Paper | Authors |
Manufacturing Resilient Bi-Opaque Predicates against Symbolic Execution | Hui Xu (CUHK); Yangfan Zhou, Yu Kang (Fudan University); Fengzhi Tu, Michael R. Lyu (CUHK) |
RDMC: A Reliable RDMA Multicast for Large Objects | Jonathan Behrens (MIT and Cornell University); Ken Birman, Sagar Jha, Edward Tremel (Cornell University) |
Divide And Conquer For Fast SRLG Disjoint Routing | Kun Xie, Heng Tao, Xin Wang (State University of New York at Stony Brook); Gaogang Xie, Jigang Wen (Institute of Computing Technology,Chinese Academy of Sciences); Jiannong Cao (The Hong Kong Polytechnic University); Zheng Qin (Hunan University) |
Deceptive Secret Sharing | Lei Zhang, Douglas M. Blough (Georgia Institute of Technology) |
FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications | JiaChen, GeHan (Shandong University); ShanqingGuo (PO BOX 134,School of Computer Science,Shandong University,Shunhua Road, High-tech Development Zone,Ji'nan, P.R.China,250101) |
Robustness of Android Wear Ecosystem: A Fuzz Testing-based Study | Edgardo Barsallo Yi, Amiya K. Maji, Saurabh Bagchi (Purdue University) |
Parallel Error Detection Using Heterogeneous Cores | Sam Ainsworth, Timothy M. Jones (University of Cambridge) |
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid | Amy Babay, Thomas Tantillo, Trevor Aron (Johns Hopkins University); Marco Platania (AT&T Labs); Yair Amir (Johns Hopkins University, Spread Concepts LLC) |
OWL: Understanding and Detecting Concurrency Attacks | Shixiong Zhao (The University of Hong Kong); Rui Gu (Columbia University); Haoran Qiu, Yuexuan Wang, Heming Cui (The University of Hong Kong); Junfeng Yang (Columbia University) |
ZOE: Content-based Anomaly Detection for Industrial Control Systems | Christian Wressnegger, Ansgar Kellner, Konrad Rieck (TU Braunschweig) |
Preventing IPv6 DNS Reconnaissance Attacks using DNS Guard | Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee (The University of Auckland) |
Obfuscated VBA Macro Detection using Machine Learning | Sangwoo Kim, Seokmyung Hong, Jaesang Oh, Heejo Lee (Korea university) |
EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution | David Goltzsche, Signe Rüsch, Manuel Nieke (TU Braunschweig); Sébastien Vaucher (Université de Neuchâtel); Nico Weichbrodt (TU Braunschweig); Valerio Schiavoni (Université de Neuchâtel); Pierre-Louis Aublin, Paolo Costa (Imperial College London); Christof Fetzer (TU Dresden); Pascal Felber (Université de Neuchâtel); Peter Pietzuch (Imperial College London); Rüdiger Kapitza (TU Braunschweig) |
TheSys: Nonblocking Reads in a Partitioned Transactional Causally Consistent Data Store | Kristina Spirovska, Diego Didona, Willy Zwaenepoel (EPFL) |
SHIRAZ: Exploiting System Reliability and Application Resilience Characteristics to Improve Large Scale System Throughput | Rohan Garg, Tirthak Patel, Gene Cooperman, Devesh Tiwari (Northeastern University) |
PreInfer: Automatic Inference of Preconditions via Symbolic Analysis | Angello Astorga, Siwakorn Srisakaokul (University of Illinois at Urbana-Champaign); Xusheng Xiao (Case Western Reserve University); Tao Xie (University of Illinois at Urbana-Champaign) |
Efficient transient analysis of a class of compositional Fluid Stochastic Petri Nets | Peter Buchholz (TU Dortmund); Tugrul Dayar (Bilkent University) |
Code-Dependent and Architecture-Dependent Reliability Behaviors | Vinicius Fratin, Daniel Oliveira, Caio Lunardi, Fernando Santos, Gennaro Rodrigues, Paolo Rech (UFRGS) |
Inferring, Characterizing, and Investigating Internet-scale Malicious IoT Device Activities: A Network Telescope Perspective | Sadegh Torabi (Concordia University); Elias Bou-Harb (Florida Atlantic University); Chadi Assi (Concordia University); Mario Galluscio (Florida Atlantic University); Amine Boukhtouta (Ericsson Canada); Mourad Debbabi (Concordia University) |
A Specification-based Protocol Obfuscation Framework | Julien Duchene (CALID / LAAS-CNRS); Eric Alata, Vincent Nicomette, Mohamed Kaaniche (LAAS-CNRS); Colas Le Guernic (DGA-MI / INRIA) |
Fast Hypervisor Recovery Without Reboot | Diyu Zhou, Yuval Tamir (UCLA Computer Science Department) |
Machine Learning Models for GPU Error Prediction in a Large Scale HPC System | Bin Nie, Ji Xue (College of William and Mary); Saurabh Gupta (Intel Labs); Tirthak Patel (Northeastern University); Christian Engelmann (Oak Ridge National Laboratory); Evgenia Smirni (College of William and Mary); Devesh Tiwari (Northeastern University) |
FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking | Meisam Navaki Arefi (Universityof New Mexico); Geoffrey Alexander, Hooman Rokham (University of New Mexico); Aokun Chen, Daniela Oliveira (University of Florida); Xuetao Wei (University of Cincinnati); Michalis Faloutsos (Univerisity of California Riverside); Jedidiah R. Crandall (University of New Mexico) |
Branching Bisimulation and Concurrent Object Verification | Xiaoxiao Yang (Institute of Software, Chinese Academy of Sciences); Joost-Pieter Katoen (RWTH Aachen University); Huimin Lin, Gaoang Liu (Institute of Software, Chinese Academy of Sciences); Hao Wu (unaffiliated) |
RoboADS: Anomaly Detection against Sensor and Actuator Misbehaviors in Mobile Robots | Pinyao Guo, Hunmin Kim (Pennsylvania State University); Nurali Virani (GE Global Research); Jun Xu, Minghui Zhu, Peng Liu (Pennsylvania State University) |
Low Overhead Tag Error Mitigation for GPU Architectures | Atieh Lotfi (University of California, San Diego); Nirmal Saxena, Richard Bramley, Paul Racunas, Philip Shirvani (NVIDIA) |
Byzantine Fault-Tolerant Atomic Multicast | Paulo Coelho (Università della Svizzera italiana); Tarcisio Ceolin (Pontifícia Universidade Católica do Rio Grande do Sul); Alysson Bessani (Universidade de Lisboa); Fernando Dotti (Pontifícia Universidade Católica do Rio Grande do Sul); Fernando Pedone (Università della Svizzera italiana) |
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices (regular paper) | Bing Chang (Singapore Management University); Fengwei Zhang (Wayne State University); Bo Chen (Michigan Technological University); Yingjiu Li (Singapore Management University); Wen-Tao Zhu (Institute of Information Engineering, Chinese Academy of Sciences); Yangguang Tian (Singapore Management University); Zhan Wang (RealTime Invent, Inc.); Albert Ching (i-Sprint Innovations) |
Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter! | Antoine Boutet (INSA-Lyon, CITI, Inria); Florestan De Moor (ENS Rennes); Davide Frey (Inria); Rachid Guerraoui (EPFL); Anne-Marie Kermarrec (Mediego); Antoine Rault (EPFL) |
Regular Paper: To Detect Stack Buffer Overflow With Polymorphic Canaries | Zhilong Wang (Nanjing University); Xuhua Ding (Singapore Management University); Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao (Nanjing University) |
Cost-Benefit Analysis of Moving-Target Defense in Power Grids | Subhash Lakshminarayana (Advanced Digital Sciences Center, Illinois at Singapore); David K.Y. Yau (Singapore University of Technology and Design) |
Algorithmic Attack Synthesis using Hybrid Dynamics of Power Grid Critical Infrastructures | Zhenqi Huang (University of Illinois); Sriharsha Etigowni (Rutgers University); Sayan Mitra (University of Illinois); Saman Zonouz (Rutgers University) |
Falcon: A practical log-based analysis tool for distributed systems | Francisco Neves, Nuno Machado, José Pereira (HASLab, INESC TEC and University of Minho) |
Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction | Jiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim, Jong Kim (Pohang University of Science and Technology) |
Pleiades: Distributed Structural Invariants at Scale | Simon Bouget, Yérom David Bromberg, Adrien Luxey, Francois Taiani (Univ Rennes, Inria, CNRS, IRISA) |
Practical Experience: Methodologies for Measuring Route Origin Validation | Tomas Hlavacek (Fraunhofer SIT); Amir Herzberg (UConn); Haya Shulman, Michael Waidner (Fraunhofer SIT) |
DAVOS: EDA toolkit for dependability assessment, verification, optimisation and selection of hardware models | Ilya Tuzov, David de Andrés, Juan-Carlos Ruiz (Universitat Politècnica de València) |
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware | Kai Cheng (School of Cyber Security, University of Chinese Academy of Sciences; CAS); Qiang Li (Beijing Jiaotong University); Lei Wang (State Grid Corporation of China); Qian Chen, Yaowen Zheng (School of Cyber Security, University of Chinese Academy of Sciences; CAS); Limin Sun (Institute of Information Engineering, CAS); Zhenkai Liang (National University of Singapore) |
RECAST: Random Entanglement for Censorship-resistant Archival STorage | Roberta Barbi, Dorian Burihabwa, Pascal Felber, Hugues Mercier, Valerio Schiavoni (University of Neuchatel) |
Practical experience report - The Tortoise and the Hare: Characterizing Synchrony in Distributed Environments | Daniel Porto (INESC-ID/IST - U. Lisboa); João Leitão (NOVALINCS/FCT - UNL); Flavio Junqueira (Apache); Rodrigo Rodrigues (INESC-ID/IST - U. Lisboa) |
Gamification as a means to evaluate Sel-adaptive Authorisation Infrastructures | Chris Bailey, Rogério de Lemos (University of Kent) |
Understanding and Analyzing Interconnect Errors and Network Congestion on a Large Scale HPC system | Mohit Kumar (Wayne State University); Devesh Tiwari (Northeastern University); Saurabh Gupta (Oak Ridge National Laboratory); Tirthak Patel (Northeastern University); Weisong Shi (Wayne State University); Song Fu (University of North Texas); Christian Engelmann (Oak Ridge National Laboratory) |
Importance Sampling of Interval Markov Chains | Cyrille Jegourel, Jingyi Wang, Jun Sun (Singapore University of Technology and Design) |
Modeling Soft Error Propagation in Programs | Guanpeng Li, Karthik Pattabiraman (University of British Columbia); Siva Kumar Sastry Hari, Michael Sullivan, Timothy Tsai (NVIDIA) |
PowerAlert: Integrity Checking using Power Measurement and a Game-Theoretic Strategy | Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders (University of Illinois) |
Modeling Input-Dependent Error Propagation in Programs | Guanpeng Li, Karthik Pattabiraman (University of British Columbia) |
Alpha Entanglement Codes: Practical Erasure Codes to Archive Big Data in Unreliable Environments | Veronica Estrada-Galinanes (University of Neuchatel); Ethan Miller (University of California Santa Cruz); Pascal Felber (University of Neuchatel); Jehan-Francois Paris (University of Houston) |
On the challenges of building a BFT SCADA | André Nogueira, Miguel Garcia, Alysson Bessani, Nuno Neves (LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal) |
A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform | João Sousa, Alysson Bessani (LaSIGE, Faculdade de Ciências, Universidade de Lisboa); Marko Vukolić (IBM Research Zurich) |
A Framework for Evaluating Software on Reduced Margins Hardware | Konstantinos Parasyris, Panos Koutsovasilis, Vassilis Vassiliadis, Christos D. Antonopoulos, Nikolaos Bellas, Spyros Lalis (University Of Thessaly) |
In Production Performance Testing of SDN ControlPlane for Telecom Operators | Catello Di Martino (Nokla Bell Labs); Ugo Giordano (University of Naples Federico II); Nishok N. Mohanasamy (Nokla Bell Labs); Stefano Russo (University of Naples Federico II); Marina Thottan (Nokla Bell Labs) |
Regular paper--DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis | Zhenyu Ning, Fengwei Zhang (Wayne State University) |
IBBE-SGX: Cryptographic Group Access Control over Inquisitive Cloud Storages | Stefan Contiu (University of Bordeaux, France); Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber (University of Neuchâtel, Switzerland); Laurent Réveillère (University of Bordeaux, France) |
Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services | Lin Jin, Shuai Hao, Haining Wang, Chase Cotton (University of Delaware) |
Impact of Software Approximations on the Resiliency of a Video Summarization System | Radha Venkatagiri (University of Illinois at Urbana Champaign); Karthik Swaminathan, Chung-Ching Lin (IBM Research); Liang Wang (University of Virginia); Alper Buyuktosunoglu, Pradip Bose (IBM Research); Sarita V. Adve (University of Illinois at Urbana Champaign) |
A Reexamination of Internationalized Domain Names: the Good, the Bad and the Ugly (regular) | Baojun Liu, Chaoyi Lu (Tsinghua University); Zhou Li (IEEE member); Ying Liu, Haixin Duan (Tsinghua University); Shuang Hao (University of Texas at Dallas); Zaifeng Zhang (Netlab of 360) |
Hands Off the Wheel in Autonomous Vehicles? A Systems Perspective of Field-Data Over Million Miles | Subho S. Banerjee, Saurabh Jha, James Cyriac, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer (University of Illinois at Urbana-Champaign) |
Localizing Function Errors in Mobile Apps with User Reviews | Le Yu, Jiachi Chen, Hao Zhou, Xiapu Luo (Hong Kong Polytechnic University); Kang Liu (Institute of Automation, Chinese Academy of Sciences) |
Troxy: Transparent Access to Byzantine Fault-Tolerant Systems | Bijun Li, Nico Weichbrodt, Johannes Behl (TU Braunschweig); Pierre-Louis Aublin (Imperial College London); Tobias Distler (FAU Erlangen-Nuremberg); Rüdiger Kapitza (TU Braunschweig) |
Migrating SGX Enclaves with Persistent State | Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan (Aalto University) |
Generating Cloud Monitors from Models to Secure Clouds (Tool Paper) | Irum Rauf, Elena Troubitsyna (Åbo Akademi University, Turku, Finland) |
Effective Topology Tampering Attacks and Defenses in Software-Defined Networks | Richard Skowyra (MIT Lincoln Laboratory); Lei Xu, Guofei Gu (Texas A&M University); Thomas Hobson, Veer Dedhia, James Landry, Hamed Okhravi (MIT Lincoln Laboratory) |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |