DSN-2024: Research Track
Accepted Papers
- Mutiny! How does Kubernetes fail, and what can we do about it?
Marco Barletta, Marcello Cinque (Università degli Studi di Napoli Federico II); Catello Di Martino (Nokia Bell Labs);
Zbigniew Kalbarczyk, Ravishankar K. Iyer (University of Illinois at Urbana-Champaign)
- Reboot-based Recovery of Unikernels at the Component Level
Takeru Wada, Hiroshi Yamada (TUAT)
- On the Correctness of Metadata-based SBOM Generation: A
Differential Analysis Approach
Sheng Yu (University of California, Riverside & Deepbits Technology Inc.); Wei Song, Xunchao Hu (Deepbits Technology
Inc.); Heng Yin (University of California, Riverside & Deepbits Technology Inc.)
- SPP: Safe Persistent Pointers for Memory Safety
Dimitrios Stavrakakis (TU Munich & The University of Edinburgh); Alexandra Panfill, MJin Nam, Pramod Bhatotia (TU
Munich)
- Byzantine Attacks Exploiting Penalties in Ethereum PoS
Ulysse Pavloff (CEA LIST, Université Paris-Saclay, France); Yackolley Amoussou-Guenou (Université Paris-Panthéon-
Assas, CRED); Sara Tucci-Piergiovanni (CEA LIST, Université Paris-Saclay, France)
- ADSynth: Synthesizing Realistic Active Directory Attack Graphs
Nhu Long Nguyen (University of Adelaide); Nick Falkner, Hung Nguyen (The University of Adelaide)
- Read Disturbance in High Bandwidth Memory: A Detailed
Experimental Study on HBM2 DRAM Chips
Ataberk Olgun, Majd Osseiran, Giray Yaglikci (ETH Zurich); Yahya Can Tuğrul (ETH Zurich, TOBB University of Economics
& Technology); Haocong Luo, Steve Rhyner (ETH Zurich); Behzad Salami (BSC and ETH); Juan Gómez Luna (ETH Zurich);
Onur Mutlu (ETH Zurich & Stanford University)
- A Fast Low-Level Error Detection Technique
Zhengyang He (University of Iowa); Hui Xu (Fudan University); Guanpeng Li (University of Iowa)
- Simultaneous Many-Row Activation in Off-the-Shelf DRAM Chips: Experimental Characterization and Analysis
Ismail Emir Yuksel (ETH Zurich); Yahya Can Tuğrul (ETH Zurich, TOBB University of Economics & Technology); Nisa
Bostanci, Geraldo Francisco de Oliveira Junior, Giray Yaglikci, Ataberk Olgun, Melina Soysal, Haocong Luo, Juan Gómez
Luna, Mohammad Sadrosadati (ETH Zurich); Onur Mutlu (ETH Zurich & Stanford University)
- Grunt Attack: Exploiting Execution Dependencies in Microservices
Xuhang Gu, Qingyang Wang, Jianshu Liu (Louisiana State University); Jinpeng Wei (University of North Carolina at
Charlotte)
- PAROLE: Profitable Arbitrage in Optimistic Rollup with ERC-721
Token Transactions
Alvi Ataur Khalil, Mohammad Ashiqur Rahman (Florida International University)
- iPrism: Characterize and Mitigate Risk by Quantifying Change in
Escape Routes
Shengkun Cui (University of Illinois at Urbana-Champaign); Saurabh Jha (IBM Research); Ziheng Chen, Zbigniew T.
Kalbarczyk, Ravishankar K. Iyer (University of Illinois at Urbana-Champaign)
- JITBULL: Securing JavaScript Runtime with a Go/No-Go policy for
JIT Engine
Jean-Baptiste Decourcelle (IRIT, Université de Toulouse, CNRS, Toulouse INP, UT3, Toulouse, France); Boris Teabe (INPTIRIT);
Daniel Hagimont (University of Toulouse, Toulouse, France)
- Privacy Leakage from Logits Attack and Its Defense in Federated
Distillation
Danyang Xiao, Diying Yang, Jialun Li, Xu Chen, Weigang Wu (Sun Yat-sen University)
- System Call Interposition Without Compromise
Adriaan Jacobs (DistriNet, KU Leuven, Belgium); Merve Gülmez (Ericsson Security Research, Sweden and DistriNet, KU
Leuven, Belgium); Alicia Andries, Stijn Volckaert (DistriNet, KU Leuven, Belgium); Alexios Voulimeneas (TU Delft)
- Protecting Confidential Virtual Machines from Hardware
Performance Counter Side Channels
Xiaoxuan Lou, Kangjie Chen, Guowen Xu (Nanyang Technological University); Han Qiu (Tsinghua University); Guo
Shangwei (Chongqing University); Tianwei Zhang (Nanyang Technological University)
- ZLB: A Blockchain to Tolerate Colluding Majorities
Alejandro Ranchal-Pedrosa (Protocol Labs); Vincent Gramoli (University of Sydney and Redbelly Network)
- ZipChannel: Cache Side-Channel Vulnerabilities in Compression
Algorithms
Marina Minkin (University of Michigan); Baris Kasikci (University of Washington and Google)
- ChainNet: A Customized Graph Neural Network Model for Loss-aware
Edge AI Service Deployment
Zifeng Niu (Imperial College London); Manuel Roveri (Politecnico di Milano); Giuliano Casale (Imperial College London)
- Goldfish: An Efficient Federated Unlearning Framework
Houzhe Wang (University of Chinese Academy of Sciences); Xiaojie Zhu (King Abdullah University of Science and
Technology); Chi Chen (Chinese Academy of Sciences); Paulo Esteves-Veríssimo (Resilient Computing and Cybersecurity
Center (RC3), CEMSE - Faculty of Computer, Electrical and Mathematical Science and Engineering, King Abdullah
University of Science and Technology)
- IPMES: A Tool for Incremental TTP Detection over the System Audit
Event Stream (Tool)
Hong-Wei Li (Research Center for Information Technology Innovation, Academia Sinica, Taiwan); Ping-Ting Liu, Bo-Wei Lin
(Department of Computer Science, National Yang Ming Chiao Tung University, Taiwan); Yi-Chun Liao (Department of
Computer Science and Information Engineering, National Taiwan University, Taiwan); Yennun Huang (Research Center for
Information Technology Innovation, Academia Sinica, Taiwan)
- Decentagram: Highly-Available Decentralized Publish/Subscribe
Systems
Haofan Zheng, Tuan Tran, Roy Shadmon, Owen Arden (UC Santa Cruz)
- Toward Evaluating Robustness of Reinforcement Learning with
Adversarial Policy
Xiang Zheng (City University of Hong Kong); Xingjun Ma (Fudan University); Shengjie Wang (Tsinghua University); Xinyu
Wang (Tencent Inc.); Chao Shen (Xi'an Jiaotong University); Cong Wang (City University of Hong Kong)
- Towards Shielding 5G Control Plane Functions
Sudip Maitra, Tolga Atalay, Angelos Stavrou, Haining Wang (Virginia Tech)
- A comprehensive study on drones resilience in the presence of
Inertial Measurement Unit faults
Anamta Khan, Naghmeh Ivaki, Henrique Madeira (CISUC, Department of Informatics Engineering, University of Coimbra,
Portugal)
- Stealthy Peers: Understanding Security and Privacy Risks of Peer-
Assisted Video Streaming
Siyuan Tang (Indiana University Bloomington); Eihal Alowaisheq (King Saud University); Xianghang Mi (University of
Science and Technology of China); Yi Chen, XiaoFeng Wang (Indiana University Bloomington); Yanzhi Dou (Independent
Researcher)
- Intrusion Tolerance for Networked Systems Through Two-Level
Feedback Control
Kim Hammar, Rolf Stadler (KTH Royal Institute of Technology)
- RABIT, a Robot Arm Bug Intervention Tool for Self-Driving Labs
Zainab Saeed Wattoo, Petal Vitis, Ruizhe Zhu, Noah Depner, Ivory Zhang, Jason Hein, Arpan Gujarati, Margo Seltzer
(University of British Columbia, Vancouver)
- Owl: Differential-based Side-Channel Leakage Detection for CUDA
Applications
Yu Zhao, Wenjie Xue (Huazhong University of Science and Technology); Weijie Chen (School of Cyber Science and
Engineering, Huazhong University of Science and Technology (HUST)); Weizhong Qiang, Deqing Zou, Hai Jin (Huazhong
University of Science and Technology)
- AOAB: Optimal and Fair Ordering of Financial Transactions
Vincent Gramoli (University of Sydney and Redbelly Network); Zhenliang Lu (University of Sydney); Qiang Tang (The
University of Sydney); Pouriya Zarbafian (University of Sydney)
- BFTRAND: Low-latency Random Number Provider for BFT Smart
Contracts
Jinghui Liao (Southern University of Science and Technology and Wayne State University); Borui Gong (Southern
University of Science and Technology and The Hong Kong Polytechnic University); Wenhai Sun (Purdue University, West
Lafayette, USA); Fengwei Zhang (Southern University of Science and Technology (SUSTech)); Zhenyu Ning (Hunan
University); Man Ho Allen Au (Hong Kong Polytechnic University); Weisong Shi (University of Delaware)
- Verifying Randomized Consensus Protocols with Common Coins
Song Gao, Bohua Zhan, Zhilin Wu, Lijun Zhang (Institute of Software, Chinese Academy of Sciences)
- Real Time Intrusion Detection and Flow Control with Neural Network
in Kernel using eBPF
Junyu Zhang, Pengfei Chen, Zilong He, Hongyang Chen, Xiaoyun Li (School of Computer Science and Engineering, Sun
Yat-sen University)
- PagPassGPT: Pattern Guided Password Guessing via Generative
Pretrained Transformer
Xingyu Su (University of Chinese Academy of Sciences); Xiaojie Zhu (King Abdullah University of Science and
Technology); Yang Li (University of Chinese Academy of Sciences); Yong Li (Institute of Information Engineering, Chinese
Academy of Sciences); Chi Chen (University of Chinese Academy of Sciences); Paulo Esteves-Veríssimo (King Abdullah
University of Science and Technology)
- Iniva: Inclusive and Incentive-compatible Vote Aggregation
Arian Baloochestani Asl, Hanish Gogada, Leander Jehl, Hein Meling (University of Stavanger)
- Delphi: Efficient Asynchronous Approximate Agreement for
Distributed Oracles
Akhil Bandarupalli (Purdue University); Adithya Bhat (Visa Research); Saurabh Bagchi, Aniket Kate (Purdue University);
Chen-Da Liu-Zhang (Luzern University of Applied Sciences and Arts); Michael K. Reiter (Duke University)
- Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFT
Isaac Doidge, Raghavendra Ramesh, Nibesh Shrestha, Joshua Tobkin (Supra Research)
- SyRep: Efficient Synthesis and Repair of Fast Re-Route Forwarding
Tables for Resilient Networks
Csaba Györgyi (University of Vienna); Kim Larsen (Aalborg University); Stefan Schmid (TU Berlin); Jiri Srba (Aalborg
University, Denmark)
- FIRMRES: Exposing Broken Device-Cloud Access Control in IoT
Through Static Firmware Analysis
Yuting Xiao (Hunan University); Jiongyi Chen (National University of Defense Technology); Yupeng Hu, Jing Huang (Hunan
University)
- ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name
Abuse
Mingxuan Liu (Zhongguancun Laboratory); Zhenglong Jin (Tsinghua University); Jiahai Yang (Fuzhou University); Baojun
Liu, Haixin Duan, Ying Liu (Tsinghua University); Ximeng Liu (Fuzhou University); Shujun Tang (QI-ANXIN Technology
Research Institute)
- SEDSpec: Securing Emulated Devices by Enforcing Execution
Specification
Yang Chen (nstitute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of
Chinese Academy of Sciences.); Shengzhi Zhang (Department of Computer Science, Metropolitan College, Boston
University, USA); Qihang Zhou (Institute of Information Engineering, Chinese Academy of Sciences.); Xiaoqi Jia (Institute
of Information Engineering,Chinese Academy of Sciences); Heqing Huang (Institute of Information Engineering, Chinese
Academy of Sciences); Shaowen Xu (Institute of Information Engineering, Chinese Academy of Sciences. School of Cyber Security, University of Chinese Academy of Sciences.); Haichao Du (Institute of Information Engineering, Chinese
Academy of Sciences.)
- OffRAMPS: An FPGA-based Intermediary for Analysis and
Modification of Additive Manufacturing Control Systems
Jason Blocklove, Md Raz, Prithwish Basu Roy (NYU Tandon School of Engineering); Hammond Pearce (University of New
South Wales); Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri (NYU Tandon School of Engineering)