safaei Pour (University of Texas at San Antonio)
Dylan Watson (University of Texas at San Antonio)
Elias Bou-Harb (University of Texas at San
Antonio) |
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection |
|
Joseph Connelly (Boise State University, USA)
Taylor Roberts (Boise State
University, USA)
Xing Gao (University of Delaware, USA)
Jidong Xiao (Boise State
University, USA)
Haining Wang (Virginia Tech, USA)
Angelos Stavrou (Virginia
Tech, USA) |
OCTOPOCS: Automatic Verification of Propagated Vulnerable Code Using Reformed Proofs of Concept |
|
Seongkyeong Kwon (Korea University, Korea)
Seunghoon Woo (Korea University,
Korea)
Gangmo Seong (Korea University, Korea)
Heejo Lee (Korea University,
Korea) |
PID-Piper: Recovering Robotic Vehicles from Physical Attacks |
|
Pritam Dash (University of British Columbia)
Guanpeng Li (University of Iowa)
Zitao Chen (University of British Columbia)
Mehdi Karimibiuki (University of
British Columbia)
Karthik Pattabiraman (University of British Columbia) |
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection |
|
Shouguo Yang (Institute of Information Engineering, Chinese Academy of
Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy
of Sciences, Beijing China)
Long Cheng (School of Computing, Clemson
University, USA)
Yicheng Zeng (Institute of Information Engineering, Chinese
Academy of Sciences, Beijing, China; School of Cyber Security, University of
Chinese Academy of Sciences, Beijing China)
Zhe Lang (Institute of Information
Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber
Security, University of Chinese Academy of Sciences, Beijing China)
Hongsong
Zhu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing,
China; School of Cyber Security, University of Chinese Academy of Sciences,
Beijing China)
Zhiqiang Shi (Institute of Information Engineering, Chinese
Academy of Sciences, Beijing, China; School of Cyber Security, University of
Chinese Academy of Sciences, Beijing China) |
General Feature Selection for Failure Prediction in Large-scale SSD Deployment |
|
Fan Xu (Alibaba)
Shujie Han (The Chinese University of Hong Kong)
Patrick P.
C.,Lee (The Chinese University of Hong Kong)
Yi Liu (Alibaba)
Cheng He (Alibaba)
Jiongzhou Liu (Alibaba) |
Examining Failures and Repairs on Supercomputers with Multi-GPU Compute Nodes |
|
Amir Taherin (Northeastern University)
Tirthak Patel (Northeastern University)
Giorgis Georgakoudis (Lawrence Livermore National Laboratory)
Ignacio Laguna (Lawrence Livermore National Laboratory)
Devesh Tiwari (Northeastern
University) |
MILR: Mathematically Induced Layer Recovery for Plaintext Space Error Correction of CNNs |
|
Jonathan Ponader (University of Central Florida, United States)
Kyle Thomas (University of Central Florida, United States)
Yan Solihin (University of Central
Florida, United States)
Sandip Kundu (University of Massachusetts, Amherst,
United States) |
Sentiment Analysis based Error Detection for Large-Scale Systems |
|
Khalid Ayedh (University of Warwick, UK and University of Bisha, KSA)
Arshad
Jhumka (University of Warwick, UK)
Sheng Di (Argonne National Laboratory,
USA)
Franck Cappello (Argonne National Laboratory, USA and University of
Illinois at Urbana-Champaign, USA)
Edward Chuah (Lancaster University, UK) |
Horus: Non-Intrusive Causal Analysis of Distributed Systems Logs |
|
Francisco Neves (INESC TEC and University of Minho)
Nuno Machado (Amazon
and INESC TEC)
Ricardo Vilaça (INESC TEC and U. Minho)
José Pereira (INESC TEC
and U. Minho |
Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT Systems |
|
Maher Khan (University of Pittsburgh)
Amy Babay (University of Pittsburgh) |
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses |
|
Chad Spensky (Allthenticate) Aravind Machiry (Purdue University)
Nathan Burow (MIT Lincoln Laboratory)
Hamed Okhravi (MIT Lincoln Laboratory)
Rick Housley (River Loop Security)
Zhongshu Gu (IBM Research)
Hani Jamjoom (IBM
Research)
Christopher Kruegel (University of California, Santa Barbara)
Giovanni
Vigna (University of California, Santa Barbara) |
Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions |
|
Chao Su (Nanjing University, China)
Xuhua Ding (Singapore Management
University, Singapore)
Qingkai Zeng (Nanjing University, China) |
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities |
|
Qiang Li (Beijing JiaoTong University, China)
Jinke Song (Beijing JiaoTong
University, China)
Dawei Tan (Beijing JiaoTong University, China)
Haining Wang (Virginia Tech, USA)
Jiqiang Liu (Beijing JiaoTong University, China) |
An Application Agnostic Defense Against the Dark Arts of Cryptojacking |
|
Nada Lachtar (University of Michigan, USA)
Abdulrrahman Abu Elkhail (University
of Michigan, USA)
Anys Bacha (University of Michigan, USA)
Hafiz Malik (University of Michigan, USA) |
Avis: In-Situ Model Checking for Unmanned Aerial Vehicles |
|
Max Taylor (The Ohio State University)
Haicheng Chen (The Ohio State
University)
Feng Qin (The Ohio State University)
Christopher Stewart (The Ohio
State University) |
A Comprehensive Study of Bugs in Software Defined Networks |
|
Ayush Bhardwaj (Brown University)
Zhenyu Zhou (Duke University)
Theophilus
A.,Benson (Brown University) |
Model Checking the Multi-Formalism Language FIGARO |
|
Shahid Khan (RWTH Aachen University Germany)
Matthias Volk (RWTH Aachen
University Germany)
Joost-Pieter Katoen (RWTH Aachen University Germany)
Alexis Braibant (Électricité de France)
Marc Bouissou (Électricité de France) |
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips |
|
Romain Cayre (CNRS, LAAS, 7 avenue du colonel Roche, F-31400, France;
APSYS.Lab, APSYS, France)
Florent Galtier (CNRS, LAAS, 7 avenue du colonel
Roche, F-31400, France)
Guillaume Auriol (CNRS, LAAS, 7 avenue du colonel
Roche, F-31400, France; Univ de Toulouse, INSA, LAAS, F-31400, France)
Vincent
Nicomette (CNRS, LAAS, 7 avenue du colonel Roche, F-31400, France; Univ de
Toulouse, INSA, LAAS, F-31400, France)
Mohamed Kaâniche (CNRS, LAAS, 7
avenue du colonel Roche, F-31400, France)
Géraldine Marconato (APSYS.Lab,
APSYS, France) |
NVCache: A Plug-and-Play NVMM-based I/O Booster for Legacy Systems |
|
Rémi Dulong (University of Neuchâtel, Switzerland)
Rafael Pires (Swiss Federal
Institute of Technology in Lausanne, Switzerland)
Andreia Correia (University of
Neuchâtel, Switzerland)
Valerio Schiavoni (University of Neuchâtel, Switzerland)
Pedro Ramalhete (Cisco Systems)
Pascal Felber (University of Neuchâtel,
Switzerland)
Gaël Thomas (Télécom SudParis/Institut Polytechnique de Paris,
France) |
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections |
|
Romain Cayre (CNRS, LAAS, 7 avenue du colonel Roche, F-31400, France;
APSYS.Lab, APSYS, France)
Florent Galtier (CNRS, LAAS, 7 avenue du colonel
Roche, F-31400, France)
Guillaume Auriol (CNRS, LAAS, 7 avenue du colonel
Roche, F-31400, France; Univ de Toulouse, INSA, LAAS, F-31400, France)
Vincent
Nicomette (CNRS, LAAS, 7 avenue du colonel Roche, F-31400, France; Univ de
Toulouse, INSA, LAAS, F-31400, France)
Mohamed Kaâniche (CNRS, LAAS, 7
avenue du colonel Roche, F-31400, France)
Géraldine Marconato (APSYS.Lab,
APSYS, France) |
Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN |
|
Bedeuro Kim (University of Sungkyunkwan, Republic of Korea / CSIRO’s Data61,
Australia)
Alsharif Abuadbba (CSIRO’s Data61, Australia / Cybersecurity CRC,
Australia)
Yansong Gao (CSIRO’s Data61, Australia / Nanjing University of Science
and Technology, China)
Yifeng Zheng (CSIRO’s Data61, Australia / Harbin Institute
of Technology, China)
Muhammad Ejaz,Ahmed (CSIRO’s Data61, Australia)
Surya
Nepal (CSIRO’s Data61, Australia / Cybersecurity CRC, Australia)
Hyoungshick Kim (University of Sungkyunkwan, Republic of Korea / CSIRO’s Data61, Australia) |
Revealing GPUs Vulnerabilities by Combining Register-Transfer and Software-Level Fault Injection |
|
Fernando Fernandes dos Santos (Universidade Federal do Rio Grande do Sul
(UFRGS))
Josie Esteban Rodriguez Condia (Politecnico di Torino)
Luigi Carro (Universidade Federal do Rio Grande do Sul (UFRGS))
Matteo Sonza Reorda (Politecnico di Torino)
Paolo Rech (Politecnico di Torino) |
When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid |
|
Daoyuan Wu (The Chinese University of Hong Kong, China)
Debin Gao (Singapore
Management University, Singapore)
Robert H.,Deng (Singapore Management
University, Singapore)
Rocky K. C.,Chang (The Hong Kong Polytechnic University,
China) |
K2: Reading Quickly from Storage Across Many Datacenters |
|
Khiem Ngo (Princeton University, United States)
Haonan (Princeton University,
United States)
Wyatt Lloyd (Princeton University, United States) |
Enabling Novel Interconnection Agreements with Path-Aware Networking Architectures |
|
Simon Scherrer (ETH Zurich)
Markus Legner (ETH Zurich)
Adrian Perrig (ETH
Zurich)
Stefan Schmid (University of Vienna) |
Self-Healing Protocol: Repairing Schedules Online after Link Failures in Time-Triggered Networks |
|
Francisco Pozo (Westermo Network Technologies AB)
Guillermo Rodriguez-Navas (Nokia Bell Labs)
Hans Hansson (Mälardalen University) |
Fast IPv6 Network Periphery Discovery and Security Implications |
|
Xiang Li (Tsinghua University; Beijing National Research Center for Information
Science and Technology (BNRist))
Baojun Liu (Tsinghua University)
Xiaofeng
Zheng (Tsinghua University; QI-ANXIN Technology Research Institute)
Haixin
Duan (Tsinghua University; Beijing National Research Center for Information
Science and Technology (BNRist)
QI-ANXIN Technology Research Institute)
Qi Li (Tsinghua University)
Youjun Huang (Tsinghua University) |
PatchDB: A Large-Scale Security Patch Dataset |
|
Xinda Wang (George Mason University, USA)
Shu Wang (George Mason
University, USA)
Pengbin Feng (George Mason University, USA)
Kun Sun (George
Mason University, USA)
Sushil Jajodia (George Mason University, USA) |
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection |
|
Koustubha Bhat (Vrije Universiteit Amsterdam, The Netherlands)
Erik van der
Kouwe (Vrije Universiteit Amsterdam, The Netherlands)
Herbert Bos (Vrije
Universiteit Amsterdam, The Netherlands)
Cristiano Giuffrida (Vrije Universiteit
Amsterdam, The Netherlands) |
GARFIELD: System Support for Byzantine Machine Learning |
|
Rachid Guerraoui (EPFL)
Arsany Guirguis (EPFL)
Jérémy Plassmann (EPFL)
Anton
Ragot (EPFL)
Sébastien Rouault (EPFL) |
NVBitFI: Dynamic Fault Injection for GPUs |
|
Timothy Tsai (Nvidia)
Siva Kumar Sastry,Hari (Nvidia)
Michael Sullivan (Nvidia)
Oreste Villa (Nvidia)
Stephen W.,Keckler (Nvidia) |
|