bandeauDSN_2021.jpg

final Program > june 24th

Time 

Thursday, June 24th






14:00
-
14:45 (GMT+01)


:00
-
:45 ()

Keynote III: Moin Qureshi

Chair : Michael R. Lyu



Reliable Quantum Computing Needs Intelligent Software and Hardware


  Quantum computers can solve commercially important problems that are beyond the capability of conventional computers. Quantum computing is at an inflection point where small systems with a few dozen qubits have been demonstrated and the number of qubits is expected to increase to several hundred over the coming years. As qubits are low-energy devices, they are susceptible to high error-rates (in the range of 0.1% to 1% per operation). Unfortunately, quantum error-correction incurs a significant overhead (dozens/hundreds of physical qubits per faulttolerant qubit) and is impractical for near-term machines. Therefore, hardware errors will continue to severely restrict the length of the program that can be reliably executed on a nearterm quantum computer. In this talk, I will offer a computer-systems perspective of quantum computers and then share some of our recent work that improves the reliability of near-term quantum computers with intelligent software techniques. I will also discussthe hardware support necessary to enable large-scale quantum computers.






















14:50
-
15:35 (GMT+01)


:50
-
:35 ()

Award Announcements and Recognitions


Rising Star in Dependability Award

  Chair : William H. Sanders

  Winner :

Devesh Tiwari

Northeastern University, US

Citation from the nomination letter:

  For fundamental and translational research contributions, impacting the     reliability and efficiency of real-world computer systems



Jean-Claude Laprie Award

  Chair : Elmootazbellah (Mootaz) N. Elnozahy

  Winner : Measurement and Modeling of Computer Reliability as Affected by System Activity                  Iyer, Ravishankar K. and Rossetti, David J and Hsueh, Mei-Chen. ACM TOCS 1986

Test of time Award

  Chair : Miguel Correia

  Winner :
                  ●
Zab: High-performance broadcast for primary-backup systems, by Flavio P. Junqueira,                     Benjamin C. Reed, Marco Serafini, 41st Annual IEEE/IFIP International Conference on                     Dependable Systems and Networks (DSN'11), DCCS track, Hong Kong, China, pp. 245-256

                  OS diversity for intrusion tolerance: Myth or reality?, by Miguel Garcia, Alysson                     Bessani, Ilir Gashi, Nuno Neves, Rafael Obelheiro, 41st Annual IEEE/IFIP International                     Conference on Dependable Systems and Networks (DSN'11), PDS Track, Chicago, US, pp.                     383-394


Best Paper Award

  Chair : Mohamed Kaâniche


Fast Abstracts Best Paper Award

  Chair : Chun-Ying Huang







15:40
-
16:25 (GMT+01)


:40
-
:25 ()

Best of SELSE

Chair : Alan Wood


TQEA: Temporal Quantum Error Analysis

  Betis Baheri (Kent State University), Daniel Chen (Case Western University), Bo Fang (Pacific National   Northwest Lab), Samuel A. Stein (Fordham University), Ying Mao (Fordham University), Vipin Chaudhary   (Case Western University), Shuai Xu (Case Western University), Ang Li (Pacific National Northwest Lab),   and Qiang Guan (Kent State University)


A Novel GPU Overdrive Fault Attack

  Majid Sabbagh, Yunsi Fei, and David Kaeli (ECE Dept, Northeastern University)


Simulation-based Fault Injection in Advanced Driver Assistance Systems Modelled in SUMO

  Mehdi Maleki and Behrooz Sangchoolie (RISE Research Institutes of Sweden)





15:40
-
16:25 (GMT+01)


:40
-
:25 ()

I5 - Modeling and Analysis

Chair : Richard Boivie, IBM Research



Near-Real time Server Reboot Monitoring and Root Cause Analysis in a Large-Scale System

  Fred Lin, Bhargav Bolla, Eric Pinkham, Neil Kodner, Daniel Moore, Amol Desai and Sriram Sankar.

BACgraph: Automatic Extraction of Object Relationships in the BACnet Protocol

  Herson Esquivel-Vargas, Marco Caselli and Andreas Peter.

SymPLe: Complexity-Aware Design for Safety Critical I&C Systems

  Richard Hite, Abhi Rajagopala, Smitha Gautham, Christopher Deloglos, Athira Varma Jayakumar, Aidan   Collins, Carl Elks and Matt Gibson.

15:40
-
16:25 (GMT+01)


:40
-
:25 ()

R11 - IoT and Cyber Physical Systems

Chair : Saurabh Bagchi


Data-driven Design of Context-aware Monitors for Hazard Prediction in Artificial Pancreas Systems

  Xugui Zhou (University of Virginia), Bulbul Ahmed (University of Florida), James H. Aylor (University of   Virginia), Philip Asare (University of Toronto), Homa Alemzadeh (University of Virginia)


Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements

  Morteza Safaei Pour (University of Texas at San Antonio), Dylan Watson (University of Texas at San   Antonio), Elias Bou-Harb (University of Texas at San Antonio)


Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers

  Sriharsha Etigowni (Rutgers University), Sizhuang Liang (Georgia Institute of Technology), Saman   Zonouz (Rutgers University), Raheem Beyah (Georgia Institute of Technology)


Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony

  Zhengxian He (Georgia Institute of Technology), Mohit Narayan Rajput (Citrix Systems), Mustaque   Ahamad (Georgia Institute of Technology)

15:40
-
16:25 (GMT+01)


:40
-
:25 ()

R12 - Software Dependability

Chair : Miguel Correia


BigMap: Future-proofing Fuzzers with Efficient Large Maps

  Alif Ahmed (University of Virginia), Jason D. Hiser (University of Virginia), Anh Nguyen-Tuong (University   of Virginia), Jack W. Davidson (University of Virginia), Kevin Skadron (University of Virginia)


When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid

  Daoyuan Wu (The Chinese University of Hong Kong), Debin Gao (Singapore Management University),   Robert H. Deng (Singapore Management University), Rocky K. C. Chang (The Hong Kong Polytechnic   University),Daoyuan Wu (The Chinese University of Hong Kong)


Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation
  Pietro Borrello (Sapienza University of Rome), Emilio Coppa (Sapienza University of Rome), Daniele Cono   D'Elia (Sapienza University of Rome)


Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild
  Marvin Moog (CISPA Helmholtz Center for Information Security, Saarland University), Markus Demmel   (Saarland University), Michael Backes (CISPA Helmholtz Center for Information Security, Saarland   University), Aurore Fass (CISPA Helmholtz Center for Information Security, Saarland University)

16:35
-
17:00 (GMT+01)


:35
-
:00 ()

Business Meeting