final Program > june 23rd
Time
|
Wednesday, June 23rd
|
14:00 - 14:45 (GMT+01)
:00 - :45 ()
|
Keynote II: Marina Thottan
Chair : Lelio Di Martino
Future of Network and Service Automation: Resiliency Challenges for Communicating to the Limit
We are at the dawn of an era of profound human progress based on digitalization. Digital transformation drives a set of new requirements that have the network at the center, connecting everything, providing compute wherever it is needed, and applying insights to execute with precision. To accomplish this, networks must be able to connect everything simultaneously, whenever necessary, with guaranteed reliability and security, even as the number, diversity, social and operating condition change. Innovation in automating networks and in creating new network-as-a-service platforms will be the key element enabling Communication Service Providers (CSPs) to finally become the new Digital Service Providers (DSPs) of the future. This talk illustrates the key challenges and innovation needed for creating the resilient hyper-connected automated network of the future.
|
14:50 - 15:35 (GMT+01)
:50 - :35 ()
|
FA1 : Hosted/Moderated by Prof. Hauro Yokota
#1 Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses
#2 Systemically Evaluating the Robustness of ML-based IoT Malware Detectors
#4 Detecting Operational Adversarial Examples for Reliable Deep Learning
#17 S-ADA: Software as an Autonomous, Dependable and Affordable System
#18 Finding Web Application Vulnerabilities with an Ensemble Fuzzing
|
14:50 - 15:35 (GMT+01)
:50 - :35 ()
|
I2
Keynote Speaker: Algirdas Avižienis,
Vytautas Magnus University, Kaunas, Lithuania and
University of California Los Angeles (UCLA), USA
Title : Fault Tolerance Was Available to Prevent Boeing 737 MAX Airplane Crashes and Their Costly Consequences
Abstract: I present two fault tolerance methods (QR and MD) for Angle-of-Attack sensors
that were ;available to prevent the fatal crashes of two Boeing 737 MAX airplanes: Lion Air Flight 610 and Ethiopian Airlines Flight 302. Unfortunately, those methods were not implemented by Boeing. In Part One I identify a vulnerability (dormant design fault) that was created when new MCAS software was added to the software of Flight Control Computers. The vulnerability was not detected after the first crash, therefore it caused the second crash that led to the grounding of all 737 MAX airplanes for 20 months while MCAS was (unnecessarily) redesigned and certified. In Part Two I discuss the “Final Rule” document issued by the FAA that states the required changes in the 737 MAX design for certification. Fault tolerance is not required. I identify two flaws in the “Final Rule” document and recommend an improvement.
|
14:50 - 15:35 (GMT+01)
:50 - :35 ()
|
R5 - Machine Learning for Dependability Chair : Peng Liu
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection
Shouguo Yang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Long Cheng (School of Computing, Clemson University), Yicheng Zeng (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Zhe Lang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Hongsong Zhu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences),
Zhiqiang Shi (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences)
Sentiment Analysis based Error Detection for Large-Scale Systems
Khalid Ayedh Alharthi (University of Warwick and University of Bisha), Arshad Jhumka (University of Warwick), Sheng Di (Argonne National Laboratory), Franck Cappello (Argonne National Laboratory and University of Illinois at Urbana-Champaign), Edward Chuah (Lancaster University)
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users
Lun-Pin Yuan (Pennsylvania State University), Euijin Choo (Qatar Computing Research Institute), Ting Yu (Qatar Computing Research Institute), Issa Khalil (Qatar Computing Research Institute), Sencun Zhu (Pennsylvania State University)
General Feature Selection for Failure Prediction of Large-scale SSD Deployment
Fan Xu (Alibaba), Shujie Han (The Chinese University of Hong Kong), Patrick P. C. Lee (The Chinese University of Hong Kong), Yi Liu (Alibaba), Cheng He (Alibaba), Jiongzhou Liu (Alibaba) |
14:50 - 15:35 (GMT+01)
:50 - :35 ()
|
R6 - GPUs Chair : Bo Fang
Data-centric Reliability Management in GPUs
Gurunath Kadam (William & Mary), Evgenia Smirni (William & Mary), Adwait Jog (William & Mary) NVBitFI: Dynamic Fault Injection for GPUs
Timothy Tsai (NVIDIA Research), Siva Kumar Sastry Hari (NVIDIA), Michael Sullivan (NVIDIA), Oreste Villa (NVIDIA), Stephen W. Keckler (NVIDIA Research)
Revealing GPUs Vulnerabilities by Combining Register-Transfer and Software Level Fault Injection
Fernando Fernandes dos Santos (Universidade Federal do Rio Grande do Sul (UFRGS)), Josie Esteban Rodriguez Condia (Politecnico di Torino), Luigi Carro (Universidade Federal do Rio Grande do Sul (UFRGS)), Matteo Sonza Reorda (Politecnico di Torino), Paolo Rech (UFRGS; Politecnico di Torino)
Examining Failures and Repairs on Supercomputers with Multi-GPU Compute Nodes
Amir Taherin (Northeastern University), Tirthak Patel (Northeastern University), Devesh Tiwari (Northeastern University), Giorgis Georgakoudis (Lawrence Livermore National Laboratory), Ignacio Laguna (Lawrence Livermore National Laboratory) |
15:45 - 16:30 (GMT+01)
:45 - :30 ()
|
FA2 : Hosted/Moderated by Prof. Chun-Ying Huang
#9 Iteratively Checking Program Properties Involving Non-Boolean Values
#10 Negotiating PQC for DNSSEC
#13 Spatio-Temporal Split Learning
#14 Mitigation of Automotive Control Modules Hardware Replacement-based Attacks Through Hardware Signature
#15 Machine Learning Analysis of IP ID Applications
|
15:45 - 16:30 (GMT+01)
:45 - :30 ()
|
I3 - Security
Chair : Karthik Swaminathan, IBM Research
Designing Adversarial Attack and Defence for Robust Android Malware Detection Models
Hemant Rathore, Sanjay K. Sahay, Jasleen Dhillon and Mohit Sewak.
A Matter of Trust: Verification of Security and Performance for Network Platform as a Service
Tim Alberdingk Thijm, Gary Atkinson, Lalita Jagadeesan and Marina Thottan.
Hardware Support for Low-Cost Memory Safety
Rick Boivie, Gururaj Saileshwar, Tong Chen, Benjamin Segal and Alper Buyuktosunoglu.
|
15:45 - 16:30 (GMT+01)
:45 - :30 ()
|
R7 - Systems Security Chair : Simin Nadjm-Tehrani
An Application Agnostic Defense Against the Dark Arts of Cryptojacking
Nada Lachtar (Univ. Michigan), Abdulrahman Abu Elkhail (Univ. Michigan), Anys Bacha (Univ. Michigan), Hafiz Malik (Univ. Michigan) Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions
Chao Su (Nanjing University), Xuhua Ding (Singapore Management University), Qingkai Zeng (Nanjing University)
Towards Optimal Use of Exception Handling Information for Function Detection
Chengbin Pang (Stevens Institute of Technology), Ruotong Yu (Stevens Institute of Technology), Dongpeng Xu (University of New Hampshire), Eric Koskinen (Stevens Institute of Technology), Georgios Portokalidis (Stevens Institute of Technology), Jun Xu (Stevens Institute of Technology), Ruotong Yu (Stevens Institute of Technology)
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection
Joseph Connelly (Boise State University), Taylor Roberts (Boise State University), Xing Gao (University of Delaware), Jidong Xiao (Boise State University), Haining Wang (Virginia Tech), Angelos Stavrou (Virginia Tech)
|
15:45 - 16:30 (GMT+01)
:45 - :30 ()
|
R8 - Fault Injection Chair : Timothy Tsai
FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection
Koustubha Bhat (Vrije Universiteit Amsterdam), Erik van der Kouwe (Vrije Universiteit Amsterdam), Herbert Bos (Vrije Universiteit Amsterdam), Cristiano Giuffrida (Vrije Universiteit Amsterdam)
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips
Romain Cayre (CNRS, LAAS; APSYS.Lab, APSYS), Florent Galtier (CNRS, LAAS), Guillaume Auriol (CNRS, LAAS; Univ de Toulouse, INSA), Vincent Nicomette (CNRS, Univ de Toulouse, INSA), Mohamed Kaâniche (CNRS,LAAS), Géraldine Marconato (APSYS.Lab, APSYS)
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections
Romain Cayre (CNRS, LAAS; APSYS.Lab, APSYS), Florent Galtier (CNRS, LAAS), Guillaume Auriol (CNRS, LAAS; Univ de Toulouse, INSA), Vincent Nicomette (CNRS, Univ de Toulouse, INSA), Mohamed Kaâniche (CNRS, LAAS), Géraldine Marconato (APSYS.Lab, APSYS)
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses
Chad Spensky (University of California, Santa Barbara), Aravind Machiry (Purdue University), Nathan Burow (MIT Lincoln Laboratory), Hamed Okhravi (MIT Lincoln Laboratory), Rick Housley (United Technologies), Zhongshu Gu (IBM T.J. Watson Research Center), Hani Jamjoom (IBM T.J. Watson Research Center), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)
|
16:40 - 17:25 (GMT+01)
:40 - :25 ()
|
I4 - Poster Session
|
16:40 - 17:25 (GMT+01)
:40 - :25 ()
|
R9 - Trusted Execution Environments Chair : Sonia Ben Mokhtar
Practical and Efficient in-Enclave Verification of Privacy Compliance
Weijie Liu (Indiana University Bloomington), Wenhao Wang (Institute of Information Engineering, Chinese Academy of Sciences), Hongbo Chen (Indiana University Bloomington), Xiao Feng Wang (Indiana University Bloomington), Yaosong Lu (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences), Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences), Xinyu Wang (Shanghai Jiao Tong University), Qintao Shen (SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Yi  Chen (The ;Chinese University of Hong Kong), Haixu Tang (Indiana University Bloomington)
ADAM-CS: Advanced Asynchronous Monotonic Counter Service
Franz Gregor (TU Dresden; Scontain UG), Robert Krahn (TU Dresden), Cong Lian (TU Dresden), André Martin (TU Dresden), Pascal Felber (University of Neuchatel), Valerio Schiavoni (University of Neuchatel), Christof Fetzer (TU Dresden; Scontain UG)
EncDBDB: Searchable Encrypted Fast Compressed In-Memory Database Using Enclaves
Benny Fuhry (SAP SE), Jayanth Jain Hassan Ajith Kumar (SAP SE), Florian Kerschbaum (University of Waterloo)
|
16:40 - 17:25 (GMT+01)
:40 - :25 ()
|
R10 - Modeling Chair : Karthik Pattabiraman
Conservative Confidence Bounds in Safety From Generalised Claims of Improvement and Statistical Evidence
Kizito Salako (City University of London), Lorenzo Strigini (City University of London), Xingyu Zhao (University of Liverpool)
Model Checking the Multi-Formalism Language FIGARO
Shahid Khan (RWTH Aachen University), Matthias Volk (RWTH Aachen University), Joost-Pieter Katoen (RWTH Aachen University), Alexis Braibant (Électricité de France),
Marc Bouissou (Électricité de France)
AVIS: In-Situ Model Checking for Unmanned Aerial Vehicles
Max Taylor (The Ohio State University), Haicheng Chen (The Ohio State University),
Feng Qin (The Ohio State University), Christopher Stewart (The Ohio State University)
|
Loading...
|