DSN-2025: Accepted Papers
- Research Track
- Industry Track
- Disrupt 25
- Doctoral Forum
- Poster
Research Track
- Tracking and Transparency Mechanisms in the HbbTV Ecosystem
Christian Böttger (Institute for Internet Security, Westphalian University of Applied Sciences); Henry Hosseini (University of Münster; Institute for Internet Security, Westphalian University of Applied Sciences); Christine Utz (Radboud University); Nurullah Demir (Institute for Internet Security, Westphalian University of Applied Sciences); Jan Hörnemann (AWARE7 GmbH); Christian Wressnegger (Karlsruhe Institute of Technology); Thomas Hupperich (University of Münster); Norbert Pohlmann (Institute for Internet Security, Westphalian University of Applied Sciences); Matteo Große-Kampmann (Rhine-Waal University of Applied Sciences); Tobias Urban (Institute for Internet Security, Westphalian University of Applied Sciences)
- Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory
Konstantinos Kanellopoulos (ETH Zürich); Nisa Bostanci, Ataberk Olgun, Giray Yaglikci, Ismail Emir Yuksel, Nika Mansouri Ghiasi (ETH Zurich); Zülal Bingöl (Bilkent University); Mohammad Sadrosadati (ETH Zürich); Onur Mutlu (ETH Zurich)
- GTV: Generating Tabular Data via Vertical Federated Learning
Zilong Zhao (National University of Singapore); Han Wu (University of Southampton); Aad Van Moorsel (University of Birmingham); Lydia Chen (TU Delft)
- BASSET: Enhancing Binary Code Clone Searching through Multi-Level Hybrid Semantic Indexing
Yong Zhao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Ang Xia (State Grid Corporation of China Information and Communication Branch); Jie Yin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhi Wang (Zhongguancun Laboratory, Beijing, China); Yaqin Cao, Xiangyi Zeng, Yuling Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
- LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection
Ke He (University of Canterbury); Dan Dongseong Kim (The University of Queensland); Muhammad Rizwan Asghar (University of Surrey)
- VerifyVFL: Practical Verifiable Vertical Federated Learning
Junchen Hou, Lan Zhang (University of Science and Technology of China)
- Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches
Md Rashedul Hasan (University of Nebraska-Lincoln); Mohannad Alhanahnah (University of Wisconsin-Madison); Clay Stevens (Iowa State University); Hamid Bagheri (University of Nebraska-Lincoln)
- PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script Generation
Yuanda Wang, Xinhui Han (Peking University)
- 5G-STREAM: 5G Service Mesh Tailored for Reliable, Efficient and Authorized Microservices in the Cloud
Tolga Atalay, Alireza Famili, Sudip Maitra (Virginia Tech); Dragoslav Stojadinovic (Kryptowire LLC); Angelos Stavrou, Haining Wang (Virginia Tech)
- A Human Study of Automatically Generated Decompiler Annotations
Yuwei Yang, Skyler Grandel (Vanderbilt University); Jeremy Lacomis, Edward Schwartz, Bogdan Vasilescu, Claire Le Goues (Carnegie Mellon University); Kevin Leach (Vanderbilt University)
- ammBoost: State Growth Control for AMMs
Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh (University of Connecticut)
- ReCraft: Split, Merge, and Membership Change of Raft Protocol
Kezhi Xiong (Northeastern University); Soonwon Moon (Inha University); Joshua Kang, Bryant Curto (Northeastern University); Jieung Kim (Yonsei University); Ji-Yong Shin (Northeastern University)
- Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation
Hao Tian (South China University of Technology); Hao-Tian Wu (Guangzhou University); Yiu-ming Cheung (Hong Kong Baptist University); Junhui He (South China University of Technology); Zhihong Tian (Guangzhou University)
- Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit
Lorenzo Cazzaro, Stefano Calzavara, Maksim Kovalkov (Università Ca' Foscari Venezia); Aleksei Stafeev, Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
- ICSTRACKER: Backtracking Intrusions in Modern Industrial Control Systems
Md Raihan Ahmed, Jainta Paul, Levi Taiji Li (University of Utah); Luis Garcia (University of Utah Kahlert School of Computing); Mu Zhang (University of Utah)
- GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses
Pierrick Philippe (University of Rennes, CNRS, IRISA); Mohamed Sabt, Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)
- PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes
Pasquale De Rosa, Simon Queyrut (University of Neuchâtel, Switzerland); Yérom-David Bromberg (University of Rennes, INRIA, France); Pascal Felber, Valerio Schiavoni (University of Neuchâtel, Switzerland)
- GREAT Global Representation and Edge-Attention for Hardware Trojan Detection
Zhengyi Li (Xiangtan University); Wei Cheng (National University of Defense Technology); Huanrong Tang (Xiangtan University); Yaohua Wang (National University of Defense Technology)
- IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics
Hong-Wei Li (Research Center for Information Technology Innovation, Academia Sinica); Ping-Ting Liu, Bo-Wei Lin (Department of Computer Science, National Yang Ming Chiao Tung University); Yennun Huang (Research Center for Information Technology Innovation, Academia Sinica)
- Towards Runtime Integrity Attestation and Its Challenges in Practice: A Case Study of Keylime
Margie Ruffin, Chenkai Wang (University of Illinois Urbana-Champaign); Gheorghe Almasi, Abdulhamid Adebayo, Hubertus Franke (IBM Research); Gang Wang (University of Illinois Urbana-Champaign)
- Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers
Qihang Peng (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Deliang Chang (QI-ANXIN Technology Research Institute); Jia Zhang (Tsinghua University; Zhongguancun Laboratory); Baojun Liu (Tsinghua University); Haixin Duan (Tsinghua University; Zhongguancun Laboratory; QI-ANXIN Technology Research Institute)
- ConfBench: A Tool for Easy Evaluation of Confidential Virtual Machines
Andrea De Murtas (Sapienza University of Rome, Italy and University of Neuchâtel, Switzerland); Daniele Cono D'Elia, Giuseppe Antonio Di Luna (Sapienza University of Rome, Italy); Pascal Felber (University of Neuchatel, Switzerland); Leonardo Querzoni (Sapienza University of Rome, Italy); Valerio Schiavoni (University of Neuchâtel, Switzerland)
- SOUNDBOOST: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel
Haoran Wang, Zheng Yang (Georgia Institute of Technology); Sangdon Park (Pohang University of Science and Technology); Yibin Yang (Georgia Institute of Technology); Seulbae Kim (Pohang University of Science and Technology); Willian Lunardi, Martin Andreoni (Technology Innovation Institute); Taesoo Kim, Wenke Lee (Georgia Institute of Technology)
- Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement
Hanwen Feng (The University of Sydney); Zhenliang Lu (Nanyang Technological University); Tiancheng Mai, Qiang Tang (The University of Sydney)
- LiveGuard: Voice Liveness Detection via Wavelet Scattering Transform and Mel Spectrogram Scaling
Liqun Shan, Xingli Zhang, Md Imran Hossen, Xiali Hei (University of Louisiana at Lafayette)
- EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM Techniques
Oğuzhan Canpolat (TOBB ETÜ and ETH Zurich); Ataberk Olgun (ETH Zurich); David Novo (LIRMM, Univ Montpellier, CNRS); Oguz Ergin (University of Sharjah and TOBB ETÜ); Onur Mutlu (ETH Zurich)
- What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software
Jialiang Dong, Xinzhang Chen (The University of New South Wales); Willy Susilo (University of Wollongong); Nan Sun (The University of New South Wales); Arash Shaghaghi (The University of New South Wales (UNSW Sydney)); Siqi Ma (The University of New South Wales)
- Attack-Defense Trees with Offensive and Defensive Attributes
Danut-Valentin Copae, Reza Soltani, Milan Lopuhaä-Zwakenberg (University of Twente)
- An Analysis of Malicious Packages in Open-Source Software in the Wild
Xiaoyan Zhou (Beijing JiaoTong University); Ying Zhang, Wenjia Niu, Jiqiang Liu (Beijing Jiaotong University); Haining Wang (Virginia Tech); Qiang Li (Beijing Jiaotong University)
- ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers
Minli Julie Liao (University of Cambridge); Sam Ainsworth (University of Edinburgh); Lev Mukhanov (Queen Mary University London); Adrian Barredo (Barcelona Supercomputing Center); Markos Kynigos (Greek National Centre for Research and Technology) Timothy Jones (University of Cambridge)
- Detecting Code Vulnerabilities using LLMs
Yinghao Zhang, Djimon Jayasundera, Larry Huynh (The University of Western Australia); Woojin Jeon, Hyoungshick Kim (Sungkyunkwan University); Tingting Bi, Jin B. Hong (The University of Western Australia)
- Privacy Analysis of Oblivious DNS over HTTPS: a Website Fingerprinting Study
Mohammad Amir Salari (Saint Louis University); Abhinav Kumar (University of Massachusetts Amherst); Federico Rinaudi (Politecnico Di Torino); Reza Tourani (Saint Louis University); Alessio Sacco (Politecnico Di Torino); Flavio Esposito (Saint Louis University)
- Securing In-Network Traffic Control Systems with P4Auth
Ranjitha K, Medha Rachel Panna, Stavan Nilesh Christian, Karuturi Havya Sree, Sri Hari Malla, Dheekshitha Bheemanath (Indian Institute of Technology Hyderabad); Rinku Shah (Indraprastha Institute of Information Technology Delhi); Praveen Tammana (Indian Institute of Technology Hyderabad)
- MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers
Mert D. Pesé, Bulut Gozubuyuk (Clemson University); Eric Andrechek (University of Michigan); Habeeb Olufowobi (University of Texas at Arlington); Mohammad Hamad (Technical University of Munich); Kang G. Shin (University of Michigan)
- SemiAF: Semi-Supervised App Fingerprinting on Unknown Traffic via Graph Neural Network
Lei Xiaodong, Yongjun Wang, Lin Liu, Junjie Huang, Jiangyong Shi, Luming Yang (National University of Defense and Technology)
- MalTAG: Encrypted Malware Traffic Detection Framework via Graph Based Flow Interaction Mining
Renjie Li (University of Chinese Academy of Sciences, Institute of Information Engineering, Chinese Academy of Sciences); Zhou Zhou (Institute of Information Engineering, Chinese Academy of Sciences); Hao Miao, Fengyuan Shi (University of Chinese Academy of Sciences, Institute of Information Engineering, Chinese Academy of Sciences); Qingyun Liu (Institute of Information Engineering, Chinese Academy of Sciences)
- Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks
Nikhilesh Singh (Technische Universität Darmstadt); Chester Rebeiro (IIT Madras)
- KubeFence: Security Hardening of the Kubernetes Attack Surface
Carmine Cesarano, Roberto Natella (University of Naples Federico II)
- Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture
Suman Kumar, Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy (Drexel University)
- QUIC-Aware Load Balancing: Attacks and Mitigations
Liliana Kistenmacher, Anum Talpur, Mathias Fischer (Universität Hamburg)
- RAVAGE: Robotic Autonomous Vehicles’ Attack Generation Engine
Pritam Dash, Karthik Pattabiraman (University of British Columbia)
- Prompting the Unseen: Detecting Hidden Backdoors in Black-Box Models
Zixuan Huang, Jia-Wei Chen, Zhipeng Zhang, Chia-Mu Yu (National Yang Ming Chiao Tung University)
- MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution
Moein Ghaniyoun (The Ohio State University); Kristin Barber (Google); Yinqian Zhang (Southern University of Science and Technology); Radu Teodorescu (The Ohio State University)
- Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains
Yuqi Liu, Rui Xi, Karthik Pattabiraman (University of British Columbia)
- On Security Vulnerabilities in Transportation IoT Devices
Jason Yih (University of Maryland, College Park); Katerina Goseva-Popstojanova (West Virginia University); Michel Cukier (University of Maryland, College Park)
- Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System
Cheng Chen (Louisiana State University); Grant Xiao (University of Virginia); Daehyun Lee, Lishan Yang (George Mason University); Evgenia Smirni (William & Mary); Homa Alemzadeh (University of Virginia); Xugui Zhou (Louisiana State University)
- Secure access to network data for mobile network traffic analysis applications
Djob Mvondo, Yérom-David Bromberg (Univ Rennes, CNRS, INRIA, IRISA)
- Zero-Interference Containers: A Framework to Orchestrate Mixed-Criticality Applications
Daniele Ottaviano (Technical University of Munich); Marco Barletta, Francesco Boccola (University of Naples Federico II, Italy)
- Mitigating Reordering Attacks through Fair and Resilient Transaction Dissemination
Wassim Yahyaoui (SnT, University of Luxembourg); Joachim Bruneau-Queyreix (Université de Bordeaux); Jérémie Decouchant (TU Delft); Marcus Völp (SnT, University of Luxembourg)
- A Closer Look At Modern Evasive Phishing Emails
Elyssa Boulila (Amadeus); Simone Aonzo (EURECOM); Marc Dacier (KAUST); Siva Prem Vengadessa Peroumal, Nicolas Veys (Amadeus)
- Towards Automated and Explainable Threat Hunting with Generative AI
Moumita Das Purba, Bei-Tseng Chu, Will French (University of North Carolina at Charlotte)
- ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation
Carlos Nkuba Kayembe, Jimin Kang, Seunghoon Woo, Heejo Lee (Korea University)
- ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data
Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan (The University of British Columbia)
- "I will always be by your side": A Side-channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles
Muneeba Asif, Jean C Tonday Rodriguez, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Kemal Akkaya (Florida International University)
- Multi-version Machine Learning and Rejuvenation for Resilient Perception in Safety-critical Systems
Qiang Wen (University of Tsukuba); Júlio Mendonça (University of Luxembourg); Fumio Machida (University of Tsukuba); Marcus Völp (University of Luxembourg)
- Automatically Generating Rules of Malicious Software Packages via Large Language Model
XiangRui Zhang, XueJie Du, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li (Beijing Jiaotong University)
Industry Track
- LLMPrism: Black-box Performance Diagnosis for Production LLM Training Platforms
Zhihan Jiang (The Chinese University of Hong Kong), Rui Ren (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Guangba Yu (The Chinese University of Hong Kong), Yulun Wu (The Chinese University of Hong Kong), Wenwei Gu (The Chinese University of Hong Kong), Yichen Li (The Chinese University of Hong Kong), Yujie Huang (The Chinese University of Hong Kong), Cong Feng (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Zengyin Yang (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Yongqiang Yang (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Michael R. Lyu (The Chinese University of Hong Kong)
- Anomaly Detection in Energy Performance Certificates: From Oblivious to Enlightened
Mathieu Chevalier (INSA Lyon), Nawel Benarba (INSA Lyon), Sara Bouchenak (INSA Lyon), Olivier Jung (Kardino), Benjamin Bertin (INSA Lyon)
- Beyond Component Failures: Safety Challenges in Complex Maritime Control Systems
Odd Ivar Haugen (DNV), Aleks Karlsen (DNV), Steven Mearns Cargill (DNV), Jan van Tiggelen (DNV)
- To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic Prompt
Zhilong Wang (The Pennsylvania State University), Neha Nagaraja (Northern Arizona University), Lan Zhang (Northern Arizona University), Peng Liu (The Pennsylvania State University), Pawan Patil (University of Southern California), Hayretdin Bahsi (Northern Arizona University)
- When Features Gets Exploited: Functional Abuse and the Future of Industrial Fraud Prevention
Elisa Chiapponi (Amadeus IT Group), Umberto Fontana (Amadeus IT Group, Télécom SudParis), Elyssa Boulilla (Amadeus IT Group, EURECOM), Claudio Costanza (Amadeus IT Group), Vincent Rigal (Amadeus IT Group), Olivier Thonnard (Amadeus IT Group)
- DDR5 DRAM Faults in the Field
Majed Valad Beigi (Advanced Micro Devices, Inc), Yi Cao (Google), Grace Tsai (Google), Sudhanva Gurumurthi (Advanced Micro Devices, Inc), Vilas Sridharan (Advanced Micro Devices, Inc)
- Assessing the Transferability of Adversarial Patches in Real-World Systems: Implications for Adversarial Testing of Image Recognition Security
Stephan Kleber (Mercedes-Benz Tech Innovation GmbH), Tim Palm (Ulm University), Jeremias Eppler (Mercedes-Benz Tech Innovation GmbH), Dennis Eisermann (Ulm University), Frank Kargl (Ulm University)
- Security-by-Design at the Telco Edge with OSS: Challenges and Lessons Learned
Carmine Cesarano (Università degli Studi di Napoli Federico II), Alessio Foggia (Università degli Studi di Napoli Federico II), Gianluca Roscigno (System Management S.p.A), Luca Andreani (DigitalPlatforms S.p.A), Roberto Natella (Università degli Studi di Napoli Federico II)
- Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice
Larry Huynh (University of Western Australia), Jake Hesford (University of Western Australia), Daniel Cheng (University of Western Australia), Alan Wan (University of Western Australia), Seungho Kim (Sungkyunkwan University), Hyoungshick Kim (Sungkyunkwan University), Jin Hong (University of Western Australia)
- Bridging the Safety Gap: A C-ITS Solution for Protecting Vulnerable Road Users with DSRC/C-V2X
Mario Fiorentino (SOUTH ENGINEERING SRL), Michele Caggiano (SOUTH ENGINEERING SRL), Alessandro Magliacane (SOUTH ENGINEERING SRL), Angelo Coppola (Federico II University of Naples Dept. of Civil, Building and Environmental Engineering), Andrea Marchetta (Federico II University of Naples Dept. of Civil, Building and Environmental Engineering)
- Observe and Regulate Memory Interference on MPSoC: a Practical Approach
Andrea Bastoni (TUM), Alexander Zuepke (TUM), Marco Solieri (Minerva Systems)
- Cordial: Cross-row Failure Prediction Method Based on Bank-level Error Locality for HBMs
Wenwei Gu (The Chinese University of Hong Kong), Jiazhen Gu (Huawei Hong Kong Research Center), Renyi Zhong (The Chinese University of Hong Kong), Wenyu Zhang (Huawei Hong Kong Research Center), Ming Li (Huawei Hong Kong Research Center), Michael R. Lyu (The Chinese University of Hong Kong)
- Energy-Efficient Anomaly Detection in Autonomous Vehicles Using RSNNs
Daeho Kim (Incheon National University), Eun-Kyu Lee (Incheon National University), Ji-Woo Lee (Korea Automotive Technology Institute)
- KubeChecker: Detecting Configuration Bugs in Container Orchestration
Yilin Sun (Fudan University), Dian Lv (Fudan University), Cheng Cui (Huawei Cloud Computing Technology Co., Ltd), Hui Xu (Fudan University)
- Quantitative Security Metrics: Assessment of Cyberattack Scenarios for Cyber-Physical Systems
Mike Da Silva (De Vinci Higher Education, De Vinci Research Center, Paris, France), Nga Nguyen (De Vinci Higher Education, De Vinci Research Center, Paris, France)
- Regulating Prosumer Device Security: a Key Priority in Power Grid Protection
Luigi Coppolino (University of Naples Parthenope), Roberto Nardone (University of Naples Parthenope), Alfredo Petruolo (University of Naples Parthenope), Luigi Romano (University of Naples Parthenope)
- Runtime Verification of Program Organization Units in Safe Programmable Logic Controller Systems
Hisham Unniyankal (University of Genova), Davide Ancona (University of Genova), Angelo Ferrando (University of Modena and Reggio Emilia), Fabio Parodi (Technoleader Srl), Alessandro Alessi (Technoleader Srl), Federico Bottino (COBO SpA)
- On the Feasibility of Exploiting the USB Power Line for Side-Channel Attacks against Samsung Smartphone Models
Leonardo da Costa (Samsung Research and Development Institute Brazil), Witor Oliveira (Samsung Research and Development Institute Brazil), Caio Peres (Samsung Research and Development Institute Brazil), Rene de Mello (Samsung Research and Development Institute Brazil), Jonghun Song (Samsung Electronics), Seokwon Jeong (Samsung Electronics), Hyungchul Jung (Samsung Electronics)
- IAM Role Diet: A Scalable Approach to Detecting RBAC Data Inefficiencies
Roberto Moratore (ING Bank), Eduardo Barbaro (ING Bank & TU Delft), Yury Zhauniarovich (TU Delft)
- An Open-source Implementation and Security Analysis of TriadÕs TEE Trusted Time Protocol
Matthieu Bettinger (LIRIS - INSA Lyon), Sonia Ben Mokhtar (LIRIS CNRS), Anthony Simonet-Boulogne (iExec Blockchain Tech)
- Industry Perspective on AI Infrastructure Reliability: Current Challenges, Llama 3 Training Experience, and Potential Solutions
Xun Jiao (Meta Platforms Inc), Abhinav Pandey (Meta Platforms Inc), Karthik Pattabiraman (Meta Platforms Inc and the University of British Columbia (UBC)), Fred Lin (Meta Platforms Inc)
- Hardware Telemetry at Scale: A Case Study on SSDs Endurance Monitoring in Datacenters
Olusiji Medaiyese (Meta Platforms Inc.), Fred Lin (Meta Platforms Inc.), Harish Dixit (Meta Platforms Inc.), Richa Mishra (Meta Platforms Inc.), Andrea Baglioni (Meta Platforms Inc.), Leandro Silva (Meta Platforms Inc.), Mike Elkin (Meta Platforms Inc.), Andrei Ilyashenko (Meta Platforms Inc.), Gor Safaryan (Meta Platforms Inc.), Dhankaran Singh Ajravat (Meta Platforms Inc.), Xun Jiao (Meta Platforms Inc.), Vineet Parekh (Meta Platforms Inc.)
- Integrating Testing with Runtime Verification for Mission-Critical Distributed Control Systems
Davide Ancona (Università di Genova), Stefano Avola (University of Genoa), Angelo Ferrando (University of Modena and Reggio Emilia), Pierpaolo Baglietto (University of Genova), Maurice ter Beek (CNR), Giancarlo Camera (Università di Genova), Andrea Parodi (M3S S.r.l. - Genova), Matteo Pinasco (Hitachi Rail STS Italy)
- Be My Guest: Welcoming Interoperability into IBC-Incompatible Blockchains
Michał Nazarewicz, Dhruv D. Jain (Composable Finance), Miguel Matos (IST Lisbon & INESC-ID), Blas Rodriguez (Composable Finance), Sydney Sweck (Composable Finance)
- Towards Robust Autonomous Landing Systems: Iterative Solutions and Key Lessons Learned
Sebastian Schroder (Macquarie University), Yao Deng (Macquarie University), Alice James (Macquarie University), Avishkar Seth (Macquarie University), Kye Morton (Skyy Network), Subhas Mukhopadhyay (Macquarie University), Richard Han (Macquarie University), Xi Zheng (Macquarie University)
Disrupt 25
- Assessing the Validity of LLM-Driven Hazard Analysis: An Assessor's Perspective
Michael Kevvay, Vladislav Gryaznykh (MIREA - Russian Technical University), Oleg Kirovski (SafetyConsult LLC), Anton Korolev (Russian Technical University)
- Enhancing Accuracy in Approximate Byzantine Agreement with Bayesian Inference
Roy Shadmon (United States), Owen Arden (UC Santa Cruz)
- Replicating Human Immune System via Harmonic Radar: A Framework and Preliminary Results in Thwarting Cyber-physical Attacks
Nathanaël Denis, Roberto Di Pietro (King Abdullah University of Science and Technology)
- Digital Cluster Circuits for Reliable Datacenters
Davide Rovelli, Patrick Eugster (Università della Svizzera Italiana - USI)
- Trusted Federated Learning: Towards a Partial Zero-Knowledge Proof Approach
Yannis Formery, Leo Mendiboure, Jonathan Villain, Virginie Deniau, Christophe Gransart (COSYS-ERENA/Leost, Université Gustave Eiffel), Stephane Delbruel (Université de Bordeaux)
- UniPHY: Unified Physical Layer Security for LPWANs
Stephane Delbruel (LaBRI - Univ. of Bordeaux), Léo Mendiboure, Yannis Formery (Univ. Gustave Eiffel), Joachim Bruneau-Queyreix, Laurent Réveillère (LaBRI - Univ. of Bordeaux)
- Rethinking BFT: Leveraging Diverse Software Components with LLMs
João Imperadeiro, Ana Nunes Alonso (INESC TEC & University of Minho), José Orlando (University of Minho & INESC TEC)
Doctoral Forum
- Strategies to Describe and Timely Detect Attacks
Tommaso Puccetti (Department of Mathematics and Informatics, University of Florence)
- Effect of Human-Selected Hard Examples to Improve Accuracy of Semantic Segmentation
Yuriko Ueda, Marin Wada, Miho Adachi, Ryusuke Miyamoto (Meiji University)
- Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure
Paul Robert Balthazar Houssel, Sylvie Laniepce (Orange Innovation), Olivier Levillain (Institut Polytechnique de Paris)
- Leaving No Blind Spots: Toward Automotive Cybersecurity
Francesco Marchiori, Mauro Conti (University of Padova)
- Enhanced Cybersecurity Monitoring in Multi-Plant Flexible Manufacturing Environments
Antonio Iannaccone, Roberto Nardone (University of Naples "Parthenope")
- On Predictive Modeling of Multi-Bit Upsets for Emulated Fault Injection
Trishna Rajkumar, Johnny Öberg (KTH Royal Institute of Technology)
- AI Agent-based Adaptive Task Offloading for Autonomous Drones in Dynamic Environments
Qingyang Zhang, Fumio Machida (University of Tsukuba)
- SCAMDETECT: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts
Pasquale De Rosa, Pascal Felber, Valerio Schiavoni (University of Neuchâtel)
Poster
- DeepICS: Deep Causal Relationship Modeling for Multi-Source Log-Based Anomaly Detection in Industrial Control Systems
Seong-Su Yoon, Ieck-Chae Euom, Dong-hyuk Shin (System Security Research Center Chonnam National University Gwangju, South Korea)
- Designing Scalable, Secure Systems for Atomic-Scale Physical AI: Enabling Open Science and Collaborative Data Management and Analytics
Lewis Tseng (Electrical & Computer Engineering, UMAss Lowell, USA), Yu-Tsun Shao (Mork Family Department of Chemical Engineering and Materials Science, USC, USA)
- Agree to Disagree: Revisiting the Comparison of (Multi-)Paxos and Raft
Lewis Tseng (Electrical & Computer Engineering, UMAss Lowell, USA)
- Jailbreaking Generative AI: Empowering Novices to Conduct Phishing Attacks
Rina Mishra, Gaurav Varshney, Shreya Singh (Computer Science and Engineering IIT Jammu, Jammu, India)
- Adaptive Identity Management: Unified Personalization and Privacy Protection for Web Apps
Min-Chieh Wu, Yu-Sung Wu (Institute of Computer Science and Engineering, National Yang Ming Chiao Tung University, Hsinchu, Taiwan)
- Adaptive Cloud-Native Decoy: A Security Game-Theoretic Approach Enhanced by DDQN
Jinglei Tan, Ran Cao, Xiangfeng Wang, Weizhen He (State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou, China)
- Intrusion Detection System with Domain-incremental Continual Learning
Hyejin Kim, Seunghyun Yoon, Hyuk Lim (Korea Institute of Energy Technology - KENTECH, Korea), Dan Dongseong Kim (The University of Queensland, Australia), Jin-Hee Cho (Virginia Tech, USA), Terrence J. Moore, Frederica F. Nelson (DEVCOM Army Research Lab., USA)
- Detecting Scrapers on E-commerce Websites Using a Reduced Feature Set
Umberto Fontana, Elisa Chiapponi, Claudio Costanza, Vincent Rigal, Olivier Thonnard, Martynas Buozis (Amadeus IT Group, France), Herve Debar (Telecom SudParis, France)
- Learnable Encryption with a Diffusion Property
Ijaz Ahmad, Joongheon Kim (Korea University, Seoul, Korea), Seokjoo Shin (Chosun University, Gwangju, Korea)
- Security Vulnerability Risk Growth Model based on CVSS 4.0
Sora Okada, Masaya Shimakawa, Takashi Minohara (Takushoku University, Tokyo, Japan)
- TOSense: We Read, You Click
Xinzhang Chen, Hassan Ali, Arash Shaghaghi, Salil S. Kanhere, Sanjay Jha (School of Computer Science and Engineering, The University of New South Wales, Sydney, Australia)
- PhishingHook
Pasquale De Rosa, Simon Queyrut, Pascal Felber, Valerio Schiavoni (University of Neuchâtel, Switzerland), Yérom-David Bromberg (University of Rennes, CNRS, INRIA, IRISA, France)
- Study of Appropriate Information Combination in Image-based Obfuscated Malware Detection
Tetsuro Takahashi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka University, Hamamatsu, Japan)
- Looking for Anomalies in Cross-Chain Bridges
André Augusto, Rafael Belchior, André Vasconcelos, Miguel Correia (INESC-ID, Instituto Superior Tecnico, Universidade de Lisboa, Portugal), Jonas Pfannschmidt (Blockdaemon – Dublin, Ireland)
- Real-Time GOOSE Attack Detection in IEC 61850 Substations Using SDN-Based Traffic Inspection
Seunghyun Yoon, Hyuk Lim (Korea Institute of Energy Technology - KENTECH), Ryangsoo Kim, Hark Yoo (Electronics and Telecommunications Research Institute - ETRI)