Tuesday, June 26
Best Paper Candidates – Pick your best paper | |
Kristina Spirovska, Diego Didona, Willy Zwaenepoel (EPFL) | Wren: Nonblocking Reads in a Partitioned Transactional Causally Consistent Data Store |
Vinicius Fratin, Daniel Oliveira, Caio Lunardi, Fernando Santos, Gennaro Rodrigues, Paolo Rech (UFRGS) | Code-Dependent and Architecture-Dependent Reliability Behaviors |
Guanpeng Li, Karthik Pattabiraman (University of British Columbia); Siva Kumar Sastry Hari, Michael Sullivan, Timothy Tsai (NVIDIA) | Modeling Soft Error Propagation in Programs |
SESSION 1 : Byzantine and Multicast (Many Many Generals) | |
Start time: 14:10 | |
Chair: Miguel Correia | Chair: Miguel Correia |
Paulo Coelho (Università della Svizzera italiana); Tarcisio Ceolin (Pontifícia Universidade Católica do Rio Grande do Sul); Alysson Bessani (Universidade de Lisboa); Fernando Dotti (Pontifícia Universidade Católica do Rio Grande do Sul); Fernando Pedone (Università della Svizzera italiana) | Byzantine Fault-Tolerant Atomic Multicast |
João Sousa, Alysson Bessani (LaSIGE, Faculdade de Ciências, Universidade de Lisboa); Marko Vukolić (IBM Research Zurich) | A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform |
Bijun Li, Nico Weichbrodt, Johannes Behl (TU Braunschweig); Pierre-Louis Aublin (Imperial College London); Tobias Distler (FAU Erlangen-Nuremberg); Rüdiger Kapitza (TU Braunschweig) | Troxy: Transparent Access to Byzantine Fault-Tolerant Systems |
Jonathan Behrens (MIT and Cornell University); Ken Birman, Sagar Jha, Edward Tremel (Cornell University) | RDMC: A Reliable RDMA Multicast for Large Objects |
SESSION 2 : HPC or not | |
Start time: 14:10 | |
Chair: Domenico Cotroneo | |
Rohan Garg, Tirthak Patel, Gene Cooperman, Devesh Tiwari (Northeastern University) | SHIRAZ: Exploiting System Reliability and Application Resilience Characteristics to Improve Large Scale System Throughput |
Bin Nie, Ji Xue (College of William and Mary); Saurabh Gupta (Intel Labs); Tirthak Patel (Northeastern University); Christian Engelmann (Oak Ridge National Laboratory); Evgenia Smirni (College of William and Mary); Devesh Tiwari (Northeastern University) | Machine Learning Models for GPU Error Prediction in a Large Scale HPC System |
Mohit Kumar (Wayne State University); Devesh Tiwari (Northeastern University); Saurabh Gupta (Oak Ridge National Laboratory); Tirthak Patel (Northeastern University); Weisong Shi (Wayne State University); Song Fu (University of North Texas); Christian Engelmann (Oak Ridge National Laboratory) | Understanding and Analyzing Interconnect Errors and Network Congestion on a Large Scale HPC system |
Diyu Zhou, Yuval Tamir (UCLA Computer Science Department) | Fast Hypervisor Recovery Without Reboot |
SESSION 3: Critical Infrastructures | |
Start time: 16:20 | |
Chair: Ken Birman | |
Christian Wressnegger, Ansgar Kellner, Konrad Rieck (TU Braunschweig) | ZOE: Content-based Anomaly Detection for Industrial Control Systems |
Subhash Lakshminarayana (Advanced Digital Sciences Center, Illinois at Singapore); David K.Y. Yau (Singapore University of Technology and Design) | Cost-Benefit Analysis of Moving-Target Defense in Power Grids |
Zhenqi Huang (University of Illinois); Sriharsha Etigowni (Rutgers University); Sayan Mitra (University of Illinois); Saman Zonouz (Rutgers University) | Algorithmic Attack Synthesis using Hybrid Dynamics of Power Grid Critical Infrastructures |
André Nogueira, Miguel Garcia, Alysson Bessani, Nuno Neves (LASIGE, Faculdade de Ciências, Universidade de Lisboa, Portugal) | On the challenges of building a BFT SCADA |
SESSION 4 : Storage and Redundancy | |
Start time: 16:20 | |
Chair: Mootaz N. Elnozahy | |
Roberta Barbi, Dorian Burihabwa, Pascal Felber, Hugues Mercier, Valerio Schiavoni (University of Neuchatel) | RECAST: Random Entanglement for Censorship-resistant Archival Storage |
Veronica Estrada-Galinanes (University of Neuchatel); Ethan Miller (University of California Santa Cruz); Pascal Felber (University of Neuchatel); Jehan-Francois Paris (University of Houston) | Alpha Entanglement Codes: Practical Erasure Codes to Archive Big Data in Unreliable Environments |
Fritz Alder, Arseny Kurnikov, Andrew Paverd, N. Asokan (Aalto University) | Migrating SGX Enclaves with Persistent State |
Stefan Contiu (University of Bordeaux, France); Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber (University of Neuchâtel, Switzerland); Laurent Réveillère (University of Bordeaux, France) | IBBE-SGX: Cryptographic Group Access Control over Inquisitive Cloud Storages |
Wednesday, June 27
SESSION 5 : Attacks and Intrusion Detection | |
Start time: 9:30 | |
Chair:Pascal Felber | |
Shixiong Zhao (The University of Hong Kong); Rui Gu (Columbia University); Haoran Qiu, Yuexuan Wang, Heming Cui (The University of Hong Kong); Junfeng Yang (Columbia University) | OWL: Understanding and Detecting Concurrency Attacks |
Meisam Navaki Arefi (Universityof New Mexico); Geoffrey Alexander, Hooman Rokham (University of New Mexico); Aokun Chen, Daniela Oliveira (University of Florida); Xuetao Wei (University of Cincinnati); Michalis Faloutsos (Univerisity of California Riverside); Jedidiah R. Crandall (University of New Mexico) | FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking |
Zhilong Wang (Nanjing University); Xuhua Ding (Singapore Management University); Chengbin Pang, Jian Guo, Jun Zhu, Bing Mao (Nanjing University) | To Detect Stack Buffer Overflow With Polymorphic Canaries |
Amy Babay, Thomas Tantillo, Trevor Aron (Johns Hopkins University); Marco Platania (AT&T Labs); Yair Amir (Johns Hopkins University, Spread Concepts LLC) | Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid |
SESSION 6 : Modelling and Verification | |
Start time: 9:30 | |
Chair: Rogerio de Lemos | |
Xiaoxiao Yang (Institute of Software, Chinese Academy of Sciences); Joost-Pieter Katoen (RWTH Aachen University); Huimin Lin, Gaoang Liu (Institute of Software, Chinese Academy of Sciences); Hao Wu (unaffiliated) | Branching Bisimulation and Concurrent Object Verification |
Guanpeng Li, Karthik Pattabiraman (University of British Columbia) | Modeling Input-Dependent Error Propagation in Programs |
Peter Buchholz (TU Dortmund); Tugrul Dayar (Bilkent University) | Efficient transient analysis of a class of compositional Fluid Stochastic Petri Nets |
Cyrille Jegourel, Jingyi Wang, Jun Sun (Singapore University of Technology and Design) | Importance Sampling of Interval Markov Chains |
SESSION 7 : Architectures Reliability | |
Start time: 11:30 | |
Chair: Andrea Bondavalli | |
Atieh Lotfi (University of California, San Diego); Nirmal Saxena, Richard Bramley, Paul Racunas, Philip Shirvani (NVIDIA) | Low Overhead Tag Error Mitigation for GPU Architectures |
Ilya Tuzov, David de Andrés, Juan-Carlos Ruiz (Universitat Politècnica de València) | DAVOS: EDA toolkit for dependability assessment, verification, optimisation and selection of hardware models |
Konstantinos Parasyris, Panos Koutsovasilis, Vassilis Vassiliadis, Christos D. Antonopoulos, Nikolaos Bellas, Spyros Lalis (University Of Thessaly) | A Framework for Evaluating Software on Reduced Margins Hardware |
Sam Ainsworth, Timothy M. Jones (University of Cambridge) | Parallel Error Detection Using Heterogeneous Cores |
SESSION 8 : Networks security | |
Start time: 11:30 | |
Chair: Mohamed Kaaniche | |
Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee (The University of Auckland) | Measuring IPv6 DNS Reconnaissance Attacks and Preventing them using DNS Guard |
Lin Jin, Shuai Hao, Haining Wang, Chase Cotton (University of Delaware) | Your Remnant Tells Secret: Residual Resolution in DDoS Protection Services |
Richard Skowyra (MIT Lincoln Laboratory); Lei Xu, Guofei Gu (Texas A&M University); Thomas Hobson, Veer Dedhia, James Landry, Hamed Okhravi (MIT Lincoln Laboratory) | Effective Topology Tampering Attacks and Defenses in Software-Defined Networks |
David Goltzsche, Signe Rüsch, Manuel Nieke (TU Braunschweig); Sébastien Vaucher (Université de Neuchâtel); Nico Weichbrodt (TU Braunschweig); Valerio Schiavoni (Université de Neuchâtel); Pierre-Louis Aublin, Paolo Costa (Imperial College London); Christof Fetzer (TU Dresden); Pascal Felber (Université de Neuchâtel); Peter Pietzuch (Imperial College London); Rüdiger Kapitza (TU Braunschweig) | EndBox: Scalable Middlebox Functions Using Client-Side Trusted Execution |
SESSION 9 : Mobile Devices | |
Start time: 14:30 | |
Chair: Vincent Naessens | |
JiaChen, GeHan (Shandong University); ShanqingGuo (PO BOX 134,School of Computer Science,Shandong University,Shunhua Road, High-tech Development Zone,Ji'nan, P.R.China,250101) | FragDroid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications |
Edgardo Barsallo Yi, Amiya K. Maji, Saurabh Bagchi (Purdue University) | How Reliable Is My Wearable: A Fuzz Testing-based Study |
Le Yu, Jiachi Chen, Hao Zhou, Xiapu Luo (Hong Kong Polytechnic University); Kang Liu (Institute of Automation, Chinese Academy of Sciences) | Localizing Function Errors in Mobile Apps with User Reviews |
Kai Cheng (School of Cyber Security, University of Chinese Academy of Sciences; CAS); Qiang Li (Beijing Jiaotong University); Lei Wang (State Grid Corporation of China); Qian Chen, Yaowen Zheng (School of Cyber Security, University of Chinese Academy of Sciences; CAS); Limin Sun (Institute of Information Engineering, CAS); Zhenkai Liang (National University of Singapore) | DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware |
SESSION 10 : Confidentiality and Privacy | |
Start time: 14:30 | |
Chair: Regina Moraes | |
Lei Zhang, Douglas M. Blough (Georgia Institute of Technology) | Deceptive Secret Sharing |
Bing Chang (Singapore Management University); Fengwei Zhang (Wayne State University); Bo Chen (Michigan Technological University); Yingjiu Li (Singapore Management University); Wen-Tao Zhu (Institute of Information Engineering, Chinese Academy of Sciences); Yangguang Tian (Singapore Management University); Zhan Wang (RealTime Invent, Inc.); Albert Ching (i-Sprint Innovations) | MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices |
Antoine Boutet (INSA-Lyon, CITI, Inria); Florestan De Moor (ENS Rennes); Davide Frey (Inria); Rachid Guerraoui (EPFL); Anne-Marie Kermarrec (Mediego); Antoine Rault (EPFL) | Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter! |
Julien Duchene (CALID / LAAS-CNRS); Eric Alata, Vincent Nicomette, Mohamed Kaaniche (LAAS-CNRS); Colas Le Guernic (DGA-MI / INRIA) | A Specification-based Protocol Obfuscation Framework |
Thursday, June 28
SESSION 11 : Security | |
Start time: 9:00 | |
Chair: Henrique Madeira | |
Sangwoo Kim, Seokmyung Hong, Jaesang Oh, Heejo Lee (Korea university) | Obfuscated VBA Macro Detection using Machine Learning |
Chris Bailey, Rogério de Lemos (University of Kent) | Evaluating Self-Adaptive Authorisation Infrastructures through Gamification |
Ahmed M. Fawaz, Mohammad A. Noureddine, William H. Sanders (University of Illinois) | PowerAlert: Integrity Checking using Power Measurement and a Game-Theoretic Strategy |
Irum Rauf, Elena Troubitsyna (Åbo Akademi University, Turku, Finland) | Generating Cloud Monitors from Models to Secure Clouds |
SESSION 12 : Distributed systems | |
Start time: 9:00 | |
Chair: Sara Bouchenak | |
Francisco Neves, Nuno Machado, José Pereira (HASLab, INESC TEC and University of Minho) | Falcon: A practical log-based analysis tool for distributed systems |
Simon Bouget, Yérom David Bromberg, Adrien Luxey, Francois Taiani (Univ Rennes, Inria, CNRS, IRISA) | Pleiades: Distributed Structural Invariants at Scale |
Daniel Porto (INESC-ID/IST - U. Lisboa); João Leitão (NOVALINCS/FCT - UNL); Flavio Junqueira (Apache); Rodrigo Rodrigues (INESC-ID/IST - U. Lisboa) | The Tortoise and the Hare: Characterizing Synchrony in Distributed Environments |
Sadegh Torabi (Concordia University); Elias Bou-Harb (Florida Atlantic University); Chadi Assi (Concordia University); Mario Galluscio (Florida Atlantic University); Amine Boukhtouta (Ericsson Canada); Mourad Debbabi (Concordia University) | Inferring, Characterizing, and Investigating Internet-scale Malicious IoT Device Activities: A Network Telescope Perspective |
SESSION 13 : The future of Things | |
Start time: 11:10 | |
Chair: Homa Alemzadeh | |
Pinyao Guo, Hunmin Kim (Pennsylvania State University); Nurali Virani (GE Global Research); Jun Xu, Minghui Zhu, Peng Liu (Pennsylvania State University) | RoboADS: Anomaly Detection against Sensor and Actuator Misbehaviors in Mobile Robots |
Subho S. Banerjee, Saurabh Jha, James Cyriac, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer (University of Illinois at Urbana-Champaign) | Hands Off the Wheel in Autonomous Vehicles? A Systems Perspective of Field-Data Over Million Miles |
Radha Venkatagiri (University of Illinois at Urbana Champaign); Karthik Swaminathan, Chung-Ching Lin (IBM Research); Liang Wang (University of Virginia); Alper Buyuktosunoglu, Pradip Bose (IBM Research); Sarita V. Adve (University of Illinois at Urbana Champaign) | Impact of Software Approximations on the Resiliency of a Video Summarization System |
Jiwon Choi, Hayoung Jeoung, Jihun Kim, Youngjoo Ko, Wonup Jung, Hanjun Kim, Jong Kim (Pohang University of Science and Technology) | Detecting and Identifying Faulty IoT Devices in Smart Home with Context Extraction |
SESSION 14 : Routing in Networks | |
Start time: 11:10 | |
Chair: Katinka Wolter | |
kun xie, Heng Tao, Xin Wang (State University of New York at Stony Brook); Gaogang Xie, Jigang Wen (Institute of Computing Technology,Chinese Academy of Sciences); Jiannong Cao (The Hong Kong Polytechnic University); Zheng Qin (Hunan University) | Divide And Conquer For Fast SRLG Disjoint Routing |
Tomas Hlavacek (Fraunhofer SIT); Amir Herzberg (UConn); Haya Shulman, Michael Waidner (Fraunhofer SIT) | Methodologies for Measuring Route Origin Validation |
Catello Di Martino (Nokla Bell Labs); Ugo Giordano (University of Naples Federico II); Nishok N. Mohanasamy (Nokla Bell Labs); Stefano Russo (University of Naples Federico II); Marina Thottan (Nokla Bell Labs) | In Production Performance Testing of SDN ControlPlane for Telecom Operators |
Baojun Liu, Chaoyi Lu (Tsinghua University); Zhou Li (IEEE member); Ying Liu, Haixin Duan (Tsinghua University); Shuang Hao (University of Texas at Dallas); Zaifeng Zhang (Netlab of 360) | A Reexamination of Internationalized Domain Names: the Good, the Bad and the Ugly |
SESSION 15 : Symbolic Execution & Static Analysis | |
Start time: 14:20 | |
Chair: Heming Cui | |
Hui Xu (CUHK); Yangfan Zhou, Yu Kang (Fudan University); Fengzhi Tu, Michael R. Lyu (CUHK) | Manufacturing Resilient Bi-Opaque Predicates against Symbolic Execution |
Angello Astorga, Siwakorn Srisakaokul (University of Illinois at Urbana-Champaign); Xusheng Xiao (Case Western Reserve University); Tao Xie (University of Illinois at Urbana-Champaign) | PreInfer: Automatic Inference of Preconditions via Symbolic Analysis |
Zhenyu Ning, Fengwei Zhang (Wayne State University) | DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis |