What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zbigniew Kalbarczyk
Google Scholar
46
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
Limin Yang
Zhi Chen
Chenkai Wang
Zhenning Zhang
Sushruth Booma
Phuong Cao
Constantin Adam
Alexander Withers
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Gang Wang
2024
conf/asiaccs
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers.
Zhiang Li
Daisuke Mashima
Wen Shei Ong
Ertem Esiner
Zbigniew Kalbarczyk
Ee-Chien Chang
2024
conf/dsn
When Green Computing Meets Performance and Resilience SLOs.
Haoran Qiu
Weichao Mao
Chen Wang
Saurabh Jha
Hubertus Franke
Chandra Narayanaswami
Zbigniew Kalbarczyk
Tamer Basar
Ravishankar K. Iyer
2022
conf/cns
GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone.
Balachandar Gowrisankar
Daisuke Mashima
Wen Shei Ong
Quanqi Ye
Ertem Esiner
Binbin Chen
Zbigniew Kalbarczyk
2020
conf/dsn
ML-Driven Malware that Targets AV Safety.
Saurabh Jha
Shengkun Cui
Subho S. Banerjee
James Cyriac
Timothy Tsai
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2017
journals/tifs
Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control.
Rui Tan
Hoang Hai Nguyen
Yi Shyh Eddy Foo
David K. Y. Yau
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Hoay Beng Gooi
2017
conf/dsn
Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log.
Yan Li
Binbin Chen
Vincent W. Zheng
William G. Temple
Zbigniew Kalbarczyk
Yue Wu
2017
conf/dsn
Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System.
Yan Liu
Yue Wu
Zbigniew Kalbarczyk
2016
conf/ccs
A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.
Uttam Ghosh
Xinshu Dong
Rui Tan
Zbigniew Kalbarczyk
David K. Y. Yau
Ravishankar K. Iyer
2015
conf/dsn
Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs.
Catello Di Martino
William Kramer
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2013
conf/ccs
Semantic security analysis of SCADA networks to detect malicious control commands in power grids.
Hui Lin
Adam J. Slagell
Zbigniew Kalbarczyk
Peter W. Sauer
Ravishankar K. Iyer
2013
conf/ccs
Impact of integrity attacks on real-time pricing in smart grids.
Rui Tan
Varun Badrinath Krishna
David K. Y. Yau
Zbigniew Kalbarczyk
2013
conf/nspw
Go with the flow: toward workflow-oriented security assessment.
Binbin Chen
Zbigniew Kalbarczyk
David M. Nicol
William H. Sanders
Rui Tan
William G. Temple
Nils Ole Tippenhauer
An Hoa Vu
David K. Y. Yau
2012
conf/dsn
Towards resiliency in embedded medical monitoring devices.
Homa Alemzadeh
Catello Di Martino
Zhanpeng Jin
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2012
conf/dsn
Toward a high availability cloud: Techniques and challenges.
Cuong Manh Pham
Phuong Cao
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2012
conf/dsn
Characterization of the error resiliency of power grid substation devices.
Kuan-Yu Tseng
Daniel Chen
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2011
conf/dsn
Analysis of security data from a large computing organization.
Aashish Sharma
Zbigniew Kalbarczyk
James Barlow
Ravishankar K. Iyer
2011
conf/dsn
Modeling stream processing applications for dependability evaluation.
Gabriela Jacques-Silva
Zbigniew Kalbarczyk
Bugra Gedik
Henrique Andrade
Kun-Lung Wu
Ravishankar K. Iyer
2011
conf/dsn
CloudVal: A framework for validation of virtualization environment in cloud infrastructure.
Cuong Manh Pham
Daniel Chen
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2011
conf/dsn
Improving Log-based Field Failure Data Analysis of multi-node computing systems.
Antonio Pecchia
Domenico Cotroneo
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2010
conf/dsn
Measurement-based analysis of fault and error sensitivities of dynamic memory.
Keun Soo Yim
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2009
conf/sec
Discovering Application-Level Insider Attacks Using Symbolic Execution.
Karthik Pattabiraman
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2009
conf/dsn
Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS).
Karthik Pattabiraman
Zbigniew Kalbarczyk
2009
conf/dsn
Effectiveness of machine checks for error diagnostics.
Nikhil Pandit
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2009
conf/dsn
An end-to-end approach for the automatic derivation of application-aware error detectors.
Galen Lyle
Shelley Cheny
Karthik Pattabiraman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2008
conf/dsn
Workshop on compiler and architectural techniques for application reliability and security (CATARS).
Karthik Pattabiraman
Shuo Chen
Zbigniew Kalbarczyk
2008
conf/dsn
SymPLFIED: Symbolic program-level fault injection and error detection framework.
Karthik Pattabiraman
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2007
conf/dsn
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones.
Marcello Cinque
Domenico Cotroneo
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2006
conf/dsn
Workshop on Applied Software Reliability (WASR).
Adnan Agbaria
Claudio Basile
Zbigniew Kalbarczyk
2006
conf/dsn
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks.
Claudio Basile
Meeta Gupta
Zbigniew Kalbarczyk
Ravi K. Iyer
2005
conf/dsn
Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
Shuo Chen
Jun Xu
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2005
conf/dsn
Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic.
Giacinto Paolo Saggese
Anoop Vetteth
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2005
conf/dsn
Modeling Coordinated Checkpointing for Large-Scale Supercomputers.
Long Wang
Karthik Pattabiraman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Lawrence G. Votta
Christopher A. Vick
Alan Wood
2005
conf/dsn
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks.
Claudio Basile
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2004
conf/sec
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
Shuo Chen
Karthik Pattabiraman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2004
conf/dsn
Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors.
Weining Gu
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2004
conf/dsn
An Architectural Framework for Providing Reliability and Security Support.
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Jun Xu
2004
conf/dsn
Checkpointing of Control Structures in Main Memory Database Systems.
Long Wang
Zbigniew Kalbarczyk
Ravishankar K. Iyer
H. Vora
T. Chahande
2003
conf/dsn
Characterization of Linux Kernel Behavior under Errors.
Weining Gu
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Zhen-Yu Yang
2003
conf/dsn
A Preemptive Deterministic Scheduling Algorithm for Multithreaded Replicas.
Claudio Basile
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2003
conf/dsn
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
Shuo Chen
Zbigniew Kalbarczyk
Jun Xu
Ravishankar K. Iyer
2002
conf/dsn
NFTAPE: Networked Fault Tolerance and Performance Evaluator.
David T. Stott
Phillip H. Jones III
M. Hamman
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2002
conf/dsn
An Adaptive Architecture for Monitoring and Failure Analysis of High-Speed Networks.
Benjamin Floering
B. Brothers
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2002
conf/dsn
Joint Panel - IPDS and Workshop on Dependability Benchmarking.
Ravishankar K. Iyer
Zbigniew Kalbarczyk
Philip Koopman
Henrique Madeira
Gunter Heiner
Karama Kanoun
Haim Levendel
Brendan Murphy
Lawrence G. Votta
Don Wilson
2001
conf/dsn
An Experimental Study of Security Vulnerabilities Caused by Errors.
Jun Xu
Shuo Chen
Zbigniew Kalbarczyk
Ravishankar K. Iyer
2001
conf/dsn
A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Saurabh Bagchi
Y. Liu
Keith Whisnant
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Ytzhak H. Levendel
Lawrence G. Votta
Coauthors
Aashish Sharma
(1)
Adam J. Slagell
(1)
Adnan Agbaria
(1)
Alan Wood
(1)
Alexander Withers
(1)
An Hoa Vu
(1)
Anoop Vetteth
(1)
Antonio Pecchia
(1)
B. Brothers
(1)
Balachandar Gowrisankar
(1)
Benjamin Floering
(1)
Binbin Chen
(3)
Brendan Murphy
(1)
Bugra Gedik
(1)
Catello Di Martino
(2)
Chandra Narayanaswami
(1)
Chen Wang
(1)
Chenkai Wang
(1)
Christopher A. Vick
(1)
Claudio Basile
(4)
Constantin Adam
(1)
Cuong Manh Pham
(2)
Daisuke Mashima
(2)
Daniel Chen
(2)
David K. Y. Yau
(4)
David M. Nicol
(1)
David T. Stott
(1)
Domenico Cotroneo
(2)
Don Wilson
(1)
Ee-Chien Chang
(1)
Ertem Esiner
(2)
Gabriela Jacques-Silva
(1)
Galen Lyle
(1)
Gang Wang
(1)
Giacinto Paolo Saggese
(1)
Gunter Heiner
(1)
H. Vora
(1)
Haim Levendel
(1)
Haoran Qiu
(1)
Henrique Andrade
(1)
Henrique Madeira
(1)
Hoang Hai Nguyen
(1)
Hoay Beng Gooi
(1)
Homa Alemzadeh
(1)
Hubertus Franke
(1)
Hui Lin
(1)
James Barlow
(1)
James Cyriac
(1)
Jun Xu
(4)
Karama Kanoun
(1)
Karthik Pattabiraman
(7)
Keith Whisnant
(1)
Keun Soo Yim
(1)
Kuan-Yu Tseng
(1)
Kun-Lung Wu
(1)
Lawrence G. Votta
(3)
Limin Yang
(1)
Long Wang
(2)
M. Hamman
(1)
Marcello Cinque
(1)
Meeta Gupta
(1)
Nikhil Pandit
(1)
Nils Ole Tippenhauer
(1)
Nithin Nakka
(4)
Peter W. Sauer
(1)
Philip Koopman
(1)
Phillip H. Jones III
(1)
Phuong Cao
(2)
Quanqi Ye
(1)
Ravi K. Iyer
(1)
Ravishankar K. Iyer
(36)
Rui Tan
(4)
Saurabh Bagchi
(1)
Saurabh Jha
(2)
Shelley Cheny
(1)
Shengkun Cui
(1)
Shuo Chen
(5)
Subho S. Banerjee
(1)
Sushruth Booma
(1)
T. Chahande
(1)
Tamer Basar
(1)
Timothy Tsai
(1)
Uttam Ghosh
(1)
Varun Badrinath Krishna
(1)
Vincent W. Zheng
(1)
Weichao Mao
(1)
Weining Gu
(2)
Wen Shei Ong
(2)
William G. Temple
(2)
William H. Sanders
(1)
William Kramer
(1)
Xinshu Dong
(1)
Y. Liu
(1)
Yan Li
(1)
Yan Liu
(1)
Yi Shyh Eddy Foo
(1)
Ytzhak H. Levendel
(1)
Yue Wu
(2)
Zbigniew Kalbarczyk
(46)
Zhanpeng Jin
(1)
Zhen-Yu Yang
(1)
Zhenning Zhang
(1)
Zhi Chen
(1)
Zhiang Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to