A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples
Qiang Zeng and Jianhai Su (University of South Carolina); Chenglong Fu and Golam Kayas (Temple University); Lannan Luo (University of South Carolina); Xiaojiang Du, Chiu Tan, and Jie Wu (Temple University)
Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Networks
Jiaqi Yan and Dong Jin (Illinois Institute of Technology); Guanhua Yan (Binghamton University, State University of New York)
ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks
Guanxiong Liu (New Jersey Institute of Technology); Issa Khalil (Qatar Computing Research Institute); Abdallah Khreishah (New Jersey Institute of Technology)
Efficient Treatment of Uncertainty in System Reliability Analysis using Importance Measures
Hananeh Aliee (Helmholtz Center, Munich); Faramarz Khosravi and Jurgen Teich (Friedrich-Alexander-Universität Erlangen-Nurnberg)
Extensions of Network Reliability Analysis
Hoang Hai Nguyen, Kartik Palani, and David M. Nicol (University of Illinois at Urbana-Champaign)
An Online Approach to Estimate Parameters of Phase-Type Distributions
Peter Buchholz, Iryna Dohndorf, and Jan Kriege (TU Dortmund)
ML-based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection
Saurabh Jha and Subho Sankar Banerjee (University of Illinois at Urbana Champaign); Timothy Tsai, Siva Kumar Sastry Hari, and Michael Sullivan (Nvidia); Zbigniew Kalbarczyk (University of Illinois at Urbana Champaign); Steve Keckler (Nvidia); Ravishankar K. Iyer (University of Illinois at Urbana Champaign)
Deep Validation: Toward Detecting Real-world Corner Cases for Deep Neural Networks
Weibin Wu and Hui Xu (Department of Computer Science and Engineering, The Chinese University of Hong Kong); Sanqiang Zhong (The Chinese University of Hong Kong); Michael R. Lyu and Irwin King (Department of Computer Science and Engineering, The Chinese University of Hong Kong)
SOTER: A Runtime Assurance Framework for Programming Safe Robotics Systems
Ankush Desai, Shromona Ghosh, and Sanjit A. Seshia (University Of California, Berkeley); Ashish Tiwari (Microsoft); Natarajan Shankar (SRI)
OneFile: A Wait-Free Persistent Transactional Memory
Pedro Ramalhete (Cisco Systems); Andreia Correia and Pascal Felber (Neuchatel University); Nachshon Cohen (EPFL)
Sparkle: Speculative Deterministic Concurrency Control for Partially Replicated Transactional Data Stores
Zhongmiao Li (Université catholique de Louvain and Instituto Superior Técnico); Paolo Romano (Instituto Superior Técnico); Peter Van Roy (Université catholique de Louvain)
White-box atomic multicast
Alexey Gotsman (IMDEA Software Institute); Anatole Lefort (Telecom SudParis); Gregory Choclker (Royal Holloway, University of London)
Efficient Fault Tolerance Through Redundant Execution on COTS Multicores
Yanyan Shen, Gernot Heiser, and Kevin Elphinstone (UNSW & Data61)
ParaMedic: Heterogeneous Parallel Error Correction
Sam Ainsworth and Timothy M. Jones (University of Cambridge)
gem5-Approxilyzer: An Open-Source Tool for Application-Level Soft Error Analysis
Radha Venkatagiri, Khalique Ahmed, Abdulrahman Mahmoud, Sasa Misailovic, Darko Marinov, Christopher W. Fletcher, and Sarita V. Adve (University of Illinois at Urbana Champaign)
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
Jiongyi Chen (The Chinese University of Hong Kong); Chaoshun Zuo (The Ohio State University); Wenrui Diao (Jinan University); Shuaike Dong (The Chinese University of Hong Kong); Qingchuan Zhao (The Ohio State University); Menghan Sun (The Chinese University of Hong Kong); Zhiqiang Lin and Yinqian Zhang (The Ohio State University); Kehuan Zhang (The Chinese University of Hong Kong)
BenchIoT: A Security Benchmark for the Internet of Things
Naif Saleh Almakhdhub (Purdue University and King Saud University); Abraham A Clements (Purdue University and Sandia National Labs); Mathias Payer (EPFL); Saurabh Bagchi (Purdue University)
Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices
K. Virgil English, Islam Obaidat, and Meera Sridhar (University of North Carolina at Charlotte)
Rigorous, Effortless and Timely Assessment of Cellular Network Changes
Ajay Mahimkar, Zihui Ge, Sanjeev Ahuja, Shomik Pathak, and Nauman Shafi (AT&T)
An Eventually Perfect Failure Detector for Arbitrary Connected Networks With ADD Channels Using Time-To-Live Values
Sergio Rajsbaum and Karla Vargas (Universidad Nacional Autonoma de Mexico)
Bonsai: Efficient Fast Failover Routing Using Small Arborescences
Klaus-Tycho Foerster (University of Vienna, Austria); Andrzej Kamisiński (AGH University of Science and Technology, Poland); Yvonne-Anne Pignolet (DFINITY, Switzerland); Stefan Schmid (University of Vienna, Austria); Gilles Tredan (LAAS-CNRS, France)
SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors
Shengye Wan and Jianhua Sun (College of William and Mary); Kun Sun (George Mason University); Ning Zhang (Washington University); Qi Li (Tsinghua University)
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions
Kuniyasu Suzaki, Yohei Hori, and Kazukuni Kobara (AIST: National Institute of Advanced Industrial Science and Technology); Mohammad Mannan (Concordia University)
Multilayer ROP Protection via Microarchitectural Units Available in Commodity Hardware
Mateus Tymburibá (CEFET-MG); Hugo Sousa and Fernando Quintão (UFMG)
Deploying Intrusion-Tolerant SCADA for the Power Grid: Practical Experience Report
Amy Babay (Spread Concepts LLC, Johns Hopkins University); John Schultz (Spread Concepts LLC); Thomas Tantillo and Samuel Beckley (Johns Hopkins University); Eamon Jordan, Kevin Ruddell, and Kevin Jordan (Resurgo LLC); Yair Amir (Johns Hopkins University, Spread Concepts LLC)
Reaching Data Confidentiality and Model Accountability on the CalTrain
Zhongshu Gu, Hani Jamjoom, Dong Su, and Heqing Huang (IBM Research); Jialong Zhang (Bytedance); Tengfei Ma (IBM Research); Dimitrios Pendarakis (IBM Cognitive Systems); Ian Molloy (IBM Research)
Tell Me More Than Just Assembly! Reversing Cyber-physical Execution Semantics of Embedded IoT Controller Software Binaries
Pengfei Sun (Rutgers University); Luis Garcia (University of California, Los Angeles); Saman Zonouz (Rutgers University)
Exploiting Latency and Error Tolerance of GPGPU Applications for an Energy-efficient DRAM
Haonan Wang and Adwait Jog (College of William & Mary)
Leveraging Transverse Reads to Correct Alignment Faults in Domain Wall Memories
Sébastien Ollivier and Donald Kline Jr. (University of Pittsburgh); Roxy Kawsher (University of South Florida); Rami Melhem (University of Pittsburgh); Sanjukta Bhanja (University of South Florida); Alex K. Jones (University of Pittsburgh)
SuDoku: Tolerating High-Rate of Transient Failures for Enabling Scalable STTRAM
Prashant J. Nair (University of British Columbia); Bahar Asgari and Moinuddin K. Qureshi (Georgia Institute of Technology)
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-side SGX
Judicael-Briand Djoko-Takougue, John R. Lange, Adam J. Lee (University of Pittsburgh)
TEE-Perf: A Profiler for Trusted Execution Environments
Maurice Bailleu (University of Edinburgh); Donald Dragoti (TU Dresden); Pramod Bhatotia (University of Edinburgh); Christof Fetzer (TU Dresden)
EPA-RIMM: Efficient Runtime Integrity Checking for Modern Server Platforms using SMM
Brian Delgado (Portland State University / Intel Corp); Tejaswini Vibhute (Intel Corp); John Fastabend and Karen Karavanic (Portland State University)
Pseudo-honeypot: Toward Efficient and Scalable Spam Sniffer (Regular Paper)
YIhe Zhang (University of Louisiana at Lafayette); Hao Zhang (Oracle Inc); Xu Yuan and Nian-Feng Tzeng (University of Louisiana at Laffayette)
Controller-Oblivious Dynamic Network Access Control in Software-Defined Networks
Steven R. Gomez, Samuel Jero, Richard Skowyra, Jason Martin, Patrick Sullivan, David Bigelow, Zachary Ellenbogen, Bryan C. Ward, Hamed Okhravi, and James W. Landry (MIT Lincoln Laboratory)
BorderPatrol: Securing BYOD using fine-grained contextual information
Onur Zungur (Boston University); Guillermo Suarez-Tangil (King's College London); Gianluca Stringhini and Manuel Egele (Boston University)
Characterizing and Understanding HPC Job Failures over The 2K-day Life of IBM BlueGene/Q System
Sheng Di, Hanqi Guo, and Eric R. Pershey (Argonne National Laboratory); Marc Snir (University of Illinois Urbana-Champaign); Franck Cappello (Argonne National Laboratory)
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS
Xinda Wang and Kun Sun (George Mason University); Archer Batcheller (Northrop Grumman); Sushil Jajodia (George Mason University)
Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers
Jeman Park, Aminollah Khormali, Manar Mohaisen, and Aziz Mohaisen (University of Central Florida)
POLaR: Per-allocation Object Layout Randomization
Jonghwan Kim, Daehee Jang, Yunjong Jeong, and Brent Byunghoon Kang (KAIST)
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
David Pouliot, Scott Griffy, and Charles V. Wright (Portland State University)
HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding
Qiang Zeng (University of South Carolina); Golam Kayas and Emil Mohammed (Temple University); Lannan Luo (University of South Carolina); Xiaojiang Du (Temple University); Junghwan Rhee (NEC Lab)
FabZK: Supporting Privacy-Preserving, Auditable Smart Contracts in Hyperledger Fabric
Hui Kang (IBM); Ting Dai (North Carolina State University); Nerla Jean-Louis and Shu Tao (IBM); Xiaohui Gu (North Carolina State University)
Fast Predictive Repair in Erasure-Coded Storage
Zhirong Shen, Xiaolu Li, and Patrick P. C. Lee (The Chinese University of Hong Kong)
SBFT: a Scalable and Decentralized Trust Infrastructure
Guy Golan Gueta (Vmware Research); Ittai Abraham (VMware Research); Shelly Grossman (TAU); Dahlia Malkhi (VMware Research); Benny Pinkas (BIU); Michael K. Reiter (UNC-Chapel Hill); Dragos-Adrian Seredinschi (EPFL); Orr Tamir (TAU); Alin Tomescu (MIT)
UChecker: Automatically Detecting PHP-Based Unrestricted File Upload Vulnerabilities
Jin Huang, Yu Li, and Junjie Zhang (Wright State University); Rui Dai (University of Cincinnati)
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
John Criswell, Jie Zhou, and Spyridoula Gravani (University of Rochester); Xiaoyu Hu (Bitfusion.io)
1dVul: Discovering 1-day Vulnerabilities through Binary Patches
Jiaqi Peng, Feng Li, Bingchang Liu, Lili Xu, Binghong Liu, Kai Chen, and Wei Huo (Institute of Information Engineering, Chinese Academy of Science)
Revisiting Client Puzzles for State Exhaustion Attacks Resilience
Mohammad A. Noureddine, Ahmed Fawaz, Amanda Hsu, Cody Guldner, Sameer Vijay, Tamer Basar, and William H. Sanders (University of Illinois at Urbana Champaign)
Robust Anomaly Detection on Unreliable Data
Zilong Zhao and Sophie Cerf (Univ. Grenoble Alpes); Robert Birke (ABB Research); Bogdan Robu (Univ. Grenoble Alpes); Sara Bouchenak and Sonia Ben Mokhtar (INSA Lyon); Lydia Y. Chen (TU Delft)
Pupillography as predictor of programmers' mental effort and cognitive overload (Practical Experience Report)
Ricardo Couceiro, Gonçalo Duarte, and Benjamim Manhanga (CISUC, University of Coimbra); Joao Durães (CISUC, Polytechnic Institute of Coimbra); João Castelhano and Catarina Duarte (ICNAS, University of Coimbra); César Teixeira (CISUC, University of Coimbra); Miguel Castelo Branco (ICNAS/CIBIT, University of Coimbra); Paulo de Carvalho and Henrique Madeira (CISUC, University of Coimbra)