Accepted Papers
Research Track
- WideLeak: How Over-the-Top Platforms Fail in Android
Gwendal Patat (Univ Rennes, CNRS, IRISA), Mohamed Sabt (Univ Rennes, CNRS, IRISA), Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)
- Strategic Safety-Critical Attacks against an Advanced Driver Assistance System
Xugui Zhou (University of Virginia), Anna Schmedding (William & Mary), Haotian Ren (University of Virginia), Lishan Yang (William & Mary), Philip Schowitz (William & Mary), Evgenia Smirni (William & Mary), Homa Alemzadeh (University of Virginia)
- Understanding the RowHammer Vulnerability Under Reduced Wordline Voltage: An Experimental Study Using Real Devices
Abdullah Giray Yaglikci (ETH Zurich), Haocong Luo (ETH Zurich), Ataberk Olgun (ETH Zurich), Geraldo Francisco de Oliveira Junior (ETH Zurich), Jisung Park (ETH Zurich), Minesh Patel (ETH Zurich), Hasan Hassan (ETH Zurich), Lois Orosa (ETH Zurich), Jeremie Kim (ETH Zurich), Onur Mutlu (ETH Zurich)
- SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector
Zhiquan Tang (Hunan University), Wenxin Kuang (Hunan University), Qiao Hu (Hunan University), Jiongyi Chen (National University of Defense Technology), Yupeng Hu (Hunan University)
- On the Price of Locality in Static Fast Rerouting
Klaus-Tycho Foerster (TU Dortmund), Juho Hirvonen (Aalto University), Yvonne-Anne Pignolet (DFINITY), Stefan Schmid (University of Vienna & TU Berlin), Gilles Tredan (LAAS-CNRS)
- GoldenEye: A Platform for Evaluating Emerging Data Formats in DNN Accelerators
Abdulrahman Mahmoud (Harvard University), Thierry Tambe (Harvard University), Tarek Aloui (Harvard University), David Brooks (Harvard), Gu-Yeon Wei (Harvard University, Samsung Electronics)
- STBPU: A Reasonably Secure Branch Prediction Unit
Tao Zhang (William and Mary), Timothy Lesch (William & Mary), Kenneth Koltermann (William and Mary), Dmitry Evtyushkin (William & Mary)
- COMET: On-die and In-controller Collaborative Memory ECC Technique for Safer and Stronger Correction of DRAM Errors
Irina Alam (UCLA), Puneet Gupta (UCLA)
- HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations
Kaiwen Shen (Tsinghua University), JianYu Lu (Qi An Xin Group Corp.), Yaru Yang (Tsinghua University), Jianjun Chen (Tsinghua University), Mingming Zhang (Tsinghua University), Haixin Duan (Tsinghua University; Qi An Xin Group Corp.), Jia Zhang (Tsinghua University), Xiaofeng Zheng (Tsinghua University; Qi An Xin Group Corp.)
- CYCLE: Sustainable Off-Chain Payment Channel Network with Asynchronous Rebalancing
Zicong Hong (The Hong Kong Polytechnic University), Song Guo (The Hong Kong Polytechnic University), Rui Zhang (The Hong Kong Polytechnic University), Peng Li (The University of Aizu), Yufeng Zhan (Beijing Institute of Technology), Wuhui Chen (Sun Yat-sen University)
- PassFlow: Guessing Passwords with Generative Flows
Giulio Pagnotta (Sapienza University of Rome), Dorjan Hitaj (Sapienza University of Rome), Fabio De Gaspari (Sapienza University of Rome), Luigi Mancini (Sapienza University of Rome)
- Treaty: Secure Distributed Transactions
Dimitra Giantsidi (The University of Edinburgh), Maurice Bailleu (The University of Edinburgh, UK), Natacha Crooks (UC Berkeley), Pramod Bhatotia (TU Munich)
- False Data Injection Attack Detection for Secure Distributed Demand Response in Smart Grids
Thusitha Dayaratne (Monash University), Mahsa Salehi (Monash University), Carsten Rudolph (Monash University), Ariel Liebman (Monash University)
- Hardening In-memory Key-value Stores against ECC-uncorrectable Memory Errors
Tsuyoshi Shimomura (TUAT), Hiroshi Yamada (TUAT)
- Background Buster: Peeking through Virtual Backgrounds in Online Video Calls
Mohd Sabra (University of Texas at San Antonio), Anindya Maiti (University of Oklahoma), Murtuza Jadliwala (University of Texas at San Antonio)
- Marlin: Two-Phase BFT with Linearity
Sisi Duan (Tsinghua University), Xiao Sui (Shandong University), Haibin Zhang (independent)
- Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts
Huajun Chai (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China. School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China.), Lingyun Ying (QI-ANXIN Technology Research Institute), Haixin Duan (BNRist & Institute for Network Science and Cyberspace, Tsinghua University. Tsinghua University-QI-ANXIN Group JCNS), Daren Zha (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
- SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services
Ziyi Zhou (Shanghai Jiao Tong University), Xing Han (University of Electronic Science and Technology of China), Zeyuan Chen (Shanghai Jiao Tong University), Yuhong Nan (Sun Yat-sen University), Juanru Li (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University)
- CAROL: Confidence-Aware Resilience Model for Edge Federations
Shreshth Tuli (Imperial College London), Giuliano Casale (Imperial College London), Nicholas R. Jennings (Loughborough University)
- Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems
Saurabh Jha (UIUC/IBM), Shengkun Cui (University of Illinois Urbana-Champaign), Timothy Tsai (NVIDIA), Siva Kumar Sastry Hari (NVIDIA), Michael Sullivan (NVIDIA), Zbigniew Kalbarczyk (University of Illinois at Urbana-Champaign), Stephen W. Keckler (NVIDIA), Ravishankar K. Iyer (University of Illinois at Urbana-Champaign)
- L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing
Haram Park (Korea University), Carlos Nkuba Kayembe (Korea University), Seunghoon Woo (Korea University), Heejo Lee (Korea University)
- Exploiting monotonicity and symmetry for evaluation of highly dependable systems
Hoang Hai Nguyen (University of Illinois at Urbana-Champaign), Kartik Palani (University of Illinois at Urbana Champaign), David Nicol (University of Illinois at Urbana-Champaign)
- IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors
Chenglong Fu (Temple University), Qiang Zeng (University of South Carolina), Haotian Chi (Temple University), Xiaojiang Du (Stevens Institute of Technology), Siva Likitha Valluru (University of South Carolina)
- DisTA: System-Agnostic Dynamic Taint Tracking for Distributed Systems
Dong Wang (Institute of Software Chinese Academy of Sciences (ISCAS)), Yu Gao (Institute of Software, Chinese Academy of Sciences), Wensheng Dou (Institute of Software Chinese Academy of Sciences), Jun Wei (Institute of Software at Chinese Academy of Sciences)
- CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs
Jerome Dinal Herath (State University of New York at Binghamton), Priti Prabhakar Wakodikar (State University of New York at Binghamton), Ping Yang (State University of New York at Binghamton), Guanhua Yan (Binghamton University, State University of New York)
- Predicting DRAM-Caused Node Unavailability in Hyper-Scale Clouds
Pengcheng Zhang (Shanghai Jiao Tong University), Yunong Wang (Alibaba Group), Xuhua Ma (Alibaba Group), Yaoheng Xu (Shanghai Jiao Tong University), Bin Yao (Shanghai Jiao Tong University), Xudong Zheng (Alibaba Group), Linquan Jiang (Alibaba Group)
- Characterizing and Mitigating Anti-patterns of Alerts in Industrial Cloud Systems
Tianyi Yang (The Chinese University of Hong Kong), Jiacheng Shen (The Chinese University of Hong Kong), Yuxin Su (Sun Yat-sen University), Xiaoxue Ren (The Chinese University of Hong Kong), Xiao Ling (Huawei Technologies), Yongqiang Yang (Huawei Technologies), Michael Lyu (The Chinese University of Hong Kong)
- BLAP: Bluetooth Link key extraction And Page blocking attacks
ChangSeok Koh (Korea University), Jonghoon Kwon (ETH Zurich), Junbeom Hur (Korea University)
- ZugChain: Blockchain-Based Juridical Data Recording in Railway Systems
Signe Rüsch (TU Braunschweig, Germany), Kai Bleeke (TU Braunschweig, Germany), Ines Messadi (TU Braunschweig, Germany), Stefan Schmidt (TU Braunschweig, Germany), Andreas Krampf (Siemens Mobility), Katharina Olze (Siemens Mobility), Susanne Stahnke (Siemens), Robert Schmid (Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany), Lukas Pirl (Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany), Roland Kittel (Deutsche Bahn), Andreas Polze (Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany), Marquart Franz (Siemens), Matthias Müller (Siemens Mobility), Leander Jehl (University of Stavanger), Ruediger Kapitza (TU Braunschweig, Germany)
- How'd Security Benefit Reverse Engineers? The Implication of Intel CET on Function Identification
Hyungseok Kim (The Affiliated Institute of ETRI), Junoh Lee (KAIST), Soomin Kim (KAIST), Seungil Jung (KAIST CSRC), Sang Kil Cha (KAIST)
- The Hazard Value: A Quantitative Network Connectivity Measure Accounting for Failures
Pieter J. L. Cuijpers (Eindhoven University of Technology & Aalborg University, Denmark), Stefan Schmid (University of Vienna & TU Berlin), Nicolas Schnepf (Aalborg University, Denmark & Centre INRIA Nancy Grand-Est, University of Lorraine, France), Jiri Srba (Aalborg University, Denmark)
- Solution Bundles of Markov Performability Models through Adaptive Cross Approximation
Leonardo Robol (University of Pisa), Giulio Masetti (ISTI-CNR Pisa), Silvano Chiaradonna (ISTI-CNR Pisa), Felicita Di Giandomenico (ISTI-CNR)
- ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles
Mateen Malik (RISE Research Institutes of Sweden), Mehdi Maleki (RISE Research Institutes of Sweden), Peter Folkesson (RISE Research Institutes of Sweden), Behrooz Sangchoolie (RISE Research Institutes of Sweden), Johan Karlsson (Chalmers University of Technology)
- QuFI: a Quantum Fault Injector to Measure the Reliability of Qubits and Quantum Circuits
Daniel Oliveira (UFPR), Edoardo Giusto (Politecnico di Torino), Emanuele Dri (Politecnico di Torino), Nadir Casciola (Politecnico di Torino), Betis Baheri (Kent State University), Qiang Guan (Kent State University), Bartolomeo Montrucchio (Politecnico di Torino), Paolo Rech (Politecnico di Torino)
- RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs
Chang Liu (Institute of Information Engineering, Chinese Academy of Sciences), Yanwei Liu (Institute of Information Engineering, Chinese Academy of Sciences), Zhen Xu (Institute of Information Engineering, Chinese Academy of Sciences), Liang Dai (Institute of Information Engineering, Chinese Academy of Sciences)
- NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing
Hanqing Guo (Michigan State University), Chenning Li (Michigan State University), Lingkun Li (Michigan State University), Zhichao Cao (Michigan State University), Qiben Yan (Michigan State University), Li Xiao (Michigan State University)
- TORPEDO: A Fuzzing Framework for Discovering Adversarial Container Workloads
Kent McDonough (Virginia Tech), Xing Gao (University of Delaware), Shuai Wang (HKUST), Haining Wang (Virginia Tech)
- ERIC: An Efficient and Practical Software Obfuscation Framework
Alperen Bolat (TOBB University of Economics and Technology), Seyyid Hikmet Çelik (TOBB University of Economics and Technology), Ataberk Olgun (TOBB University of Economics and Technology), Oğuz Ergin (TOBB University of Economics and Technology), Marco Ottavi (University of Twente and University of Rome Tor Vergata)
- A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale
Rebekah Houser (University of Delaware), Shuai Hao (Old Dominion University), Chase Cotton (University of Delaware), Haining Wang (Virginia Tech)
- Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows
Dinh Nguyen Dao (Inha University), Rhongho Jang (Wayne State University), Changhun Jung (Inha University), David Mohaisen (University of Central Florida), DaeHun Nyang (Ewha Womens University)
- Arming IDS Researchers with a Robotic Arm Dataset
Arpan Gujarati (University of British Columbia), Zainab Saeed Wattoo (University of British Columbia), Maryam Aliabadi (University of British Columbia), Sean Clark (University of British Columbia), Xiaoman Liu (University of British Columbia), Parisa Shiri (University of British Columbia), Amee Trivedi (University of British Columbia), Ruizhe Zhu (University of British Columbia), Jason Hein (University of British Columbia), Margo Seltzer (University of British Columbia)
- BFL: a Logic to Reason about Fault Trees
Stefano M. Nicoletti (University of Twente), Ernst Moritz Hahn (University of Twente), Marielle Stoelinga (University of Twente and Radboud University)
- The Fault in Our Data Stars: Studying Mitigation Techniques against Faulty Training Data in Machine Learning Applications
Abraham Chan (University of British Columbia), Arpan Gujarati (The University of British Columbia), Karthik Pattabiraman (University of British Columbia), Sathish Gopalakrishnan (The University of British Columbia)
- TimeDice: Schedulability-Preserving Priority Inversion for Mitigating Covert Timing Channels Between Real-time Partitions
Man-Ki Yoon (Yale University), Jung-Eun Kim (Syracuse University), Richard Bradford (Collins Aerospace), Zhong Shao (Yale University)
- Back to the future: N-Versioning of Microservices
Antonio Espinoza (Arizona State University), Riley Wood (University of Texas - Austin), Stephanie Forrest (Arizona State University), Mohit Tiwari (University of Texas - Austin)
- SAINTDroid: Scalable, Automated Incompatibility Detection for Android
Bruno Silva (University of Nebraska - Lincoln), Clay Stevens (University of Nebraska-Lincoln), Niloofar Mansoor (University of Nebraska - Lincoln), Witawas Srisa-An (University of Nebraska -Lincoln), Tingting Yu (University of Cincinnati), Hamid Bagheri (University of Nebraska -Lincoln)
- Tool: An Efficient and Flexible Simulator for Byzantine Fault-Tolerant Protocols
Ping-Lun Wang (National Taiwan University), Tzu-Wei Chao (nan), Chia-Chien Wu (National Taiwan University), Hsu-Chun Hsiao (National Taiwan University)
- KINGFISHER: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications
Yiwei Zhang (Shanghai Jiao Tong University), Siqi Ma (The University of New South Wales Canberra), Juanru Li (Shanghai Jiao Tong University), Elisa Bertino (Purdue University), Dawu Gu (Shanghai Jiao Tong University)
- Active-MTSAD: Multivariate Time Series Anomaly Detection With Active Learning
Wenlu Wang (Sun Yat-sen University), Pengfei Chen (Sun Yat-sen University), Yibin Xu (Sun Yat-sen University), Zilong He (Sun Yat-sen University)
Industry Track
- On the Scalability of HeapCheck
Rick Boivie (IBM Research), Gururaj Saileshwar (IBM Research / Georgia Tech), Tong Chen (IBM Research), Benjamin Segal (IBM Research), Alper Buyuktosunoglu (IBM Research)
- Revisiting Tendermint: Design Tradeoffs, Accountability, and Practical Use
Ethan Buchman (Informal Systems), Rachid Guerraoui (Ecole Polytechnique Fédérale de Lausanne), Jovan Komatovic (Ecole Polytechnique Fédérale de Lausanne), Zarko Milosevic (Informal Systems), Dragos-Adrian Seredinschi (Informal Systems), Josef Widder (Informal Systems)
- Long-Term Study of Honeypots in a Public Cloud
Rakshit Agrawal (Camio), Jack Stokes (Microsoft), Lukas Rist (Vivino), Ryan Littlefield (Microsoft), Xun Fan (Microsoft), Ken Hollis (Microsoft), Zane Coppedge (Microsoft), Noah Chesterman (Microsoft), Christian Seifert (Microsoft)
- An industrial perspective on web scrapers' characteristics and open issues
Elisa Chiapponi (EURECOM), Marc Dacier (KAUST), Olivier Thonnard (Amadeus IT Group), Mohamed Fangar (Amadeus IT Group), Mattias Mattsson (Amadeus IT Group), Vincent Rigal (Amadeus IT Group)
- Challenges/Opportunities to Enable Dependable Scale-out System with Groq Deterministic Tensor-Streaming Processors
Dennis Abts (Groq Inc), John Kim (Groq Inc)
- SimLane: A Risk-Orientated Benchmark for Lane Detection
Xinyang Zhang (Baidu Security), Zhisheng Hu (Baidu Security), Shengjian Guo (Baidu Security), Zhenyu Zhong (Baidu Security), Kang Li (Baidu Security)
Best of SELSE
- Towards the Integration of Reliability and Security Mechanisms to Enhance the Fault Resilience of Neural Networks
Nikolaos Deligiannis (Politecnico di Torino), Riccardo Cantoro (Politecnico di Torino), Matteo Sonza Reorda (Politecnico di Torino), Marcello Traiola (Inria Rennes / IRISA), Emanuele Valea (CEA List, Univ. Grenoble Alpes)
- Reliability of Google’s Tensor Processing Units for Convolutional Neural Networks
Rubens Luiz Rech Junior (UFRGS), Paolo Rech (Università di Trento)
- Reliability assessment of Real-time Operating System in Embedded Systems
Alberto Bosio (Lyon Institute of Nanotechnology), Maurizio Rebaudengo (Politecnico di Torino), Alessandro Savino (Politecnico di Torino)
Fast Abstracts
- Real-Time Digital Filtering for IoT Data in Programmable Network Switches
Nathaniel Nauman (Purdue University), Ruochong Wu (Purdue University), Saurabh Bagchi (Purdue University)
- Personalized cryptography algorithms – a comparison between classic and cognitive methods
Radosław Bułat (AGH University of Science and Technology), Marek Ogiela (AGH University of Science and Technology)
- Modeling Composition of Cloud Services with Complex Dependencies for Availability Assessment
Xingjian Zhang (Tsinghua University), Long Wang (Tsinghua University)
- A Policy Driven AI-Assisted PoW Framework
Trisha Chakraborty (Mississippi State University), Shaswata Mitra (Mississippi State University), Sudip Mittal (Mississippi State University), Maxwell Young (Mississippi State University)
- Effectiveness on C Flaws Checking and Removal
João Inácio (LASIGE, Faculdade de Ciências da Universidade de Lisboa), Ibéria Medeiros (LASIGE, Faculdade de Ciências da Universidade de Lisboa)
- Towards Fuzzing Target Lines
Nuno Neves (LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal)
- Formal Foundations for SCONE Attestation
Muhammad Usama Sardar (Technische Universität Dresden), Christof Fetzer (Technische Universität Dresden)
Doctoral Forum
- Predictive Resilience Modeling
Priscila D Silva (University of Massachusetts Dartmouth)
- CSAI-4-CPS: A Cyber Security characterization model based on Artificial Intelligence For Cyber Physical Systems
Hebert de Oliveira Silva (University of Campinas - UNICAMP)
- Understanding Trust Assumptions for Attestation in Confidential Computing
Muhammad Usama Sardar (Technische Universitat Dresden)