HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations [teaser video]
Kaiwen Shen (Tsinghua University), JianYu Lu (Qi An Xin Group Corp.), Yaru Yang (Tsinghua University), Jianjun Chen (Tsinghua University), Mingming Zhang (Tsinghua University), Haixin Duan (Tsinghua University; Qi An Xin Group Corp.), Jia Zhang (Tsinghua University), Xiaofeng Zheng (Tsinghua University; Qi An Xin Group Corp.)
Treaty: Secure Distributed Transactions [teaser video] [full video]
Dimitra Giantsidi (The University of Edinburgh), Maurice Bailleu (The University of Edinburgh, UK), Natacha Crooks (UC Berkeley), Pramod Bhatotia (TU Munich)
CAROL: Confidence-Aware Resilience Model for Edge Federations [teaser video]
Shreshth Tuli (Imperial College London), Giuliano Casale (Imperial College London), Nicholas R. Jennings (Loughborough University)
(*) CYCLE: Sustainable Off-Chain Payment Channel Network with Asynchronous Rebalancing [teaser video] (*) this paper will not be presented at the conference
Zicong Hong (The Hong Kong Polytechnic University), Song Guo (The Hong Kong Polytechnic University), Rui Zhang (The Hong Kong Polytechnic University), Peng Li (The University of Aizu), Yufeng Zhan (Beijing Institute of Technology), Wuhui Chen (Sun Yat-sen University)
Marlin: Two-Phase BFT with Linearity [teaser video]
Sisi Duan (Tsinghua University), Xiao Sui (Shandong University), Haibin Zhang (independent)
ZugChain: Blockchain-Based Juridical Data Recording in Railway Systems [teaser video] [full video]
Signe Rüsch (TU Braunschweig, Germany), Kai Bleeke (TU Braunschweig, Germany), Ines Messadi (TU Braunschweig, Germany), Stefan Schmidt (TU Braunschweig, Germany), Andreas Krampf (Siemens Mobility), Katharina Olze (Siemens Mobility), Susanne Stahnke (Siemens), Robert Schmid (Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany), Lukas Pirl (Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany), Roland Kittel (Deutsche Bahn), Andreas Polze (Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany), Marquart Franz (Siemens), Matthias Müller (Siemens Mobility), Leander Jehl (University of Stavanger), Ruediger Kapitza (TU Braunschweig, Germany)
Strategic Safety-Critical Attacks against an Advanced Driver Assistance System [teaser video] [full video]
Xugui Zhou (University of Virginia), Anna Schmedding (William & Mary), Haotian Ren (University of Virginia), Lishan Yang (William & Mary), Philip Schowitz (William & Mary), Evgenia Smirni (William & Mary), Homa Alemzadeh (University of Virginia)
Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems
Saurabh Jha (UIUC/IBM), Shengkun Cui (University of Illinois Urbana-Champaign), Timothy Tsai (NVIDIA), Siva Kumar Sastry Hari (NVIDIA), Michael Sullivan (NVIDIA), Zbigniew Kalbarczyk (University of Illinois at Urbana-Champaign), Stephen W. Keckler (NVIDIA), Ravishankar K. Iyer (University of Illinois at Urbana-Champaign)
Arming IDS Researchers with a Robotic Arm Dataset [teaser video] [full video]
Arpan Gujarati (University of British Columbia), Zainab Saeed Wattoo (University of British Columbia), Maryam Aliabadi (University of British Columbia), Sean Clark (University of British Columbia), Xiaoman Liu (University of British Columbia), Parisa Shiri (University of British Columbia), Amee Trivedi (University of British Columbia), Ruizhe Zhu (University of British Columbia), Jason Hein (University of British Columbia), Margo Seltzer (University of British Columbia)
STBPU: A Reasonably Secure Branch Prediction Unit [teaser video]
Tao Zhang (William and Mary), Timothy Lesch (William & Mary), Kenneth Koltermann (William and Mary), Dmitry Evtyushkin (William & Mary)
COMET: On-die and In-controller Collaborative Memory ECC Technique for Safer and Stronger Correction of DRAM Errors [teaser video]
Irina Alam (UCLA), Puneet Gupta (UCLA)
QuFI: a Quantum Fault Injector to Measure the Reliability of Qubits and Quantum Circuits [teaser video]
Daniel Oliveira (UFPR), Edoardo Giusto (Politecnico di Torino), Emanuele Dri (Politecnico di Torino), Nadir Casciola (Politecnico di Torino), Betis Baheri (Kent State University), Qiang Guan (Kent State University), Bartolomeo Montrucchio (Politecnico di Torino), Paolo Rech (Politecnico di Torino)
SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector
Zhiquan Tang (Hunan University), Wenxin Kuang (Hunan University), Qiao Hu (Hunan University), Jiongyi Chen (National University of Defense Technology), Yupeng Hu (Hunan University)
The Fault in Our Data Stars: Studying Mitigation Techniques against Faulty Training Data in Machine Learning Applications [teaser video]
Abraham Chan (University of British Columbia), Arpan Gujarati (The University of British Columbia), Karthik Pattabiraman (University of British Columbia), Sathish Gopalakrishnan (The University of British Columbia)
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs [teaser video]
Jerome Dinal Herath (State University of New York at Binghamton), Priti Prabhakar Wakodikar (State University of New York at Binghamton), Ping Yang (State University of New York at Binghamton), Guanhua Yan (Binghamton University, State University of New York)
ComFASE: A Tool for Evaluating the Effects of V2V Communication Faults and Attacks on Automated Vehicles [teaser video]
Mateen Malik (RISE Research Institutes of Sweden), Mehdi Maleki (RISE Research Institutes of Sweden), Peter Folkesson (RISE Research Institutes of Sweden), Behrooz Sangchoolie (RISE Research Institutes of Sweden), Johan Karlsson (Chalmers University of Technology)
A Comprehensive, Longitudinal Study of Government DNS Deployment at Global Scale [teaser video] [full video]
Rebekah Houser (University of Delaware), Shuai Hao (Old Dominion University), Chase Cotton (University of Delaware), Haining Wang (Virginia Tech)
GoldenEye: A Platform for Evaluating Emerging Data Formats in DNN Accelerators [teaser video]
Abdulrahman Mahmoud (Harvard University), Thierry Tambe (Harvard University), Tarek Aloui (Harvard University), David Brooks (Harvard), Gu-Yeon Wei (Harvard University, Samsung Electronics)
On the Price of Locality in Static Fast Rerouting [teaser video]
Klaus-Tycho Foerster (TU Dortmund), Juho Hirvonen (Aalto University), Yvonne-Anne Pignolet (DFINITY), Stefan Schmid (University of Vienna & TU Berlin), Gilles Tredan (LAAS-CNRS)
BLAP: Bluetooth Link key extraction And Page blocking attacks
ChangSeok Koh (Korea University), Jonghoon Kwon (ETH Zurich), Junbeom Hur (Korea University)
The Hazard Value: A Quantitative Network Connectivity Measure Accounting for Failures
Pieter J. L. Cuijpers (Eindhoven University of Technology & Aalborg University, Denmark), Stefan Schmid (University of Vienna & TU Berlin), Nicolas Schnepf (Aalborg University, Denmark & Centre INRIA Nancy Grand-Est, University of Lorraine, France), Jiri Srba (Aalborg University, Denmark)
PassFlow: Guessing Passwords with Generative Flows
Giulio Pagnotta (Sapienza University of Rome), Dorjan Hitaj (Sapienza University of Rome), Fabio De Gaspari (Sapienza University of Rome), Luigi Mancini (Sapienza University of Rome)
(*) Active-MTSAD: Multivariate Time Series Anomaly Detection With Active Learning (*) this paper will not be presented at the conference
Wenlu Wang (Sun Yat-sen University), Pengfei Chen (Sun Yat-sen University), Yibin Xu (Sun Yat-sen University), Zilong He (Sun Yat-sen University)
(*) Predicting DRAM-Caused Node Unavailability in Hyper-Scale Clouds [teaser video] (*) this paper will not be presented at the conference
Pengcheng Zhang (Shanghai Jiao Tong University), Yunong Wang (Alibaba Group), Xuhua Ma (Alibaba Group), Yaoheng Xu (Shanghai Jiao Tong University), Bin Yao (Shanghai Jiao Tong University), Xudong Zheng (Alibaba Group), Linquan Jiang (Alibaba Group)
Tool: An Efficient and Flexible Simulator for Byzantine Fault-Tolerant Protocols [teaser video] [full video]
Ping-Lun Wang (National Taiwan University), Tzu-Wei Chao (nan), Chia-Chien Wu (National Taiwan University), Hsu-Chun Hsiao (National Taiwan University)
Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts [teaser video]
Huajun Chai (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China. School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China.), Lingyun Ying (QI-ANXIN Technology Research Institute), Haixin Duan (BNRist & Institute for Network Science and Cyberspace, Tsinghua University. Tsinghua University-QI-ANXIN Group JCNS), Daren Zha (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
Exploiting monotonicity and symmetry for efficient simulation of highly dependable systems [teaser video]
Hoang Hai Nguyen (University of Illinois at Urbana-Champaign), Kartik Palani (University of Illinois at Urbana Champaign), David Nicol (University of Illinois at Urbana-Champaign)
RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs [teaser video]
Chang Liu (Institute of Information Engineering, Chinese Academy of Sciences), Yanwei Liu (Institute of Information Engineering, Chinese Academy of Sciences), Zhen Xu (Institute of Information Engineering, Chinese Academy of Sciences), Liang Dai (Institute of Information Engineering, Chinese Academy of Sciences)
Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows [teaser video] [full video]
Dinh Nguyen Dao (Inha University), Rhongho Jang (Wayne State University), Changhun Jung (Inha University), David Mohaisen (University of Central Florida), DaeHun Nyang (Ewha Womens University)
L2Fuzz: Discovering Bluetooth L2CAP Vulnerabilities Using Stateful Fuzz Testing [teaser video] [full video]
Haram Park (Korea University), Carlos Nkuba Kayembe (Korea University), Seunghoon Woo (Korea University), Heejo Lee (Korea University)
NEC: Speaker Selective Cancellation via Neural Enhanced Ultrasound Shadowing [teaser video]
Hanqing Guo (Michigan State University), Chenning Li (Michigan State University), Lingkun Li (Michigan State University), Zhichao Cao (Michigan State University), Qiben Yan (Michigan State University), Li Xiao (Michigan State University)
(*) False Data Injection Attack Detection for Secure Distributed Demand Response in Smart Grids [teaser video] [full video](*) this paper will not be presented at the conference
Thusitha Dayaratne (Monash University), Mahsa Salehi (Monash University), Carsten Rudolph (Monash University), Ariel Liebman (Monash University)
(*) Solution Bundles of Markov Performability Models through Adaptive Cross Approximation [teaser video] (*) this paper will be presented in Session 16 due to travel delays
Leonardo Robol (University of Pisa), Giulio Masetti (ISTI-CNR Pisa), Silvano Chiaradonna (ISTI-CNR Pisa), Felicita Di Giandomenico (ISTI-CNR)
Characterizing and Mitigating Anti-patterns of Alerts in Industrial Cloud Systems
Tianyi Yang (The Chinese University of Hong Kong), Jiacheng Shen (The Chinese University of Hong Kong), Yuxin Su (Sun Yat-sen University), Xiaoxue Ren (The Chinese University of Hong Kong), Xiao Ling (Huawei Technologies), Yongqiang Yang (Huawei Technologies), Michael Lyu (The Chinese University of Hong Kong)
TORPEDO: A Fuzzing Framework for Discovering Adversarial Container Workloads [teaser video]
Kent McDonough (Virginia Tech), Xing Gao (University of Delaware), Shuai Wang (HKUST), Haining Wang (Virginia Tech)
Back to the future: N-Versioning of Microservices [teaser video]
Antonio Espinoza (Arizona State University), Riley Wood (University of Texas - Austin), Stephanie Forrest (Arizona State University), Mohit Tiwari (University of Texas - Austin)
IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors [teaser video]
Chenglong Fu (Temple University), Qiang Zeng (University of South Carolina), Haotian Chi (Temple University), Xiaojiang Du (Stevens Institute of Technology), Siva Likitha Valluru (University of South Carolina)
BFL: a Logic to Reason about Fault Trees [teaser video]
Stefano M. Nicoletti (University of Twente), Ernst Moritz Hahn (University of Twente), Marielle Stoelinga (University of Twente and Radboud University)
TimeDice: Schedulability-Preserving Priority Inversion for Mitigating Covert Timing Channels Between Real-time Partitions
Man-Ki Yoon (Yale University), Jung-Eun Kim (Syracuse University), Richard Bradford (Collins Aerospace), Zhong Shao (Yale University)
(*) ERIC: An Efficient and Practical Software Obfuscation Framework [teaser video] [full video] (*) this paper will not be presented at the conference
Alperen Bolat (TOBB University of Economics and Technology), Seyyid Hikmet Çelik (TOBB University of Economics and Technology), Ataberk Olgun (TOBB University of Economics and Technology), Oğuz Ergin (TOBB University of Economics and Technology), Marco Ottavi (University of Twente and University of Rome Tor Vergata)
Understanding the RowHammer Vulnerability Under Reduced Wordline Voltage: An Experimental Study Using Real Devices [teaser video]
Abdullah Giray Yaglikci (ETH Zurich), Haocong Luo (ETH Zurich), Ataberk Olgun (ETH Zurich), Geraldo Francisco de Oliveira Junior (ETH Zurich), Jisung Park (ETH Zurich), Minesh Patel (ETH Zurich), Hasan Hassan (ETH Zurich), Lois Orosa (ETH Zurich), Jeremie Kim (ETH Zurich), Onur Mutlu (ETH Zurich)
KINGFISHER: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications
Yiwei Zhang (Shanghai Jiao Tong University), Siqi Ma (The University of New South Wales Canberra), Juanru Li (Shanghai Jiao Tong University), Elisa Bertino (Purdue University), Dawu Gu (Shanghai Jiao Tong University)
WideLeak: How Over-the-Top Platforms Fail in Android [teaser video]
Gwendal Patat (Univ Rennes, CNRS, IRISA), Mohamed Sabt (Univ Rennes, CNRS, IRISA), Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)
Hardening In-memory Key-value Stores against ECC-uncorrectable Memory Errors [teaser video]
Tsuyoshi Shimomura (TUAT), Hiroshi Yamada (TUAT)
Background Buster: Peeking through Virtual Backgrounds in Online Video Calls [teaser video]
Mohd Sabra (University of Texas at San Antonio), Anindya Maiti (University of Oklahoma), Murtuza Jadliwala (University of Texas at San Antonio)
(*) SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services [teaser video] [full video] (*) this paper will not be presented at the conference
Ziyi Zhou (Shanghai Jiao Tong University), Xing Han (University of Electronic Science and Technology of China), Zeyuan Chen (Shanghai Jiao Tong University), Yuhong Nan (Sun Yat-sen University), Juanru Li (Shanghai Jiao Tong University), Dawu Gu (Shanghai Jiao Tong University)
(*) DisTA: System-Agnostic Dynamic Taint Tracking for Distributed Systems [teaser video] (*) this paper will not be presented at the conference
Dong Wang (Institute of Software Chinese Academy of Sciences (ISCAS)), Yu Gao (Institute of Software, Chinese Academy of Sciences), Wensheng Dou (Institute of Software Chinese Academy of Sciences), Jun Wei (Institute of Software at Chinese Academy of Sciences)
How'd Security Benefit Reverse Engineers? The Implication of Intel CET on Function Identification [teaser video]
Hyungseok Kim (The Affiliated Institute of ETRI), Junoh Lee (KAIST), Soomin Kim (KAIST), Seungil Jung (KAIST CSRC), Sang Kil Cha (KAIST)
SAINTDroid: Scalable, Automated Incompatibility Detection for Android [teaser video]
Bruno Silva (University of Nebraska - Lincoln), Clay Stevens (University of Nebraska-Lincoln), Niloofar Mansoor (University of Nebraska - Lincoln), Witawas Srisa-An (University of Nebraska -Lincoln), Tingting Yu (University of Cincinnati), Hamid Bagheri (University of Nebraska -Lincoln)
Solution Bundles of Markov Performability Models through Adaptive Cross Approximation [teaser video] (*) presentation rescheduled from Session 11
Leonardo Robol (University of Pisa), Giulio Masetti (ISTI-CNR Pisa), Silvano Chiaradonna (ISTI-CNR Pisa), Felicita Di Giandomenico (ISTI-CNR)