Program

Final Program: pdf

 

 Monday, June 22nd
08:00 – 09:00 Registration
09:00 – 10:30 WS1: Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE) WS2:   Safety and Security of Intelligent Vehicles (SSIV) WS3: Model Based Design for Cyber-Physical Systems (MB4CP) Tutorial 1: Mitigation of Soft Errors: From Adding Selective Redundancy to Changing the Abstraction Stack Tutorial 2: Disaster Recovery for Enterprise-Class Clouds
10:30 – 11:00 Break
11:00 – 12:30 WS1: RADIANCE (Cont’d) WS2: SSIV (Cont’d) WS3: MB4CP (Cont’d) Tutorial 1 (Cont’d) Tutorial 2 (Cont’d)
12:30 – 14:00 Lunch
14:00 – 15:45 WS1: RADIANCE (Cont’d) WS2: SSIV (Cont’d) WS4:  Software-Defined Networks and Network Function Virtualization (DISN) Tutorial 3: Techniques and Tools to Defend against Web Application’s Software Vulnerabilities Tutoria l4: Cyber-Physical Control Systems: Vulnerabilities, Threats and Mitigations
15:45 – 16:15 Break
16:15 – 18:00 WS1: RADIANCE (Cont’d) WS2: SSIV (Cont’d) WS4: DISN (Cont’d) Tutorial 3 (Cont’d) Tutorial 3 (Cont’d)
18:30 – 20:30 Welcome Reception

 

 

 Tuesday, June 23rd
08:00 – 09:00 Registration
09:00 – 09:30 Welcome Address and Jean-Claude Laprie Award Ceremony
09:30 – 11:00 Best Paper Award Session

  • Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
    Samuel Jero, Hyojeong Lee, Cristina Nita-Rotaru (Purdue University, USA)
  • Δ-encoding: Practical Encoded Processing
    Dmitrii Kuvaiskii, Germany, Christof Fetzer (Technische Universität Dresden, Germany)
  • Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5,000,000 HPC Application Runs
    Catello Di Martino, Zbigniew Kalbarczyk, William Kramer, Ravishankar K. Iyer  (University of Illinois at Urbana-Champaign, USA)
11:00 – 11:30 Break
11:30 – 12:30 TS1A: Large-Scale SystemsUnderstanding and Exploiting Spatial Properties of System Failures on Extreme-Scale HPC SystemsSaurabh Gupta, Devesh Tiwari, Christopher Jantzi, James Rogers, Don Maxwell (Oak Ridge National Laboratory, USA)Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log DataAlina Oprea, Zhou Li (RSA Laboratories, USA),Ting-Fang Yen (E8 Security, USA), Sang H. Chin (Draper Laboratory and Boston University, USA), Sumayah Alrwais (Indiana University, USA) TS1B: Attack MitigationLEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program AnalysisZhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu (Purdue University, USA)OnionBots: Subverting Privacy Infrastructure for Cyber AttacksAmirali Sanatinia, Guevara Noubir (Northeastern University, USA) TS1C: Modeling and MetricsA Statistical Approach for Timed Reachability in AADL ModelsHarold Bruintjes, Joost-Pieter Katoen (RWTH Aachen University, Germany), David Lesens (Airbus Defence and Space, France)
Scalable Analysis of Fault Trees with Dynamic FeaturesJan Krčál, Saarland (University, Germany), Pavel Krčál (Lloyd’s Register Consulting and Uppsala University, Sweden)
12:30 – 14:00 Lunch
14:00 – 15:30 TS2A: Secure ExecutionThe Power of Evil Choices in Bloom FiltersThomas Gerbet (Université Joseph Fourier, France), Amrit Kumar, Cédric Lauradoux (INRIA, France)Secure Dynamic Software Loading and Execution using Cross Component VerificationByungho Min, Vijay Varadharajan (Macquarie University, Australia)Parallax: Implicit Code Integrity Verification Using Return-Oriented ProgrammingDennis Andriesse, Herbert Bos, Asia Slowinska (VU University Amsterdam, The Netherlands) TS2B: Storage SystemsTIP-code: A Three Independent Parity Code to Tolerate Triple Disk Failures with Optimal Update ComplexityYongzhe Zhang, Chentao Wu, Jie Li, Minyi Guo (Shanghai Jiao Tong University, China and University of Tsukuba, Japan)Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems,Runhui Li, Yuchong Hu, Patrick P. C. Lee (The Chinese University of Hong Kong, China)Grouping-based Elastic Striping with Hotness Awareness for Improving SSD RAID PerformanceYubiao Pan, Yongkun Li, Yinlong Xu, Zhipeng Li (University of Science & Technology of China) TS2C: Web ServicesJoza: Hybrid Taint Inference for Defeating Web Application SQL Injection AttacksAbbas Naderi-Afooshteh, Anh Nguyen-Tuong, Mandana Bagheri‑Marzijarani, Jason D. Hiser, Jack W. Davidson (University of Virginia, USA)
Private Browsing Mode Not Really That Private: Dealing with Privacy Breaches Caused by Browser ExtensionsBin Zhao, Peng Liu (The Pennsylvania State University, USA)
Test-based Interoperability Certification for Web ServicesIvano Alessandro Elia, Nuno Laranjeiro, Marco Vieira (University of Coimbra, Portugal)
15:30 – 16:00 Break
16:00 – 17:30 TS3A: Data Clusters, Servers and CloudsUnderstanding the Dark Side of Big Data Clusters: An Analysis beyond FailuresAndrea Rosà (Università della Svizzera Italiana, Switzerland), Lydia Y. Chen (IBM Research Lab. Zurich, Switzerland), Walter Binder (Università della Svizzera Italiana, Switzerland)Improving Reliability with Dynamic Syndrome Allocation in Intelligent Software Defined Data CentersUlya Bayram, Eric W.D. Rozier (University of Cincinnati, USA), Dwight Divine (University of Illinois, USA), Pin Zhou (Datos IO, Inc., USA)Experiences with Building Disaster Recovery for Enterprise-Class CloudsLong Wang, Harigovind V. Ramasamy, Richard E. Harper (IBM T. J. Watson Research Center, USA), Mahesh Viswanathan (IBM Cloud, USA), Edmond Plattier (IBM Global Technology Services, France) TS3B: Attack PreventionFloodGuard: A DoS Attack Prevention Extension in Software-Defined NetworksHaopei Wang, Lei Xu, GuofeiGu (Texas A&M University, USA)Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space RandomizationSeung Hun Kim (Yonsei University, Republic of Korea), Lei Xu, Ziyi Liu (University of Houston, USA), Zhiqiang Lin (The University of Texas at Dallas, USA), Won Woo Ro (Yonsei University, Republic of Korea), Weidong Shi (University of Houston, USA)Hide & Share: Landmark-based Similarity for Private KNN ComputationDavide Frey (INRIA Rennes, France), Rachid Guerraoui (EPFL, Switzerland), Anne-Marie Kermarrec, Antoine Rault (INRIA Rennes, France), François Taïani (University of Rennes 1, France), Jingjing Wang (EPFL, Switzerland) TS3C: Modeling and AssessmentEnergy Resilience Modeling for Smart HousesHamed Ghasemieh, Boudewijn R. Haverkort, Marijn R. Jongerden, Anne Remke (University of Twente, The Netherlands and University of Münster, Germany)
Impact of Malfunction on the Energy Efficiency of Batch Processing SystemsMarcello Cinque, Domenico Cotroneo, Flavio Frattini, Stefano Russo (Università degli Studi di Napoli Federico II, Italy)
phpSAFE: A Security Analysis Tool for OOP Web Application PluginsPaulo Nunes, José Fonseca (University of Coimbra, Portugal and Polytechnic Institute of Guarda, Portugal), Marco Vieira (University of Coimbra, Portugal)

 

                                                                                                   Wednesday, June 24tth
08:30 – 10:00 Keynote Address 1:  Bart Preneel (Katholieke Universiteit Leuven, Belgium)
10:00 – 10:30 IEEE Technical Innovation Award Ceremony
10:30 – 11:00 Break
11:00 – 12:30 TS4A: Mitigation of Hardware FaultsBAAT: Towards Dynamically Managing Battery Aging in Green DatacentersLongjun Liu (Xi’an Jiaotong University, China and University of Florida, USA), Chao Li (Shanghai Jiao Tong University, China), Hongbin Sun (Xi’an Jiaotong University, China), Yang Hu, Juncheng Gu, Tao Li (University of Florida, USA)Avoiding Pitfalls in Fault-Injection Based Comparison of Program Susceptibility to Soft ErrorsHorst Schirmeier, Christoph Borchert, Olaf Spinczyk (Technische Universität Dortmund, Germany)

Warped-RE: Low-Cost Error Detection and Correction in GPUs

Mohammad Abdel-Majeed, Waleed Dweik, Hyeran Jeon, Murali Annavaram (University of Southern California, USA)

TS4B: Mobile DevicesDecomposable Trust for Android ApplicationsEarlence Fernandes, AjitAluri, Alexander Crowell, Atul Prakash (University of Michigan, USA)Reducing Refresh Power in Mobile Devices with Morphable ECCChiachen Chou, Prashant Nair, Moinuddin K. Qureshi (Georgia Institute of Technology, USA)

TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices

He Sun (Chinese Academy of Science, China and College of William and Mary, USA), Kun Sunz (College of William and Mary, USA), Yuewu Wang (Chinese Academy of Science, China), Jiwu Jing (Chinese Academy of Science, China), Haining Wang (University of Delaware, USA)

Fast Abstracts IThe Delta Network: Measuring and Comparing the Performance of Heterogeneous Vehicular Network, Cristiano Silva, Wagner Meira Jr.Fault-Tolerant Clock Synchronization Protocol in Multi-Ring Topologies, Klaus Echtle, Zoha MoztarzadehProactive Dependability Framework for Smart Environment Applications, Ehsan Ullah, Warriach,Tanir Ozcelebi, Johan LukkienAdaptive Dynamic Software Diversity: Towards Feedback-Based Resilience, Andrea Höller, Tobias Rauter, Johannes Iber, Christian Kreiner

A System-Level Solution for Dependable Heterogeneous MPSoCs, Ahmed Ibrahim, Hans Kerhoff

Why Phishing becomes a Precursor to Brutal Cyber Attacks? Comparative Evaluation Framework of Mitigation Approaches, Mansour Alsaleh, Abdulrahman Alarifi

New Techniques for Streaming Authenticated Data Structure, Chia‑Mu Yu, Shin-Ying Huang, Yennun Huang

Detection of Cache Pollution Attacks Using Improved Online Sequential Extreme Learning Machine in Named Data Networking, Haoqiu Huang

12:30 – 14:00 Lunch
14:00 – 15:30 TS5A: Network Security and ConsensusDelving into Internet DDoS Attacks by Botnets: Characterization and AnalysisAn Wang (George Mason University, USA), Aziz Mohaisen (Verisign Labs, USA), Wentao Chang, Songqing Chen (George Mason University, USA)Consensus RefinedOgnjen Marić, Christoph Sprenger, David Basin (ETH Zurich, Switzerland)

Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks

Babak Rahbarinia (University of Georgia, USA), Roberto Perdisci, Manos Antonakakis (University of Georgia and Georgia Institute of Technology, USA)

TS5B: Memory ErrorsRevisiting Memory Errors in Large-Scale Production Data Centers: Analysis and Modeling of New Trends from the FieldJustin Meza, Qiang Wu, Sanjeev Kumar, Onur Mutlu (Carnegie Mellon University, USA and Facebook, Inc., USA)AVATAR: A Variable-Retention-Time (VRT) Aware Refresh for DRAM SystemsMoinuddin K. Qureshi, Dae-Hyun Kim, Samira Khan, Prashant J. Nair, Onur Mutlu (Carnegie Mellon University, USA and Georgia Institute of Technology, USA)

Read Disturb Errors in MLC NAND Flash Memory: Characterization, Mitigation and Recovery

Yu Cai, Yixin Luo, Saugata Ghose, Onur Mutlu (Carnegie Mellon University, USA)

Fast Abstracts IIChallenges of Assessing the Hypercall Interface Robustness, Diogo Carvalho, Nuno Antunes, Marco Vieira, Aleksandar Milenkoski, Samuel KounevOptimal Control vs. Safety Red Lines: Internet-Of-Things Safety via Micro-Policies, Saman Zonouz, Robin BerthierDistributed Instrumentation & Control (I&C) architecture: Design and Validation, Patrick Salaun, Marion Viel, Thibault Lemattre, Jean‑Francois Petin, Thomas RobertCyber Safety: Making Internet Dependable for User, Shivakant Mishra

A Methodology for Automatic Generation of Dependability Model for Industrial Processes Based on Ontologies and Bayesian Networks, Allan Venceslau, Raphaela Galhardo Fernandes, Luiz Guedes, Ivanovitch Silva

Locating Stuck-at Error in Quantum Boolean Circuits, Ting‑Hsu Chang, Chia-Mu Yu, Wei-Ho Chung, Sy-Yen Kuo

Implementation and evaluation of Collision-fast Atomic Broadcast protocols, Rodrigo Saramago, Lasaro Camargos

An Ontological Model for Constructing Mobius ADVISE Security Models, Ken Keefe

15:30 – 16:00 Break
16:00 – 19:30 Excursion
19:30 – 22:00  Banquet Best Paper and Carter Award Ceremony

 

 Thursday, June 25th
08:30 – 10:00 Keynote Address 2:  Virgílio Augusto Fernandes Almeida (University of Minas Gerais, Brazil)
10:00 – 10:30 Break
10:30 – 12:00 TS6A: FaultToleranceFine-Grained Characterization of Faults Causing Long Latency Crashes in ProgramsGuanpeng Li, Qining Lu, Karthik Pattabiraman (University of British Columbia, Vancouver, Canada)User-Constraint and Self-Adaptive Fault Tolerance for Event Stream Processing SystemsAndré Martin, Tiaraju Smaneoto, Tobias Dietze, Andrey Brito, Christof Fetzer (Technische Universität Dresden, Dresden, Germany and Universidade Federal de Campina Grande, Campina Grande, Brazil)Lightweight Memory CheckpointingDirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum (VU University Amsterdam, The Netherlands) TS6B: VulnerabilityDetection and MitigationHeapTherapy: An Efficient End-to-end Solution against Heap Buffer OverflowsQiang Zeng, Mingyi Zhao, Peng Liu (The Pennsylvania State University, USA)Smart-TV Security Analysis: Practical ExperimentsYann Bachy (LAAS-CNRS, France, INSA de Toulouse and Thales Communications & Security, France), Frédéric Basse (Thales Communications & Security, France), Vincent Nicomette, Eric Alata (LAAS-CNRS and INSA de Toulouse, France), Mohamed Kaâniche (LAAS-CNRS and Univ. de Toulouse, France), Jean‑Christophe Courrège (Thales Communications & Security, France), Pierre Lukjanenko (LAAS-CNRS, France)On the Metrics for Benchmarking Vulnerability Detection ToolsNuno Antunes, Marco Vieira (University of Coimbra, Portugal) Industrial Track
12:00 – 13:30 Lunch
13:30 – 15:00 TS7A: Assurance of ComplexSystemsFormal Assurance Arguments: A Solution In Search of a Problem?Patrick John Graydon (Mälardalen University, Västerås, Sweden, now at NASA Langley Research Center, USA)A Quality Control Engine for Complex Physical SystemsHaifeng Chen, Mizoguchi Takehiko, Yan Tan, Kai Zhang, Geoff Jiang (NEC Laboratories America, USA)Discovering and Visualizing Operations Processes with POD-Discovery and POD-VizIngo Weber, Chao Li, Xiwei Xu, Liming Zhu (SSRG, NICTA and University of New South Wales, Australia) TS7B: Preventing Memory and Information LeakageIncinerator – Eliminating Stale References in Dynamic OSGi Applications
Koutheir Attouchi (Orange Labs, France), Gaël Thomasy (Telecom SudParis, France), Gilles Muller, Julia Lawall (Inria/LIP6/UPMC/Sorbonne University, France), André Bottaro (Orange Labs, France)Risk Assessment of Buffer “Heartbleed” Over-read VulnerabilitiesJun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu (The Pennsylvania State University, USA)
Timely, Reliable, and Cost-effective Transport Service using Dissemination Graphs Amy Babay (Johns Hopkins University)Multi-Layer Anomaly Detection in Complex Dynamic Critical SystemsTommaso Zoppi (University of Florence)

A prediction approach for correlated failures in distributed computing systems

Weiwei Zheng (Beijing University of Posts and Telecommunications)

How to protect the protector?

Tobias Stumpf (TU Dresden)

Toward Survivable Intrusion-Tolerant Open-Source SCADA

Thomas Tantillo (Johns Hopkins University)

Counting the Frequency of Indirect Branches to Detect Return-Oriented Programming Attacks

Mateus Felipe Tymburibá Ferreira (Federal University of Minas Gerais)

Software-Based Fault Tolerance: Towards New Advances for COTS-Based Embedded Systems

Andrea Höller (Graz University of Technology)

15:15 – 16:30 Technical Committee Meeting