DSN-2025: Research Track
Accepted Papers
- Research Track
Research Track
- Tracking and Transparency Mechanisms in the HbbTV Ecosystem
Christian Böttger (Institute for Internet Security, Westphalian University of Applied Sciences); Henry Hosseini (University of Münster; Institute for Internet Security, Westphalian University of Applied Sciences); Christine Utz (Radboud University); Nurullah Demir (Institute for Internet Security, Westphalian University of Applied Sciences); Jan Hörnemann (AWARE7 GmbH); Christian Wressnegger (Karlsruhe Institute of Technology); Thomas Hupperich (University of Münster); Norbert Pohlmann (Institute for Internet Security, Westphalian University of Applied Sciences); Matteo Große-Kampmann (Rhine-Waal University of Applied Sciences); Tobias Urban (Institute for Internet Security, Westphalian University of Applied Sciences)
- Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory
Konstantinos Kanellopoulos (ETH Zürich); Nisa Bostanci, Ataberk Olgun, Giray Yaglikci, Ismail Emir Yuksel, Nika Mansouri Ghiasi (ETH Zurich); Zülal Bingöl (Bilkent University); Mohammad Sadrosadati (ETH Zürich); Onur Mutlu (ETH Zurich)
- GTV: Generating Tabular Data via Vertical Federated Learning
Zilong Zhao (National University of Singapore); Han Wu (University of Southampton); Aad Van Moorsel (University of Birmingham); Lydia Chen (TU Delft)
- BASSET: Enhancing Binary Code Clone Searching through Multi-Level Hybrid Semantic Indexing
Yong Zhao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Ang Xia (State Grid Corporation of China Information and Communication Branch); Jie Yin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhi Wang (Zhongguancun Laboratory, Beijing, China); Yaqin Cao, Xiangyi Zeng, Yuling Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
- LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection
Ke He (University of Canterbury); Dan Dongseong Kim (The University of Queensland); Muhammad Rizwan Asghar (University of Surrey)
- VerifyVFL: Practical Verifiable Vertical Federated Learning
Junchen Hou, Lan Zhang (University of Science and Technology of China)
- Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches
Md Rashedul Hasan (University of Nebraska-Lincoln); Mohannad Alhanahnah (University of Wisconsin-Madison); Clay Stevens (Iowa State University); Hamid Bagheri (University of Nebraska-Lincoln)
- PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script Generation
Yuanda Wang, Xinhui Han (Peking University)
- 5G-STREAM: 5G Service Mesh Tailored for Reliable, Efficient and Authorized Microservices in the Cloud
Tolga Atalay, Alireza Famili, Sudip Maitra (Virginia Tech); Dragoslav Stojadinovic (Kryptowire LLC); Angelos Stavrou, Haining Wang (Virginia Tech)
- A Human Study of Automatically Generated Decompiler Annotations
Yuwei Yang, Skyler Grandel (Vanderbilt University); Jeremy Lacomis, Edward Schwartz, Bogdan Vasilescu, Claire Le Goues (Carnegie Mellon University); Kevin Leach (Vanderbilt University)
- ammBoost: State Growth Control for AMMs
Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh (University of Connecticut)
- ReCraft: Split, Merge, and Membership Change of Raft Protocol
Kezhi Xiong (Northeastern University); Soonwon Moon (Inha University); Joshua Kang, Bryant Curto (Northeastern University); Jieung Kim (Yonsei University); Ji-Yong Shin (Northeastern University)
- Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation
Hao Tian (South China University of Technology); Hao-Tian Wu (Guangzhou University); Yiu-ming Cheung (Hong Kong Baptist University); Junhui He (South China University of Technology); Zhihong Tian (Guangzhou University)
- Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit
Lorenzo Cazzaro, Stefano Calzavara, Maksim Kovalkov (Università Ca' Foscari Venezia); Aleksei Stafeev, Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
- ICSTRACKER: Backtracking Intrusions in Modern Industrial Control Systems
Md Raihan Ahmed, Jainta Paul, Levi Taiji Li (University of Utah); Luis Garcia (University of Utah Kahlert School of Computing); Mu Zhang (University of Utah)
- GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses
Pierrick Philippe (University of Rennes, CNRS, IRISA); Mohamed Sabt, Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)
- PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes
Pasquale De Rosa, Simon Queyrut (University of Neuchâtel, Switzerland); Yérom-David Bromberg (University of Rennes, INRIA, France); Pascal Felber, Valerio Schiavoni (University of Neuchâtel, Switzerland)
- GREAT Global Representation and Edge-Attention for Hardware Trojan Detection
Zhengyi Li (Xiangtan University); Wei Cheng (National University of Defense Technology); Huanrong Tang (Xiangtan University); Yaohua Wang (National University of Defense Technology)
- IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics
Hong-Wei Li (Research Center for Information Technology Innovation, Academia Sinica); Ping-Ting Liu, Bo-Wei Lin (Department of Computer Science, National Yang Ming Chiao Tung University); Yennun Huang (Research Center for Information Technology Innovation, Academia Sinica)
- Towards Runtime Integrity Attestation and Its Challenges in Practice: A Case Study of Keylime
Margie Ruffin, Chenkai Wang (University of Illinois Urbana-Champaign); Gheorghe Almasi, Abdulhamid Adebayo, Hubertus Franke (IBM Research); Gang Wang (University of Illinois Urbana-Champaign)
- Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers
Qihang Peng (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Deliang Chang (QI-ANXIN Technology Research Institute); Jia Zhang (Tsinghua University; Zhongguancun Laboratory); Baojun Liu (Tsinghua University); Haixin Duan (Tsinghua University; Zhongguancun Laboratory; QI-ANXIN Technology Research Institute)
- ConfBench: A Tool for Easy Evaluation of Confidential Virtual Machines
Andrea De Murtas (Sapienza University of Rome, Italy and University of Neuchâtel, Switzerland); Daniele Cono D'Elia, Giuseppe Antonio Di Luna (Sapienza University of Rome, Italy); Pascal Felber (University of Neuchatel, Switzerland); Leonardo Querzoni (Sapienza University of Rome, Italy); Valerio Schiavoni (University of Neuchâtel, Switzerland)
- SOUNDBOOST: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel
Haoran Wang, Zheng Yang (Georgia Institute of Technology); Sangdon Park (Pohang University of Science and Technology); Yibin Yang (Georgia Institute of Technology); Seulbae Kim (Pohang University of Science and Technology); Willian Lunardi, Martin Andreoni (Technology Innovation Institute); Taesoo Kim, Wenke Lee (Georgia Institute of Technology)
- Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement
Hanwen Feng (The University of Sydney); Zhenliang Lu (Nanyang Technological University); Tiancheng Mai, Qiang Tang (The University of Sydney)
- LiveGuard: Voice Liveness Detection via Wavelet Scattering Transform and Mel Spectrogram Scaling
Liqun Shan, Xingli Zhang, Md Imran Hossen, Xiali Hei (University of Louisiana at Lafayette)
- EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM Techniques
Oğuzhan Canpolat (TOBB ETÜ and ETH Zurich); Ataberk Olgun (ETH Zurich); David Novo (LIRMM, Univ Montpellier, CNRS); Oguz Ergin (University of Sharjah and TOBB ETÜ); Onur Mutlu (ETH Zurich)
- What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software
Jialiang Dong, Xinzhang Chen (The University of New South Wales); Willy Susilo (University of Wollongong); Nan Sun (The University of New South Wales); Arash Shaghaghi (The University of New South Wales (UNSW Sydney)); Siqi Ma (The University of New South Wales)
- Attack-Defense Trees with Offensive and Defensive Attributes
Danut-Valentin Copae, Reza Soltani, Milan Lopuhaä-Zwakenberg (University of Twente)
- An Analysis of Malicious Packages in Open-Source Software in the Wild
Xiaoyan Zhou (Beijing JiaoTong University); Ying Zhang, Wenjia Niu, Jiqiang Liu (Beijing Jiaotong University); Haining Wang (Virginia Tech); Qiang Li (Beijing Jiaotong University)
- ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers
Minli Julie Liao (University of Cambridge); Sam Ainsworth (University of Edinburgh); Lev Mukhanov (Queen Mary University London); Adrian Barredo (Barcelona Supercomputing Center); Markos Kynigos (Greek National Centre for Research and Technology) Timothy Jones (University of Cambridge)
- Detecting Code Vulnerabilities using LLMs
Yinghao Zhang, Djimon Jayasundera, Larry Huynh (The University of Western Australia); Woojin Jeon, Hyoungshick Kim (Sungkyunkwan University); Tingting Bi, Jin B. Hong (The University of Western Australia)
- Privacy Analysis of Oblivious DNS over HTTPS: a Website Fingerprinting Study
Mohammad Amir Salari (Saint Louis University); Abhinav Kumar (University of Massachusetts Amherst); Federico Rinaudi (Politecnico Di Torino); Reza Tourani (Saint Louis University); Alessio Sacco (Politecnico Di Torino); Flavio Esposito (Saint Louis University)
- Securing In-Network Traffic Control Systems with P4Auth
Ranjitha K, Medha Rachel Panna, Stavan Nilesh Christian, Karuturi Havya Sree, Sri Hari Malla, Dheekshitha Bheemanath (Indian Institute of Technology Hyderabad); Rinku Shah (Indraprastha Institute of Information Technology Delhi); Praveen Tammana (Indian Institute of Technology Hyderabad)
- MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers
Mert D. Pesé, Bulut Gozubuyuk (Clemson University); Eric Andrechek (University of Michigan); Habeeb Olufowobi (University of Texas at Arlington); Mohammad Hamad (Technical University of Munich); Kang G. Shin (University of Michigan)
- SemiAF: Semi-Supervised App Fingerprinting on Unknown Traffic via Graph Neural Network
Lei Xiaodong, Yongjun Wang, Lin Liu, Junjie Huang, Jiangyong Shi, Luming Yang (National University of Defense and Technology)
- MalTAG: Encrypted Malware Traffic Detection via Graph Based Flow Interaction Mining
Renjie Li (University of Chinese Academy of Sciences, Institute of Information Engineering, Chinese Academy of Sciences); Zhou Zhou (Institute of Information Engineering, Chinese Academy of Sciences); Hao Miao, Fengyuan Shi (University of Chinese Academy of Sciences, Institute of Information Engineering, Chinese Academy of Sciences); Qingyun Liu (Institute of Information Engineering, Chinese Academy of Sciences)
- Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks
Nikhilesh Singh (Technische Universität Darmstadt); Chester Rebeiro (IIT Madras)
- KubeFence: Security Hardening of the Kubernetes Attack Surface
Carmine Cesarano, Roberto Natella (University of Naples Federico II)
- Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture
Suman Kumar, Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy (Drexel University)
- QUIC-Aware Load Balancing: Attacks and Mitigations
Liliana Kistenmacher, Anum Talpur, Mathias Fischer (Universität Hamburg)
- RAVAGE: Robotic Autonomous Vehicles’ Attack Generation Engine
Pritam Dash, Karthik Pattabiraman (University of British Columbia)
- Prompting the Unseen: Detecting Hidden Backdoors in Black-Box Models
Zixuan Huang, Jia-Wei Chen, Zhipeng Zhang, Chia-Mu Yu (National Yang Ming Chiao Tung University)
- MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution
Moein Ghaniyoun (The Ohio State University); Kristin Barber (Google); Yinqian Zhang (Southern University of Science and Technology); Radu Teodorescu (The Ohio State University)
- Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains
Yuqi Liu, Rui Xi, Karthik Pattabiraman (University of British Columbia)
- On Security Vulnerabilities in Transportation IoT Devices
Jason Yih (University of Maryland, College Park); Katerina Goseva-Popstojanova (West Virginia University); Michel Cukier (University of Maryland, College Park)
- Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System
Cheng Chen (Louisiana State University); Grant Xiao (University of Virginia); Daehyun Lee, Lishan Yang (George Mason University); Evgenia Smirni (William & Mary); Homa Alemzadeh (University of Virginia); Xugui Zhou (Louisiana State University)
- Secure access to network data for mobile network traffic analysis applications
Djob Mvondo, Yérom-David Bromberg (Univ Rennes, CNRS, INRIA, IRISA)
- Zero-Interference Containers: a Framework for Orchestrating Mixed-Criticality Applications
Daniele Ottaviano (Technical University of Munich); Marco Barletta, Francesco Boccola (University of Naples Federico II, Italy)
- Mitigating Reordering Attacks through Fair and Resilient Transaction Dissemination
Wassim Yahyaoui (SnT, University of Luxembourg); Joachim Bruneau-Queyreix (Université de Bordeaux); Jérémie Decouchant (TU Delft); Marcus Völp (SnT, University of Luxembourg)
- A Closer Look At Modern Evasive Phishing Emails
Elyssa Boulila (Amadeus); Simone Aonzo (EURECOM); Marc Dacier (KAUST); Siva Prem Vengadessa Peroumal, Nicolas Veys (Amadeus)
- Towards Automated and Explainable Threat Hunting with Generative AI
Moumita Das Purba, Bei-Tseng Chu, Will French (University of North Carolina at Charlotte)
- ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation
Carlos Nkuba Kayembe, Jimin Kang, Seunghoon Woo, Heejo Lee (Korea University)
- ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data
Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan (The University of British Columbia)
- "I will always be by your side": A Side-channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles
Muneeba Asif, Jean C Tonday Rodriguez, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Kemal Akkaya (Florida International University)
- Multi-version Machine Learning and Rejuvenation for Resilient Perception in Safety-critical Systems
Qiang Wen (University of Tsukuba); Júlio Mendonça (University of Luxembourg); Fumio Machida (University of Tsukuba); Marcus Völp (University of Luxembourg)
- Automatically Generating Rules of Malicious Software Packages via Large Language Model
XiangRui Zhang, XueJie Du, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li (Beijing Jiaotong University)
Supported by