bandeauDSN_2021.jpg

final Program > june 23rd

Time 

Wednesday, June 23rd





14:00
-
14:45 (GMT+01)


:00
-
:45 ()

Keynote II: Marina Thottan

Chair : Lelio Di Martino



Future of Network and Service Automation: Resiliency Challenges for Communicating to the Limit


  We are at the dawn of an era of profound human progress based on digitalization. Digital transformation drives a set of new requirements that have the network at the center, connecting everything, providing compute wherever it is needed, and applying insights to execute with precision. To accomplish this, networks must be able to connect everything simultaneously, whenever necessary, with guaranteed reliability and security, even as the number, diversity, social and operating condition change. Innovation in automating networks and in creating new network-as-a-service platforms will be the key element enabling Communication Service Providers (CSPs) to finally become the new Digital Service Providers (DSPs) of the future. This talk illustrates the key challenges and innovation needed for creating the resilient hyper-connected automated network of the future.



14:50
-
15:35 (GMT+01)


:50
-
:35 ()

FA1 : Hosted/Moderated by Prof. Hauro Yokota


  #1 Cleaning the NVD: Comprehensive Quality Assessment, Improvements, and Analyses

  #2 Systemically Evaluating the Robustness of ML-based IoT Malware Detectors

  #4 Detecting Operational Adversarial Examples for Reliable Deep Learning

  #17 S-ADA: Software as an Autonomous, Dependable and Affordable System

  #18 Finding Web Application Vulnerabilities with an Ensemble Fuzzing




14:50
-
15:35 (GMT+01)


:50
-
:35 ()

I2


Keynote Speaker: Algirdas Avižienis, Vytautas Magnus University, Kaunas, Lithuania and University of                              California Los Angeles (UCLA), USA

Title : Fault Tolerance Was Available to Prevent Boeing 737 MAX Airplane Crashes and Their Costly           Consequences

Abstract:

  I present two fault tolerance methods (QR and MD) for Angle-of-Attack sensors that were ;available to prevent the fatal crashes of two Boeing 737 MAX airplanes: Lion Air Flight 610 and Ethiopian Airlines Flight 302. Unfortunately, those methods were not implemented by Boeing. In Part One I identify a vulnerability (dormant design fault) that was created when new MCAS software was added to the software of Flight Control Computers. The vulnerability was not detected after the first crash, therefore it caused the second crash that led to the grounding of all 737 MAX airplanes for 20 months while MCAS was (unnecessarily) redesigned and certified. In Part Two I discuss the “Final Rule” document issued by the FAA that states the required changes in the 737 MAX design for certification. Fault tolerance is not required. I identify two flaws in the “Final Rule” document and recommend an improvement.

14:50
-
15:35 (GMT+01)


:50
-
:35 ()

R5 - Machine Learning for Dependability

Chair : Peng Liu


Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection

  Shouguo Yang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber   Security, University of Chinese Academy of Sciences), Long Cheng (School of Computing, Clemson   University), Yicheng Zeng (Institute of Information Engineering, Chinese Academy of Sciences; School of   Cyber Security, University of Chinese Academy of Sciences), Zhe Lang (Institute of Information   Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of   Sciences), Hongsong Zhu (Institute of Information Engineering, Chinese Academy of Sciences; School of   Cyber Security, University of Chinese Academy of Sciences), Zhiqiang Shi (Institute of Information   Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of   Sciences)


Sentiment Analysis based Error Detection for Large-Scale Systems

  Khalid Ayedh Alharthi (University of Warwick and University of Bisha), Arshad Jhumka (University of   Warwick),   Sheng Di (Argonne National Laboratory), Franck Cappello (Argonne National Laboratory and   University of   Illinois at Urbana-Champaign), Edward Chuah (Lancaster University)


Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users

  Lun-Pin Yuan (Pennsylvania State University), Euijin Choo (Qatar Computing Research Institute), Ting Yu   (Qatar Computing Research Institute), Issa Khalil (Qatar Computing Research Institute), Sencun Zhu   (Pennsylvania State University)


General Feature Selection for Failure Prediction of Large-scale SSD Deployment

  Fan Xu (Alibaba), Shujie Han (The Chinese University of Hong Kong), Patrick P. C. Lee (The Chinese   University of Hong Kong), Yi Liu (Alibaba), Cheng He (Alibaba), Jiongzhou Liu (Alibaba)

14:50
-
15:35 (GMT+01)


:50
-
:35 ()

R6 - GPUs

Chair : Bo Fang


Data-centric Reliability Management in GPUs

  Gurunath Kadam (William & Mary), Evgenia Smirni (William & Mary), Adwait Jog (William & Mary)


NVBitFI: Dynamic Fault Injection for GPUs

  Timothy Tsai (NVIDIA Research), Siva Kumar Sastry Hari (NVIDIA), Michael Sullivan (NVIDIA), Oreste   Villa (NVIDIA), Stephen W. Keckler (NVIDIA Research)


Revealing GPUs Vulnerabilities by Combining Register-Transfer and Software Level Fault Injection

  Fernando Fernandes dos Santos (Universidade Federal do Rio Grande do Sul (UFRGS)), Josie Esteban   Rodriguez   Condia (Politecnico di Torino), Luigi Carro (Universidade Federal do Rio Grande do Sul   (UFRGS)), Matteo Sonza   Reorda (Politecnico di Torino), Paolo Rech (UFRGS; Politecnico di Torino)


Examining Failures and Repairs on Supercomputers with Multi-GPU Compute Nodes

  Amir Taherin (Northeastern University), Tirthak Patel (Northeastern University), Devesh Tiwari   (Northeastern University), Giorgis Georgakoudis (Lawrence Livermore National Laboratory), Ignacio   Laguna (Lawrence Livermore National Laboratory)


15:45
-
16:30 (GMT+01)


:45
-
:30 ()

FA2 : Hosted/Moderated by Prof. Chun-Ying Huang


  #9 Iteratively Checking Program Properties Involving Non-Boolean Values

  #10 Negotiating PQC for DNSSEC

  #13 Spatio-Temporal Split Learning

  #14 Mitigation of Automotive Control Modules Hardware Replacement-based Attacks Through Hardware          Signature

  #15 Machine Learning Analysis of IP ID Applications





15:45
-
16:30 (GMT+01)


:45
-
:30 ()

I3 - Security

Chair : Karthik Swaminathan, IBM Research



Designing Adversarial Attack and Defence for Robust Android Malware Detection Models

  Hemant Rathore, Sanjay K. Sahay, Jasleen Dhillon and Mohit Sewak.

A Matter of Trust: Verification of Security and Performance for Network Platform as a Service

  Tim Alberdingk Thijm, Gary Atkinson, Lalita Jagadeesan and Marina Thottan.

Hardware Support for Low-Cost Memory Safety

  Rick Boivie, Gururaj Saileshwar, Tong Chen, Benjamin Segal and Alper Buyuktosunoglu.

15:45
-
16:30 (GMT+01)


:45
-
:30 ()

R7 - Systems Security

Chair : Simin Nadjm-Tehrani


An Application Agnostic Defense Against the Dark Arts of Cryptojacking

  Nada Lachtar (Univ. Michigan), Abdulrahman Abu Elkhail (Univ. Michigan), Anys Bacha (Univ. Michigan),   Hafiz Malik (Univ. Michigan)


Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions

  Chao Su (Nanjing University), Xuhua Ding (Singapore Management University), Qingkai Zeng (Nanjing   University)


Towards Optimal Use of Exception Handling Information for Function Detection

  Chengbin Pang (Stevens Institute of Technology), Ruotong Yu (Stevens Institute of Technology), Dongpeng   Xu (University of New Hampshire), Eric Koskinen (Stevens Institute of Technology), Georgios Portokalidis   (Stevens Institute of Technology), Jun Xu (Stevens Institute of Technology), Ruotong Yu (Stevens Institute   of Technology)


CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection

  Joseph Connelly (Boise State University), Taylor Roberts (Boise State University), Xing Gao (University of   Delaware), Jidong Xiao (Boise State University), Haining Wang (Virginia Tech), Angelos Stavrou (Virginia   Tech)

15:45
-
16:30 (GMT+01)


:45
-
:30 ()

R8 - Fault Injection

Chair : Timothy Tsai


FIRestarter: Practical Software Crash Recovery with Targeted Library-level Fault Injection

  Koustubha Bhat (Vrije Universiteit Amsterdam), Erik van der Kouwe (Vrije Universiteit Amsterdam),   Herbert Bos (Vrije Universiteit Amsterdam), Cristiano Giuffrida (Vrije Universiteit Amsterdam)


WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips

  Romain Cayre (CNRS, LAAS; APSYS.Lab, APSYS), Florent Galtier (CNRS, LAAS), Guillaume Auriol (CNRS,   LAAS; Univ de Toulouse, INSA), Vincent Nicomette (CNRS, Univ de Toulouse, INSA), Mohamed Kaâniche   (CNRS,LAAS), Géraldine Marconato (APSYS.Lab, APSYS)


InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections

  Romain Cayre (CNRS, LAAS; APSYS.Lab, APSYS), Florent Galtier (CNRS, LAAS), Guillaume Auriol (CNRS,   LAAS; Univ de Toulouse, INSA), Vincent Nicomette (CNRS, Univ de Toulouse, INSA), Mohamed Kaâniche   (CNRS, LAAS), Géraldine Marconato (APSYS.Lab, APSYS)


Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses

  Chad Spensky (University of California, Santa Barbara), Aravind Machiry (Purdue University), Nathan   Burow (MIT Lincoln Laboratory), Hamed Okhravi (MIT Lincoln Laboratory), Rick Housley (United   Technologies), Zhongshu Gu (IBM T.J. Watson Research Center), Hani Jamjoom (IBM T.J. Watson Research   Center), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa   Barbara)

16:40
-
17:25 (GMT+01)


:40
-
:25 ()

I4 - Poster Session


16:40
-
17:25 (GMT+01)


:40
-
:25 ()

R9 - Trusted Execution Environments

Chair : Sonia Ben Mokhtar


Practical and Efficient in-Enclave Verification of Privacy Compliance

  Weijie Liu (Indiana University Bloomington), Wenhao Wang (Institute of Information Engineering,   Chinese Academy of Sciences), Hongbo Chen (Indiana University Bloomington), Xiao Feng Wang   (Indiana University Bloomington), Yaosong Lu (SKLOIS, Institute of Information Engineering, Chinese   Academy of Sciences), Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences),   Xinyu Wang (Shanghai Jiao Tong University), Qintao Shen (SKLOIS, Institute of Information Engineering,   Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Yi   Chen (The ;Chinese University of Hong Kong), Haixu Tang (Indiana University Bloomington)


ADAM-CS: Advanced Asynchronous Monotonic Counter Service

  Franz Gregor (TU Dresden; Scontain UG), Robert Krahn (TU Dresden), Cong Lian (TU Dresden), André   Martin (TU Dresden), Pascal Felber (University of Neuchatel), Valerio Schiavoni (University of Neuchatel),   Christof Fetzer (TU Dresden; Scontain UG)


EncDBDB: Searchable Encrypted Fast Compressed In-Memory Database Using Enclaves

  Benny Fuhry (SAP SE), Jayanth Jain Hassan Ajith Kumar (SAP SE), Florian Kerschbaum (University of   Waterloo)

16:40
-
17:25 (GMT+01)


:40
-
:25 ()

R10 - Modeling

Chair : Karthik Pattabiraman


Conservative Confidence Bounds in Safety From Generalised Claims of Improvement and Statistical Evidence

  Kizito Salako (City University of London), Lorenzo Strigini (City University of London), Xingyu Zhao   (University of Liverpool)


Model Checking the Multi-Formalism Language FIGARO

  Shahid Khan (RWTH Aachen University), Matthias Volk (RWTH Aachen University), Joost-Pieter Katoen   (RWTH Aachen University), Alexis Braibant (Électricité de France), Marc Bouissou (Électricité de France)


AVIS: In-Situ Model Checking for Unmanned Aerial Vehicles

  Max Taylor (The Ohio State University), Haicheng Chen (The Ohio State University), Feng Qin (The Ohio   State University), Christopher Stewart (The Ohio State University)