DSN-2026: Accepted Papers
- Research Track
- Industry Track
- Disrupt 26
- Doctoral Forum
- Poster
Research Track
- Thinking Inside the Box: Injecting Realistic Radiation Faults in ML Accelerators
B. Coelho, M. Sadati, A. Chan, A. Hands, K. Pattabiraman, P. Rech
- LLMGuard: Multi-Agent Fault Diagnosis for Reliable Language-Model-as-a-Service
Y. Zhong, G. Yu, Y. Huang, Q. Fu, R. Ren, C. Feng, Y. Yang, M. Lyu
- Q3Fuzz: Multi-Layered Stateful Fuzzing for the QUIC-HTTP/3 Protocol Stack
I. Jafarov, C. Lee, H. Lee, S. Dietrich
- Understanding and Exploiting DNS Relaying: Harnessing Legitimate Services for DNS Attacks
R. Duan, S. Wang, D. Liu, H. Xing, L. Sun, Y. Dai, Z. Su, M. Jiang, F. Fei, M. Zhang
- PRAXIS: Integrating Program Analysis with Observability for Root-Cause Analysis
S. Cui, R. Krishna, S. Jha, R. Iyer
- Rapid Boundary Identification for Mixed Boolean-Arithmetic Obfuscation in Binary Code
Z. Feng, D. Xu
- ScaleHammer: Exploiting Temporal Asymmetry to Amplify Read Disturbance in Modern DRAM Chips
J. Wang, H. Luo, A. Olgun, I. Yuksel, A. Yaglikci, Y. Liang, N. Bostanci, M. Sadrosadati, O. Mutlu
- Psyzkaller: Learning from Historical and On-the-Fly Execution Data for Smarter OS Kernel Fuzzing
B. Liu, Y. Zhang, L. Cheng, Y. Zhang, J. Fan, X. Sun, Y. Fu, Z. Li, D. Feng
- VulLens: Enhancing Software Vulnerability Detection against Evasion Attacks
S. Sun, P. Sharma, S. Maitra, A. Stavrou, H. Wang
- LUMEN: A Systems Approach to LLM-Guided Activation of Hidden Behaviors in Malware
K. Valakuzhy, M. Wong, D. Blough, M. Ahamad, F. Monrose
- What Makes Software Bugs Escape Testing? Evidence from a Large-Scale Empirical Study
D. Cotroneo, G. De Rosa, C. Improta, B. Varriale
- Whiplash on the Grid: Emulation of a Cyber-Physical Attack Misusing Inverter-Based Resources in a Distribution Grid
A. Attar, K. Bao, O. Gehrke, K. Heussen, V. Hagenmeyer
- One Error to Rule Them All: Can a Single Bit-Flip Disrupt Fully Homomorphic Encryption?
V. Chan, M. Mazzanti, K. Swaminathan, A. Vega, E. Mocskos, R. Venkatagiri
- Demystifying Progressive Web Application Permission Systems
M. Wang, J. Huang, G. Gu
- MeshGuard: MUD-Based Network Access Control for Large-Scale Thread-Powered IoT Networks
D. George, W. Van Hoof, H. Mostafaei, S. Sciancalepore
- Beyond Corner Patches: Practical Semantics-Driven Backdoors in Federated Learning
K. Herath, J. Zhao, S. Bagchi
- Exploring the Limits of Side-Channel Protections in ML-KEM Hardware Implementations
D. Ranney, Y. Makaram, A. Ding, Y. Fei
- Large-Scale Security Analysis of Multi-Token Smart Contracts: Uncovering Hidden Flaws in Batch Transfers
A. Kasthuri, S. Meisami, L. Jiang, B. Wang, Y. Duan
- Efficient Bug Detection by Inferring Implicit API Contract of Pointer State Transition
X. Deng, Y. Ma, X. Gao, H. Sun
- Measuring Attack Observability in Cloud Telemetry Logs: A Cross-Platform Analysis
M. Dhooghe, M. Park, J. Rhee, Y. Choe, C. Kim
- SpeechShield: Latency-Efficient and Robust Timbre-Aware Voice Protection Against Speech Synthesis Deepfake Attacks
J. Liu, S. Dong, H. Li, C. Gao, K. Shin, H. Wang, Y. Ren, L. Sun
- ReSect: A Tool for Automated Analysis of Reentrancy Exploit Transactions on Blockchains
Y. Liu, R. Xi, K. Pattabiraman
- Too Open to be Secure: An Evaluation of OpenNIC DNS Services and Domains
D. Yang, X. Liang, D. Liu, G. Liu, S. Hao, X. Gao
- Bringing Your Own Privacy: Towards Measurable Privacy in Mobile Device Management and Security
S. Liu, C. Shue
- ShuttleCross: An Efficient Cross-Chain Smart Contract Invocation Framework
R. Zhang, Q. Ding, Q. Liu, S. Guan, Z. Xiao, J. Long
- LLM-Empowered Discovery of Windows APIs Exploitable for Persistent Storage in Fileless Attacks
S. Cheng, S. Meng, H. Xu, S. Hao, M. Han, Y. Jiang, W. Xu
- VulStyle: A Multi-Modal Pre-Training for Code Stylometry-Augmented Vulnerability Detection
C. Biringa, A. Abbas, V. Selvaraj, G. Kul
- Beyond Token Attention: Contiguous and Interpretable Payload Identification for Web Attacks
Y. Yang, J. Zhao, C. Pei, W. Wan, C. Long, G. Du, Y. Liu, J. Li
- Efficient Merkle-Tree Consistent Accumulator
A. Mendonca, H. Shi, T. Huynh, I. Pryvalov, A. Herzberg
- A First Look at the Security Issues in the Model Context Protocol Ecosystem
X. Li, X. Gao
- Meta-Architecture Binary Code Analysis
C. Duan, J. Wang, Q. Zeng, L. Luo
- VCAligner: Aligning Source Distribution Versions with Upstream Git Commits to Secure Supply Chain
Y. Li, N. Jiang, Q. Zhou, S. Xu, Y. Xie, X. Jia
- Accurate, Secure, and Efficient Semi-Constrained Navigation with Multiple Spatial Restrictions
M. Li, Y. Hu, Y. Qiao, Z. Zhang, L. Zhu, M. Conti
- Reentrancy Detection in the Age of LLMs
D. Ressi, A. Spanò, M. Rizzo, L. Benetollo, S. Rossi
- In-Depth Exploration of Differentially Private Quantization for Privacy-Preserving and Communication-Efficient Federated Learning
S. Huang, Z. Ye, J. Wang, Z. Zhang, J. Fu, W. Wang, S. Di, X. Yu
- Hi-Fi Flow: Real-Time High-Granularity Flow Feature Extraction for Robust Network Monitoring
S. Bi, L. Zhou, T. Wang, T. Hou
- NS-FirmID: A Neuro-Symbolic Multi-Agent Framework for Reliable Firmware Version Identification at Internet Scale
f. zhang, Z. Li, S. Xu, Z. Zhang, Y. Chen, D. Fang, L. Sun
- Bypassing Safety Alignment via API Design: A Systematic Risk Analysis of Response Prefill in LLM systems
y. li, j. hu, w. sang, l. ma, w. zhang, a. yu, q. zhou, y. su, d. nie, q. huang
- Computationally Efficient Anomaly Detection and Exclusion for Practical and Robust Federated Learning
R. Zatsarenko, D. Korobeinikov, S. Chuprov, L. Reznik
- RomeFuzz: Path-aware Directed Greybox Fuzzing via Dyna-Static Indirect Call analysis
X. Zhao, P. Feng, Y. Chao, Z. Jia, J. Ma
- From Centralized Learning to Federated Setting: Keeping Reliability on Track
J. Yan, P. de Carvalho, J. Henriques, J. Loureiro, C. Lam, H. Madeira
- SPDAgent: Leveraging LLM Agents for Context-Aware Binary Security Patch Detection via Pseudocode Diff Analysis
F. Yang, Z. Gao, X. Xiao, L. Ying, B. Yin, C. Zhang, Q. Li
- FORTIHTLC: Because a Atomic Swap Must Resist Bribery Attacks
N. Awathare
- An (m,k)-firm Elevation Policy for Weakly Hard Real-Time in Converged 5G-TSN Networks
S. Egger, R. Laidig, H. Geppert, L. Haug, J. Herrmann, F. Dürr, C. Becker
- Robust and Automated Reconfiguration of Byzantine Wide-Area Replication
R. Chotkan, B. Nasrulin, J. Pouwelse, J. Decouchant
- LymphNode: A Plug-and-Play Access Control Method for Deep Neural Networks
H. Pei, S. Liu, Z. Liu
- LaserTag: A Tool for Autonomous XAI-Guided Physical Adversarial Perturbations in Industrial Vision Pipelines
G. Sánchez, L. Wei, V. Hagenmeyer
- VulJSFormer: Learning to Detect JavaScript Vulnerabilities with Vulnerability-Relevant Graphs
K. Ren, H. He, H. Wang, W. Qiang, Y. Wu, D. Zou
- I-DETECT: In-network Deep Packet Inspection for Timed Event Correlation in Industrial Control Systems
Z. Hu, H. Lin, Y. Qu, D. Jin
- TLG: Two-stage Layer-wise Gradient Inversion Attack in Federated Learning
C. Liu, J. Wang, Y. Yuan, H. Wang
- OptiMAC: Adaptive Security Optimization for Message Authentication Code in Adversarial Environment
S. Kashani, E. Khademnia, Görkem, Y. Dong, T. Wu, S. Kim, A. Khokhar, F. Nait-Abdesselam, S. Hussain
- Ruby: Unmasking Unsafe Rust in Stripped Binaries via Machine Learning
X. Cheng, S. Park, H. Han, X. Zhang, T. Kim
- SnipleyFuzz: Enhancing Black-Box Fuzzing of IoT Devices with Shapley-Based Priority Selection
Y. Yang, F. Zou, J. Gui
- Behavior-Guided Decompilation of IoT Firmware with Autonomous LLM Agents
C. Cao
- Zero-Shot Vulnerability Detection in Low-Resource Smart Contracts Through Solidity-Only Training
M. Hu, Q. Zeng, L. Luo
- From MIRAGE to CLEAR: Component-Level Explainable Anomaly Reasoning for Autonomous Vehicle Perception Systems
D. Fernandez, P. MohajerAnsari, A. Salarpour, C. Kokenoz, B. Li, M. Pesé
- On Self-stabilizing Sharing of MulticastTransmission in Overlays
S. Sengupta, A. Mukherjee, M. Perrin
- MTFuzz: A Novel Efficacy Fuzzing Framework for Aerospace Monolithic Firmware
S. Wang, X. Xiao, G. Hu, K. Zhang, L. Yu, C. Tang, Q. Li, Y. Yin, Q. Xu
- PDLogger: Automated Logging Framework for Practical Software Development
S. Duan, Y. Xu, S. Zhang, S. Wang, Y. Duan
- Will It Break in Production? Metric-Driven Prediction of Residual Defects in Python Systems
G. De Rosa, P. Liguori
- DRIFT: Drift-Resilient Invariant-Feature Transformer for DGA Detection
C. Lee, C. Jung, S. Jeong
- RIPE-II: Retrieval In-Place Poisoning Evaluation with Indirect Injections
G. Malladi, G. Thamilarasu
- Generalizable Graph-based Reinforcement Learning Agents for Automated Cyber Defense
I. King, B. Bowman, H. Huang
- Automated Data Error Cleaning Impact on Federated Learning Utility and Fairness
J. Sudlow, B. Naline, S. Bouchenak
- AnBridge: Protecting On-Device AI with Android Virtualization Framework
G. Farina, R. Corte, A. Machiry, M. Cinque, S. Bagchi
Industry Track
- Mitigating TEE Risks in a Verifiable DEX: Diversity, Ownership Assurance, and ZK Proofs
Giovanni Mazzeo, Vladislav Kapitsyn, Kyle Habib and Faisal Mehrban
- From Security Standards to Adversary Emulation: An AI-Assisted Framework for ICS Security Assessment
Nima Faraji, Giovanni Mazzeo, Roberto Nardone, Francesco Brancati and Luigi Romano
- A Secure, Manifest-Based Framework for Delegated Privilege Promotion
Rajarshi Chowdhury and Akshay Shah
- The Anatomy of Silent Data Corruption: GPU Error Pattern Study and Modeling Guidance
Chung-Hsuan Tung, Yanxiang Huang, Nirmal Saxena, Philip Shirvani, Saurabh Hukerikar, Twinkle Jain, Abhishek Tyagi and Sanjay Gongalore
- CRISP: End-to-End Fingerprint Recognition Leveraging Hardware-Anchored Liveness Detection
Subin Ki, Kyuseung Han, Hyuk Kim, Taewook Kang, Kwang-Il Oh, Hyeonguk Jang, Sukho Lee, Jae-Jin Lee, Jaehyoung Lee, Woojoo Lee and Jinho Lee
- Event Burst Trigger: An Availability Backdoor Attack on Event-Based SNN Object Detection
Jaesun Baek, Chanwook Lee and Eun-Kyu Lee
- SecBPMN: A Collaborative LLM Framework for Insider-Resilient BPMN Workflows in Industrial Control Systems
Antonio Iannaccone, Chao Feng, Roberto Nardone and Burkhard Stiller
- AIReSim: A Discrete Event Simulator for Large-scale AI Cluster Reliability Modeling
Karthik Pattabiraman, Mihir Patel and Fred Lin
- Decentralized Root Cause Analysis for Cloud-Native Microservices: Experience with Distributed PageRank in Production
Shabbir Hussain, Hari Panjwani and Fatema Malak
- Harpocrates-in-action: Using Simulation-based Functional Test Programs to Catch Marginal Defects in CPUs
Nikos Karystinos, Odysseas Chatzopoulos, Dimitris Gizopoulos, Ashish Kumar, Sankar Gurumurthy, Sudhanva Gurumurthi and Vilas Sridharan
- Knowledge Transfer from LLMs to Provenance Analysis: Semantic-Augmented APT Detection
Fei Zuo, Junghwan Rhee, Yung Ryn Choe and Chung Hwan Kim
- EgoLoc: Secure Ego-Agent Selection for Robust Collaborative Perception Against Privilege Hijacking
Kyeomhyeok Woo, Eun-Kyu Lee and Jiwoo Lee
- Configurable Logic Architecture Based on Micro-Electromechanical Relays for Safety Critical Nuclear Power Protection Systems
Coby Cockrell, Aidan Collins, Ben Smith, Umit Ozgur, Carl Elks, Abhi Rajagopala, Matt Gibson and Vitaliy Avrutin
- Bridging the Gap Between Off-Chain Disclosure and On-Chain Implementation: Automated Auditing for ICO Investor Protection
Chenglong Fu, Chi Zhang and Mengtian Li
- A Robustness Metric and Evaluation Approach for Machine Learning Components in Aviation
Casidhe Hutchison, Tomasz Swierzewski, Joshua Neighbor, Alex Johnson, Todd Grossaint, Liam Kruse, Xusheng Luo and Changliu Liu
- Redefining Page Offlining: Real-World Memory Failure Modes with Preemptive Strategies
Ankit Saxena, Jongmin Lee, Youngwook Ko, Stuti Patel, Grant Gambetta, Dankyu Kang, Yoon Kim, Ilgyu Jung and Paul Cho
- Harnessing Large Language Models for Seed Generation in Greybox Fuzzing
Yunhang Zhang, Wenxuan Shi, Xinyu Xing and Jun Xu
- SNAS: A Multi-Layer Defense-in-Depth Architecture for Secure Egress in Sandboxed Workloads
Niranjan Kumar Sharma, S Muralidhar, Samy Boshra-Riad, Mike Halcrow, Yuxiong He, Nitya Kumar Sharma, Shawn Xia, Haowei Yu, Elliott Brossard, Derek Denny-Brown, Choden Konigsmark, Chenwei Xie, Bhanu Prakash, Brandon Baker and Andong Zhan
- An IPsec Tunnel Recovery Protocol to Overcome QKD Key desynchronization
Hong-Sung Kim and Hyong-Shik Kim
- Vedrfolnir: Blockchain-Assisted Existence-Verifiable Protocol in User-Centric Data Sharing
Rui Han, Weizhong Qiang, Weijie Chen and Yulin Tang
- PeerLumen: A Bitcoin P2P Honeypot Telescope
Fei Du, Jungho Kim, Sang-Yoon Chang and Wenjun Fan
- Aegis: Preventing Cross-Domain Resource Abuse in MCP
Shriti Priya, Teryl Taylor and Fred Araujo
- Enterprise-Scale RAS in IBM Z Memory
Patrick Meaney, David Cadigan, Gary Van Huben, Stephen Powell, Kelvin Wong, Colleen Weller, Gary Tressler, Hailey Nicholson, Marc Gollub and Alper Buyuktosunoglu
- Analyzing HBM Errors at Scale: An Industrial Study
Shreya Varshini, Qintian Huang, Xun Jiao, Mihir Patel, Abhinav Pandey and Fred Lin
- Structural Compliance, Governed Adaptation: Dependable Evolution in the ePayroll Governmental Blockchain Platform
Attila Klenik, Imre Kocsis, Sándor Pap, Péter Tóth, László Gönczy, Ferenc Vágujhelyi and András Pataricza
- A Polyglot OpenTelemetry Framework for Cloud-Native Reliability and Performance Engineering in Connected-Vehicle Platforms
Gaurav Saxena and Niladri Bihari Mohanty
Disrupt 26
- Towards Security by Performance: Rethinking Cyber Risk Assessment for Distributed ML Systems
Alessandro Palma, Gianluca Capozzi, Silvia Bonomi and Giuseppe Antonio Di Luna
- Network-Aware Differential Privacy
Zhou Li, Yu Zheng, Tianhao Wang and Sang-Woo Jun
- Fast or Slow? Human-Inspired Self-Evolving Framework for Resilient AI Systems
Haoran Qiu, Phuong Cao, Shengkun Cui, Archit Patke and Ravi Iyer
- Trust, but Verify: ByzTwin-Range, a Digital Twin Cyber-Range for Byzantine Faults
Tadeu Freitas, João Soares and Rolando Martins
- In-DRAM Signature Generation Using Simultaneous Multiple-Row Activation: An Experimental Study of Off-The-Shelf DRAM Chips
Umut Başer, İsmail Emir Yüksel, F. Nisa Bostancı, Konstantinos Sgouras, Ataberk Olgun, Emre Hakan Demirli, Zhiheng Yue, Harsh Songara, Oğuz Ergin and Onur Mutlu
- Taming the Airwaves: Resilient Spectrum Sharing with BFT
Xiaoxuan Qin, Prashant Krishnamurthy and Amy Babay
- RO: Reliable Orchestration of LLM Programs via Deterministic-Generative Separation
Saurabh Jha
- Why Different Programmers Make the Same Mistakes: An Interdisciplinary Experimental Paradigm
Fuqun Huang and Owen Wright
Doctoral Forum
- Dynamic Wakeup with Collision Costs
Umesh Biswas and Maxwell Young
- Balancing Mutation Entropy and Session Continuity in SDN-Based Moving Target Defense
Souhail Chakkour, Umesh Biswas and Charan Gudla
- Contention Resolution with Evictions
Umesh Biswas, Vini Chaudhary, Shafqat Hasan and Maxwell Young
- Securing Blockchain Applications by Transaction Analysis
Rui Xi
- Dependable Real-Time Guarantees in Converged 5G and Time-Sensitive Networks
Simon Egger, Frank Dürr and Christian Becker
- Data Quality and Fairness in Federated Learning
James Edward Sudlow and Sara Bouchenak
- Bridging the Research-Implementation Gap in Dependable Federated Learning with Autonomous Multi-Agent Orchestration
Raman Zatsarenko and Leon Reznik
- Location-Aware Prompt Injection in Semantically Routed Multi-Agent Systems
Jean Tonday Rodriguez, Muhammad Nadeem and Mohammad Ashiqur Rahman
- The Generalized Backward Dropping Framework: Unifying Memory Efficiency and Fault Tolerance
Surojit Ganguli and David Inouye
- Agentic Reinforcement Learning for Adaptive Moving Target Defense in Cyber-Physical Systems
Mohammad Zakaria Haider and Mohammad Ashiqur Rahman
- Automating Research and Development of Dependable Federated Learning Systems
Dmitrii Korobeinikov and Leon Reznik
- Lightweight Detection and Protocol Level Prevention of AI Accelerated Phishing Attacks
Rina Mishra and Gaurav Varshney
Poster
- FGF: A Fact-Graph Feedback Loop Framework for Verifiable LLM-based Decision Making
Subi Kim, Jimin Ryu, Jieun Kang, Yong Ik Yoon
- Adaptive Symbolic Execution with LLM Integration: Future Directions for Evasive Malware Analysis
Ajay Kumara Makanahalli Annaiah, Shahid Ali Lodin, William Setters
- Co-evolving SQL Injection Attacks and ModSecurity Rules via Agentic AI
Vahid Babaey, Arun Ravindran
- Why Are Anomalies Rare in RSS? Diagnosing Strict Serializability Violations in Spanner-RSS
Sejong Kim, Yon Dohn Chung
- Towards Automated Detection of Latent Software Robustness Failures using Large Language Models
José Flauzino, Marco Vieira, Elias Duarte
- Optimal Fast-ReRoute: A Tool for Generating and Visualizing Arborescence-based Routes
Leon Okida, Elias P. Duarte Jr., André Vignatti
- Making Binary Decisions in Decentralized Autonomous Organizations
Nuno Braz, Miguel Correia
- Efficient Backdoor Sample Identification via Blend Transform for Untrusted Training Data
Shuhong Yang, Zhenyong Zhang, Zeyu Yang, Shuaiting Huang
- Memory-Bandwidth Side Channels for Input Recovery in Edge-Deployed LLM Inference
Davis Ranney, Yashaswini Makaram, Yunsi Fei
- Does the Knight and Leveson Hypothesis Hold for LLM-Based Code Generation?
Rodrigo Nogueira, Karthik Pattabiraman, Marco Vieira, João R. Campos
- The Overlooked Role of False Negatives in Reentrancy Detection
Alvise Spanò, Dalila Ressi, Sabina Rossi, Michele Bugliesi
- LUMENating: Insights from an LLM-Guided System for Activating Hidden Behaviors in Malware
Kevin Valakuzhy, Abhinav Vemulapalli, Miuyin Yong Wong, Doug Blough, Mustaque Ahamad, Fabian Monrose
- Mind the Driver: A Fault Injection Methodology for AI Systems
Marcello Cinque, Luigi De Simone, Nike Di Giacomo
- On the Feasibility of Side-Channel Information for Malicious Traffic Detection in IoT Networks
Shadman Sakib Arnob, Ahmad Patooghy, Islam Obaidat
- Edge-Based Privacy Auditing for Trustworthy Humanoid Robot Interaction
Bontu Geremew, Sharun Akter Khushbu, Shaohu Zhang
- Evaluating Security Best Practices in the GitHub Actions Documentation
Lukas Boschanski, Marco Vieira
- Demystifying Differentially Private Quantization in Federated Learning
Shan Huang, Zhijing Ye, Jiamin Wang, Zhaorui Zhang, Jie Fu, Wendy Hui Wang, Sheng Di, Xiaodong Yu
- Investigating the Relationship Between Autonomous Driving System Disengagements and Crashes
Dev Patel, Arpan Swaroop, Saurabh Bagchi