final Program > june 24th
Time
|
Thursday, June 24th
|
14:00 - 14:45 (GMT+01)
:00 - :45 ()
|
Keynote III: Moin Qureshi
Chair : Michael R. Lyu
Reliable Quantum Computing Needs Intelligent Software and Hardware
Quantum computers can solve commercially important problems that are beyond the capability of conventional computers. Quantum computing is at an inflection point where small systems with a few dozen qubits have been demonstrated and the number of qubits is expected to increase to several hundred over the coming years. As qubits are low-energy devices, they are susceptible to high error-rates (in the range of 0.1% to 1% per operation). Unfortunately, quantum error-correction incurs a significant overhead (dozens/hundreds of physical qubits per faulttolerant qubit) and is impractical for near-term machines. Therefore, hardware errors will continue to severely restrict the length of the program that can be reliably executed on a nearterm quantum computer. In this talk, I will offer a computer-systems perspective of quantum computers and then share some of our recent work that improves the reliability of near-term quantum computers with intelligent software techniques. I will also discussthe hardware support necessary to enable large-scale quantum computers.
|
14:50 - 15:35 (GMT+01)
:50 - :35 ()
|
Award Announcements and Recognitions
● Rising Star in Dependability Award
Chair : William H. Sanders
Winner :
|
Devesh Tiwari
Northeastern University, US
Citation from the nomination letter:
For fundamental and translational research contributions, impacting the reliability and efficiency of real-world computer systems
|
● Jean-Claude Laprie Award
Chair : Elmootazbellah (Mootaz) N. Elnozahy
Winner : Measurement and Modeling of Computer Reliability as Affected by System Activity
Iyer, Ravishankar K. and Rossetti, David J and Hsueh, Mei-Chen. ACM TOCS 1986
● Test of time Award
Chair : Miguel Correia
Winner : ● Zab: High-performance broadcast for primary-backup systems, by Flavio P. Junqueira, Benjamin
C. Reed, Marco Serafini, 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'11), DCCS track, Hong Kong, China, pp. 245-256
●OS diversity for intrusion tolerance: Myth or reality?, by Miguel Garcia, Alysson Bessani, Ilir Gashi, Nuno Neves, Rafael Obelheiro, 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'11), PDS Track, Chicago, US, pp. 383-394
● Best Paper Award
Chair : Mohamed Kaâniche
● Fast Abstracts Best Paper Award
Chair : Chun-Ying Huang
|
15:40 - 16:25 (GMT+01)
:40 - :25 ()
|
Best of SELSE Chair : Alan Wood
TQEA: Temporal Quantum Error Analysis
Betis Baheri (Kent State University), Daniel Chen (Case Western University), Bo Fang (Pacific National Northwest Lab), Samuel A. Stein (Fordham University), Ying Mao (Fordham University), Vipin Chaudhary (Case Western University), Shuai Xu (Case Western University), Ang Li (Pacific National Northwest Lab), and Qiang Guan (Kent State University)
A Novel GPU Overdrive Fault Attack
Majid Sabbagh, Yunsi Fei, and David Kaeli (ECE Dept, Northeastern University)
Simulation-based Fault Injection in Advanced Driver Assistance Systems Modelled in SUMO
Mehdi Maleki and Behrooz Sangchoolie (RISE Research Institutes of Sweden)
|
15:40 - 16:25 (GMT+01)
:40 - :25 ()
|
I5 - Modeling and Analysis
Chair : Richard Boivie, IBM Research
Near-Real time Server Reboot Monitoring and Root Cause Analysis in a Large-Scale System
Fred Lin, Bhargav Bolla, Eric Pinkham, Neil Kodner, Daniel Moore, Amol Desai and Sriram Sankar.
BACgraph: Automatic Extraction of Object Relationships in the BACnet Protocol
Herson Esquivel-Vargas, Marco Caselli and Andreas Peter.
SymPLe: Complexity-Aware Design for Safety Critical I&C Systems
Richard Hite, Abhi Rajagopala, Smitha Gautham, Christopher Deloglos, Athira Varma Jayakumar, Aidan Collins, Carl Elks and Matt Gibson.
|
15:40 - 16:25 (GMT+01)
:40 - :25 ()
|
R11 - IoT and Cyber Physical Systems Chair : Saurabh Bagchi
Data-driven Design of Context-aware Monitors for Hazard Prediction in Artificial Pancreas Systems
Xugui Zhou (University of Virginia), Bulbul Ahmed (University of Florida), James H. Aylor (University of Virginia), Philip Asare (University of Toronto), Homa Alemzadeh (University of Virginia)
Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements
Morteza Safaei Pour (University of Texas at San Antonio), Dylan Watson (University of Texas at San Antonio), Elias Bou-Harb (University of Texas at San Antonio)
Physics-Aware Security Monitoring against Structural Integrity Attacks in 3D Printers
Sriharsha Etigowni (Rutgers University), Sizhuang Liang (Georgia Institute of Technology),
Saman Zonouz (Rutgers University), Raheem Beyah (Georgia Institute of Technology)
Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony
Zhengxian He (Georgia Institute of Technology), Mohit Narayan Rajput (Citrix Systems), Mustaque Ahamad (Georgia Institute of Technology)
|
15:40 - 16:25 (GMT+01)
:40 - :25 ()
|
R12 - Software Dependability Chair : Miguel Correia
BigMap: Future-proofing Fuzzers with Efficient Large Maps
Alif Ahmed (University of Virginia), Jason D. Hiser (University of Virginia), Anh Nguyen-Tuong (University of Virginia), Jack W. Davidson (University of Virginia), Kevin Skadron (University of Virginia) When Program Analysis Meets Bytecode Search: Targeted and Efficient Inter-procedural Analysis of Modern Android Apps in BackDroid
Daoyuan Wu (The Chinese University of Hong Kong), Debin Gao (Singapore Management University), Robert H. Deng (Singapore Management University), Rocky K. C. Chang (The Hong Kong Polytechnic University),Daoyuan Wu (The Chinese University of Hong Kong)
Hiding in the Particles: When Return-Oriented Programming Meets Program Obfuscation Pietro Borrello (Sapienza University of Rome), Emilio Coppa (Sapienza University of Rome), Daniele Cono D'Elia (Sapienza University of Rome)
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild Marvin Moog (CISPA Helmholtz Center for Information Security, Saarland University), Markus Demmel (Saarland University), Michael Backes (CISPA Helmholtz Center for Information Security, Saarland University), Aurore Fass (CISPA Helmholtz Center for Information Security, Saarland University) |
16:35 - 17:00 (GMT+01)
:35 - :00 ()
|
Business Meeting
|
|