{"id":545,"date":"2015-04-28T13:49:21","date_gmt":"2015-04-28T13:49:21","guid":{"rendered":"http:\/\/2015.dsn.org\/?page_id=545"},"modified":"2015-04-28T13:49:21","modified_gmt":"2015-04-28T13:49:21","slug":"program","status":"publish","type":"page","link":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/","title":{"rendered":"Program"},"content":{"rendered":"<p>Final\u00a0Program:\u00a0<a title=\"Preliminary Program\" href=\"http:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-content\/uploads\/sites\/40\/2015\/04\/DSN2015_Final_Program.pdf\" target=\"_blank\"><img decoding=\"async\" class=\"alignnone size-full wp-image-563\" src=\"http:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-content\/uploads\/sites\/40\/2015\/04\/pdf.jpg\" alt=\"pdf\" width=\"40\" height=\"41\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<table class=\"aligncenter\" style=\"border-color: #000000;background-color: #ffffff\" border=\"1px\">\n<tbody>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 110px;border-color: #000000;text-align: center;background-color: #dddddd\" colspan=\"6\" width=\"91\"><strong>\u00a0<\/strong><strong>Mond<\/strong><strong>ay, Jun<\/strong><strong>e 22<\/strong><strong><sup>nd<\/sup><\/strong><\/td>\n<\/tr>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>08:00 \u2013 09:00<\/strong><\/td>\n<td style=\"width: 945px;text-align: center;background-color: #dddddd\" colspan=\"5\" width=\"945\"><em>Registration<\/em><\/td>\n<\/tr>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>09:00 \u2013 10:30<\/strong><\/td>\n<td style=\"text-align: center\" width=\"189\">WS1: Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE)<\/td>\n<td style=\"text-align: center\" width=\"189\">WS2:\u00a0\u00a0 Safety and Security of Intelligent Vehicles (SSIV)<\/td>\n<td style=\"text-align: center\" width=\"189\">WS3: Model Based Design for Cyber-Physical Systems (MB4CP)<\/td>\n<td style=\"text-align: center\" width=\"189\">Tutorial 1: Mitigation of Soft Errors: From Adding Selective Redundancy to Changing the Abstraction Stack<\/td>\n<td style=\"text-align: center\" width=\"189\">Tutorial 2: Disaster Recovery for Enterprise-Class Clouds<\/td>\n<\/tr>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>10:30 \u2013 11:00<\/strong><\/td>\n<td style=\"width: 945px;text-align: center;background-color: #dddddd\" colspan=\"5\" width=\"945\"><em>Break<\/em><\/td>\n<\/tr>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>11:00 \u2013 12:30<\/strong><\/td>\n<td style=\"text-align: center\" width=\"189\">WS1: RADIANCE (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">WS2: SSIV (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">WS3: MB4CP (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">Tutorial 1 (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">Tutorial 2 (Cont&#8217;d)<\/td>\n<\/tr>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>12:30 \u2013 14:00<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"5\" width=\"945\">Lunch<\/td>\n<\/tr>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>14:00 \u2013 15:45<\/strong><\/td>\n<td style=\"text-align: center\" width=\"189\">WS1: RADIANCE (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">WS2: SSIV (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">WS4:\u00a0 Software-Defined Networks and Network Function Virtualization (DISN)<\/td>\n<td style=\"text-align: center\" width=\"189\">Tutorial 3: Techniques and Tools to Defend against Web Application&#8217;s Software Vulnerabilities<\/td>\n<td style=\"text-align: center\" width=\"189\">Tutoria l4: Cyber-Physical Control Systems: Vulnerabilities, Threats and Mitigations<\/td>\n<\/tr>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>15:45 \u2013 16:15<\/strong><\/td>\n<td style=\"width: 945px;text-align: center;background-color: #dddddd\" colspan=\"5\" width=\"945\"><em>Break<\/em><\/td>\n<\/tr>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>16:15 \u2013 18:00<\/strong><\/td>\n<td style=\"text-align: center\" width=\"189\">WS1: RADIANCE (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">WS2: SSIV (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">WS4: DISN (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">Tutorial 3 (Cont&#8217;d)<\/td>\n<td style=\"text-align: center\" width=\"189\">Tutorial 3 (Cont&#8217;d)<\/td>\n<\/tr>\n<tr style=\"border-color: #000000\">\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>18:30 \u2013 20:30<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"5\" width=\"945\"><em>Welcome Reception<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<table style=\"height: 1945px;border-color: #000000\" border=\"1px\" width=\"1075\">\n<tbody>\n<tr>\n<td style=\"width: 96px;text-align: center;background-color: #dddddd\" colspan=\"4\" width=\"96\"><strong>\u00a0<\/strong><strong>Tuesday, June 23<sup>rd<\/sup><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"96\"><strong>08:00 \u2013 09:00<\/strong><\/td>\n<td style=\"width: 953px;text-align: center;background-color: #dddddd\" colspan=\"3\" width=\"953\"><em>Registration<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"96\"><strong>09:00 \u2013 09:30<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"3\" width=\"953\"><strong>Welcome Address and Jean-Claude Laprie Award Ceremony<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"96\"><strong>09:30 \u2013 11:00<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"3\" width=\"953\"><strong>Best Paper Award Session <\/strong><\/p>\n<ul>\n<li><strong>Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations<br \/>\n<\/strong>Samuel Jero, Hyojeong Lee, Cristina Nita-Rotaru (Purdue University, USA)<\/li>\n<\/ul>\n<ul>\n<li><strong>\u0394-encoding: Practical Encoded Processing<br \/>\n<\/strong>Dmitrii Kuvaiskii, Germany, Christof Fetzer (Technische Universit\u00e4t Dresden, Germany)<\/li>\n<\/ul>\n<ul>\n<li><strong>Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5,000,000 HPC Application Runs<br \/>\n<\/strong>Catello Di Martino, Zbigniew Kalbarczyk, William Kramer, Ravishankar K. Iyer\u00a0 (University of Illinois at Urbana-Champaign, USA)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"96\"><strong>11:00 \u2013 11:30<\/strong><\/td>\n<td style=\"width: 953px;text-align: center;background-color: #dddddd\" colspan=\"3\" width=\"953\"><em>Break <\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"96\"><strong>11:30 \u2013 12:30<\/strong><\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS1A: Large-Scale Systems<\/strong><strong>Understanding and Exploiting Spatial Properties of System Failures on Extreme-Scale HPC Systems<\/strong>Saurabh Gupta, Devesh Tiwari, Christopher Jantzi, James Rogers, Don Maxwell (Oak Ridge National Laboratory, USA)<strong>Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data<\/strong>Alina Oprea, Zhou Li (RSA Laboratories, USA),Ting-Fang Yen (E8 Security, USA), Sang H. Chin (Draper Laboratory and Boston University, USA), Sumayah Alrwais (Indiana University, USA)<\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS1B: Attack Mitigation<\/strong><strong>LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis<\/strong>Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu (Purdue University, USA)<strong>OnionBots: Subverting Privacy Infrastructure for Cyber Attacks<\/strong>Amirali Sanatinia, Guevara Noubir (Northeastern University, USA)<\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS1C: <\/strong><strong>Modeling and Metrics<\/strong><strong>A Statistical Approach for Timed Reachability in AADL Models<\/strong>Harold Bruintjes, Joost-Pieter Katoen (RWTH Aachen University, Germany), David Lesens (Airbus Defence and Space, France)<br \/>\n<strong>Scalable Analysis of Fault Trees with Dynamic Features<\/strong>Jan Kr\u010d\u00e1l, Saarland (University, Germany), Pavel Kr\u010d\u00e1l (Lloyd\u2019s Register Consulting and Uppsala University, Sweden)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"96\"><strong>12:30 \u2013 14:00<\/strong><\/td>\n<td style=\"width: 953px;text-align: center;background-color: #dddddd\" colspan=\"3\" width=\"953\"><em>Lunch<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"96\"><strong>14:00 \u2013 15:30<\/strong><\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS2A: Secure Execution<\/strong><strong>The Power of Evil Choices in Bloom Filters<\/strong>Thomas Gerbet (Universit\u00e9 Joseph Fourier, France), Amrit Kumar, C\u00e9dric Lauradoux (INRIA, France)<strong>Secure Dynamic Software Loading and Execution using Cross Component Verification<\/strong>Byungho Min, Vijay Varadharajan (Macquarie University, Australia)<strong>Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming<\/strong>Dennis Andriesse, Herbert Bos, Asia Slowinska (VU University Amsterdam, The Netherlands)<\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS2B: Storage Systems<\/strong><strong>TIP-code: A Three Independent Parity Code to Tolerate Triple Disk Failures with Optimal Update Complexity<\/strong>Yongzhe Zhang, Chentao Wu, Jie Li, Minyi Guo (Shanghai Jiao Tong University, China and University of Tsukuba, Japan)<strong>Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems<\/strong>,Runhui Li, Yuchong Hu, Patrick P. C. Lee (The Chinese University of Hong Kong, China)<strong>Grouping-based Elastic Striping with Hotness Awareness for Improving SSD RAID Performance<\/strong>Yubiao Pan, Yongkun Li, Yinlong Xu, Zhipeng Li (University of Science &amp; Technology of China)<\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS2C: Web Services<\/strong><strong>Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks<\/strong>Abbas Naderi-Afooshteh, Anh Nguyen-Tuong, Mandana\u00a0Bagheri\u2011Marzijarani, Jason D. Hiser, Jack W. Davidson (University of Virginia, USA)<br \/>\n<strong>Private Browsing Mode Not Really That Private: Dealing with Privacy Breaches Caused by Browser Extensions<\/strong>Bin Zhao, Peng Liu (The Pennsylvania State University, USA)<br \/>\n<strong>Test-based Interoperability Certification for Web Services<\/strong>Ivano Alessandro Elia, Nuno Laranjeiro, Marco Vieira (University of Coimbra, Portugal)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"96\"><strong>15:30 \u2013 16:00<\/strong><\/td>\n<td style=\"width: 953px;text-align: center;background-color: #dddddd\" colspan=\"3\" width=\"953\"><em>Break<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"96\"><strong>16:00 \u2013 17:30<\/strong><\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS3A: Data Clusters, Servers and Clouds<\/strong><strong>Understanding the Dark Side of Big Data Clusters: An Analysis beyond Failures<\/strong>Andrea Ros\u00e0 (Universit\u00e0 della Svizzera Italiana, Switzerland), Lydia\u00a0Y.\u00a0Chen (IBM Research Lab. Zurich, Switzerland), Walter Binder (Universit\u00e0 della Svizzera Italiana, Switzerland)<strong>Improving Reliability with Dynamic Syndrome Allocation in Intelligent Software Defined Data Centers<\/strong>Ulya Bayram, Eric W.D. Rozier (University of Cincinnati, USA), Dwight\u00a0Divine (University of Illinois, USA), Pin Zhou (Datos IO, Inc., USA)<strong>Experiences with Building Disaster Recovery for Enterprise-Class Clouds<\/strong>Long Wang, Harigovind V. Ramasamy, Richard E. Harper (IBM T. J. Watson Research Center, USA), Mahesh Viswanathan (IBM Cloud, USA), Edmond Plattier (IBM Global Technology Services, France)<\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS3B: Attack Prevention<\/strong><strong>FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks<\/strong>Haopei Wang, Lei Xu, GuofeiGu (Texas A&amp;M University, USA)<strong>Enhancing Software Dependability and Security with Hardware Supported Instruction Address Space Randomization<\/strong>Seung Hun Kim (Yonsei University, Republic of Korea), Lei Xu, Ziyi Liu (University of Houston, USA), Zhiqiang Lin (The University of Texas at Dallas, USA), Won Woo Ro (Yonsei University, Republic of Korea), Weidong Shi (University of Houston, USA)<strong>Hide &amp; Share: Landmark-based Similarity for Private KNN Computation<\/strong>Davide Frey (INRIA Rennes, France), Rachid Guerraoui (EPFL, Switzerland), Anne-Marie Kermarrec, Antoine Rault (INRIA Rennes, France), Fran\u00e7ois Ta\u00efani (University of Rennes 1, France), Jingjing\u00a0Wang (EPFL, Switzerland)<\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS3C: Modeling and Assessment<\/strong><strong>Energy Resilience Modeling for Smart Houses<\/strong>Hamed Ghasemieh, Boudewijn R. Haverkort, Marijn R. Jongerden, Anne Remke (University of Twente, The\u00a0Netherlands and University of M\u00fcnster, Germany)<br \/>\n<strong>Impact of Malfunction on the Energy Efficiency of Batch Processing Systems<\/strong>Marcello Cinque, Domenico Cotroneo, Flavio Frattini, Stefano Russo (Universit\u00e0 degli Studi di Napoli Federico II, Italy)<br \/>\n<strong>phpSAFE: A Security Analysis Tool for OOP Web Application Plugins<\/strong>Paulo Nunes, Jos\u00e9 Fonseca (University of Coimbra, Portugal and Polytechnic Institute of Guarda, Portugal), Marco Vieira (University of Coimbra, Portugal)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table style=\"border-color: #000000\" border=\"1px\" width=\"1047\">\n<tbody>\n<tr>\n<td style=\"width: 95px;background-color: #dddddd\" colspan=\"4\" width=\"95\"><strong>\u00a0<\/strong><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><strong>Wednesday, June 24t<sup>th <\/sup><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"95\"><strong>08:30 \u2013 10:00<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"3\" width=\"953\"><strong>Keynote Address 1: \u00a0<\/strong>Bart Preneel (Katholieke Universiteit Leuven, Belgium)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"95\"><strong>10:00 \u2013 10:30<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"3\" width=\"953\"><strong>IEEE Technical Innovation Award Ceremony<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"95\"><strong>10:30 \u2013 11:00<\/strong><\/td>\n<td style=\"width: 953px;text-align: center;background-color: #dddddd\" colspan=\"3\" width=\"953\"><em>Break<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"95\"><strong>11:00 \u2013 12:30<\/strong><\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS4A: Mitigation of Hardware Faults<\/strong><strong>BAAT: Towards Dynamically Managing Battery Aging in Green Datacenters<\/strong>Longjun Liu (Xi\u2019an Jiaotong University, China and University of Florida, USA), Chao Li (Shanghai Jiao Tong University, China), Hongbin Sun (Xi\u2019an Jiaotong University, China), Yang Hu, Juncheng\u00a0Gu, Tao Li (University of Florida, USA)<strong>Avoiding Pitfalls in Fault-Injection Based Comparison of Program Susceptibility to Soft Errors<\/strong>Horst Schirmeier, Christoph Borchert, Olaf Spinczyk (Technische Universit\u00e4t Dortmund, Germany)<\/p>\n<p><strong>Warped-RE: Low-Cost Error Detection and Correction in GPUs<\/strong><\/p>\n<p>Mohammad Abdel-Majeed, Waleed Dweik, Hyeran Jeon, Murali\u00a0Annavaram (University of Southern California, USA)<\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS4B: Mobile Devices<\/strong><strong>Decomposable Trust for Android Applications<\/strong>Earlence Fernandes, AjitAluri, Alexander Crowell, Atul Prakash (University of Michigan, USA)<strong>Reducing Refresh Power in Mobile Devices with Morphable ECC<\/strong>Chiachen Chou, Prashant Nair, Moinuddin K. Qureshi (Georgia Institute of Technology, USA)<\/p>\n<p><strong>TrustICE: Hardware-assisted Isolated Computing Environments on Mobile Devices<\/strong><\/p>\n<p><strong>He Sun (Chinese Academy of Science, China and College of William and Mary, USA), Kun Sunz (College of William and Mary, USA), Yuewu Wang (Chinese Academy of Science, China), Jiwu Jing (Chinese Academy of Science, China), Haining Wang (University of Delaware, USA)<\/strong><\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>Fast Abstracts I<\/strong><strong>The Delta Network: Measuring and Comparing the Performance of Heterogeneous Vehicular Network, <\/strong>Cristiano Silva, Wagner Meira Jr.<strong>Fault-Tolerant Clock Synchronization Protocol in Multi-Ring Topologies,<\/strong> Klaus Echtle, Zoha Moztarzadeh<strong>Proactive Dependability Framework for Smart Environment Applications<\/strong>, Ehsan Ullah, Warriach,Tanir Ozcelebi, Johan Lukkien<strong>Adaptive Dynamic Software Diversity: Towards Feedback-Based Resilience<\/strong>, Andrea H\u00f6ller, Tobias Rauter, Johannes Iber, Christian\u00a0Kreiner<\/p>\n<p><strong>A System-Level Solution for Dependable Heterogeneous MPSoCs<\/strong>, Ahmed Ibrahim, Hans Kerhoff<\/p>\n<p><strong>Why Phishing becomes a Precursor to Brutal Cyber Attacks? Comparative Evaluation Framework of Mitigation Approaches<\/strong>, Mansour Alsaleh, Abdulrahman Alarifi<\/p>\n<p><strong>New Techniques for Streaming Authenticated Data Structure, <\/strong>Chia\u2011Mu Yu, Shin-Ying Huang, Yennun Huang<\/p>\n<p><strong>Detection of Cache Pollution Attacks Using Improved Online Sequential Extreme Learning Machine in Named Data Networking<\/strong>, Haoqiu Huang<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"91\"><strong>12:30 \u2013 14:00<\/strong><\/td>\n<td style=\"width: 953px;text-align: center;background-color: #dddddd\" colspan=\"3\" width=\"953\"><em>Lunch<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>14:00 \u2013 15:30<\/strong><\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS5A: Network Security and Consensus<\/strong><strong>Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis<\/strong>An Wang (George Mason University, USA), Aziz Mohaisen (Verisign Labs, USA), Wentao Chang, Songqing Chen (George Mason University, USA)<strong>Consensus Refined<\/strong>Ognjen Mari\u0107, Christoph Sprenger, David Basin (ETH Zurich, Switzerland)<\/p>\n<p><strong>Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks<\/strong><\/p>\n<p>Babak Rahbarinia (University of Georgia, USA), Roberto Perdisci, Manos Antonakakis (University of Georgia and Georgia Institute of Technology, USA)<\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS5B: Memory Errors<\/strong><strong>Revisiting Memory Errors in Large-Scale Production Data Centers: Analysis and Modeling of New Trends from the Field<\/strong>Justin Meza, Qiang Wu, Sanjeev Kumar, Onur Mutlu (Carnegie Mellon University, USA and Facebook, Inc., USA)<strong>AVATAR: A Variable-Retention-Time (VRT) Aware Refresh for DRAM Systems<\/strong>Moinuddin K. Qureshi, Dae-Hyun Kim, Samira Khan, Prashant J. Nair, Onur Mutlu (Carnegie Mellon University, USA and Georgia Institute of Technology, USA)<\/p>\n<p><strong>Read Disturb Errors in MLC NAND Flash Memory: Characterization, Mitigation and Recovery<\/strong><\/p>\n<p>Yu Cai, Yixin Luo, Saugata Ghose, Onur Mutlu (Carnegie Mellon University, USA)<\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>Fast Abstracts II<\/strong><strong>Challenges of Assessing the Hypercall Interface Robustness<\/strong>, Diogo Carvalho, Nuno Antunes, Marco Vieira, Aleksandar Milenkoski, Samuel Kounev<strong>Optimal Control vs. Safety Red Lines: Internet-Of-Things Safety via\u00a0Micro-Policies<\/strong>, Saman Zonouz, Robin Berthier<strong>Distributed Instrumentation &amp; Control (I&amp;C) architecture: Design and Validation<\/strong>, Patrick Salaun, Marion Viel, Thibault Lemattre, Jean\u2011Francois Petin, Thomas Robert<strong>Cyber Safety: Making Internet Dependable for User, <\/strong>Shivakant\u00a0Mishra<\/p>\n<p><strong>A Methodology for Automatic Generation of Dependability Model for Industrial Processes Based on Ontologies and Bayesian Networks, <\/strong>Allan Venceslau, Raphaela Galhardo Fernandes, Luiz\u00a0Guedes, Ivanovitch Silva<\/p>\n<p><strong>Locating Stuck-at Error in Quantum Boolean Circuits,<\/strong> Ting\u2011Hsu\u00a0Chang, Chia-Mu Yu, Wei-Ho Chung, Sy-Yen Kuo<\/p>\n<p><strong>Implementation and evaluation of Collision-fast Atomic Broadcast protocols, <\/strong>Rodrigo Saramago, Lasaro Camargos<\/p>\n<p><strong><strong>An Ontological Model for Constructing Mobius ADVISE Security Models,<\/strong> <\/strong>Ken Keefe<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>15:30 \u2013 16:00<\/strong><\/td>\n<td style=\"width: 953px;text-align: center;background-color: #dddddd\" colspan=\"3\" width=\"953\"><em>Break<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>16:00 \u2013 19:30<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"3\" width=\"953\"><strong>Excursion<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>19:30 \u2013 22:00<\/strong><strong>\u00a0<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"3\" width=\"953\"><strong>Banquet<\/strong><strong> Best Paper and Carter Award Ceremony<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table style=\"height: 1080px;border-color: #000000\" border=\"1px\" width=\"1069\">\n<tbody>\n<tr>\n<td style=\"width: 91px;text-align: center;background-color: #dddddd\" colspan=\"4\" width=\"91\"><strong>\u00a0<\/strong><strong>Thursday, June 25<sup>th<\/sup><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"91\"><strong>08:30 \u2013 10:00<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"3\" width=\"953\"><strong>Keynote Address 2: <\/strong><strong>\u00a0<\/strong>Virg\u00edlio Augusto Fernandes Almeida (University of Minas Gerais, Brazil)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\" width=\"91\"><strong>10:00 \u2013 10:30<\/strong><\/td>\n<td style=\"width: 953px;text-align: center;background-color: #dddddd\" colspan=\"3\" width=\"953\"><em>Break<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>10:30 \u2013 12:00<\/strong><\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS6A: FaultTolerance<\/strong><strong>Fine-Grained Characterization of Faults Causing Long Latency Crashes in Programs<\/strong>Guanpeng Li, Qining Lu, Karthik Pattabiraman (University of British Columbia, Vancouver, Canada)<strong>User-Constraint and Self-Adaptive Fault Tolerance for Event Stream Processing Systems<\/strong>Andr\u00e9 Martin, Tiaraju Smaneoto, Tobias Dietze, Andrey Brito, Christof\u00a0Fetzer (Technische Universit\u00e4t Dresden, Dresden, Germany and Universidade Federal de Campina Grande, Campina Grande, Brazil)<strong>Lightweight Memory Checkpointing<\/strong>Dirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum (VU University Amsterdam, The Netherlands)<\/td>\n<td style=\"text-align: center\" width=\"431\"><strong>TS6B: VulnerabilityDetection and Mitigation<\/strong><strong>HeapTherapy: An Efficient End-to-end Solution against Heap Buffer Overflows<\/strong>Qiang Zeng, Mingyi Zhao, Peng Liu (The Pennsylvania State University, USA)<strong>Smart-TV Security Analysis: Practical Experiments<\/strong>Yann Bachy (LAAS-CNRS, France, INSA de Toulouse and Thales Communications &amp; Security, France), Fr\u00e9d\u00e9ric Basse (Thales Communications &amp; Security, France), Vincent Nicomette, Eric Alata (LAAS-CNRS and INSA de Toulouse, France), Mohamed Ka\u00e2niche (LAAS-CNRS and Univ. de Toulouse, France), Jean\u2011Christophe\u00a0Courr\u00e8ge (Thales Communications &amp; Security, France), Pierre Lukjanenko (LAAS-CNRS, France)<strong>On the Metrics for Benchmarking Vulnerability Detection Tools<\/strong>Nuno Antunes, Marco Vieira (University of Coimbra, Portugal)<\/td>\n<td style=\"text-align: center\" width=\"204\"><strong>Industrial Track<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>12:00 \u2013 13:30<\/strong><\/td>\n<td style=\"width: 953px;text-align: center;background-color: #dddddd\" colspan=\"3\" width=\"953\"><em>Lunch<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>13:30 \u2013 15:00<\/strong><\/td>\n<td style=\"text-align: center\" width=\"318\"><strong>TS7A: Assurance of ComplexSystems<\/strong><strong>Formal Assurance Arguments: A Solution In Search of a Problem?<\/strong>Patrick John Graydon (M\u00e4lardalen University, V\u00e4ster\u00e5s, Sweden, now\u00a0at NASA Langley Research Center, USA)<strong>A Quality Control Engine for Complex Physical Systems<\/strong>Haifeng Chen, Mizoguchi Takehiko, Yan Tan, Kai Zhang, Geoff Jiang (NEC Laboratories America, USA)<strong>Discovering and Visualizing Operations Processes with POD-Discovery and POD-Viz<\/strong>Ingo Weber, Chao Li, Xiwei Xu, Liming Zhu (SSRG, NICTA and University of New South Wales, Australia)<\/td>\n<td style=\"text-align: center\" width=\"431\"><strong>TS7B: Preventing Memory and Information Leakage<\/strong><strong>Incinerator \u2013 Eliminating Stale References in Dynamic OSGi Applications<br \/>\n<\/strong>Koutheir Attouchi (Orange Labs, France), Ga\u00ebl Thomasy (Telecom SudParis, France), Gilles Muller, Julia Lawall (Inria\/LIP6\/UPMC\/Sorbonne University, France), Andr\u00e9 Bottaro (Orange Labs, France)<strong>Risk Assessment of Buffer \u201cHeartbleed\u201d Over-read Vulnerabilities<\/strong>Jun Wang, Mingyi Zhao, Qiang Zeng, Dinghao Wu, Peng Liu (The Pennsylvania State University, USA)<\/td>\n<td style=\"text-align: center\" width=\"204\"><strong>Timely, Reliable, and Cost-effective Transport Service using Dissemination Graphs <\/strong>Amy Babay (Johns Hopkins University)<strong>Multi-Layer Anomaly Detection in Complex Dynamic Critical Systems<\/strong>Tommaso Zoppi (University of Florence)<\/p>\n<p><strong>A prediction approach for correlated failures in distributed computing systems<\/strong><\/p>\n<p>Weiwei Zheng (Beijing University of Posts and Telecommunications)<\/p>\n<p><strong>How to protect the protector?<\/strong><\/p>\n<p>Tobias Stumpf (TU Dresden)<\/p>\n<p><strong>Toward Survivable Intrusion-Tolerant Open-Source SCADA<\/strong><\/p>\n<p>Thomas Tantillo (Johns Hopkins University)<\/p>\n<p><strong>Counting the Frequency of Indirect Branches to Detect Return-Oriented Programming Attacks<\/strong><\/p>\n<p>Mateus Felipe Tymburib\u00e1 Ferreira (Federal University of Minas Gerais)<\/p>\n<p><strong>Software-Based Fault Tolerance: Towards New Advances for COTS-Based Embedded Systems<\/strong><\/p>\n<p><strong>Andrea H\u00f6ller (Graz University of Technology)<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 200px;text-align: center\" width=\"91\"><strong>15:15 \u2013 16:30<\/strong><\/td>\n<td style=\"text-align: center\" colspan=\"3\" width=\"953\"><strong>Technical Committee Meeting<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Final\u00a0Program:\u00a0 &nbsp; \u00a0Monday, June 22nd 08:00 \u2013 09:00 Registration 09:00 \u2013 10:30 WS1: Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE) WS2:\u00a0\u00a0 Safety and Security of Intelligent Vehicles (SSIV) WS3: Model Based Design for Cyber-Physical Systems (MB4CP) Tutorial &hellip; <a class=\"more-link\" href=\"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/\">Continue&nbsp;reading&nbsp;<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-545","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Program - DSN 2015<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Program - DSN 2015\" \/>\n<meta property=\"og:description\" content=\"Final\u00a0Program:\u00a0 &nbsp; \u00a0Monday, June 22nd 08:00 \u2013 09:00 Registration 09:00 \u2013 10:30 WS1: Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE) WS2:\u00a0\u00a0 Safety and Security of Intelligent Vehicles (SSIV) WS3: Model Based Design for Cyber-Physical Systems (MB4CP) Tutorial &hellip; Continue&nbsp;reading&nbsp;&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/\" \/>\n<meta property=\"og:site_name\" content=\"DSN 2015\" \/>\n<meta property=\"og:image\" content=\"http:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-content\/uploads\/sites\/40\/2015\/04\/pdf.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/program\\\/\",\"url\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/program\\\/\",\"name\":\"Program - DSN 2015\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/program\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/program\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/wp-content\\\/uploads\\\/sites\\\/40\\\/2015\\\/04\\\/pdf.jpg\",\"datePublished\":\"2015-04-28T13:49:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/program\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/program\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/program\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/wp-content\\\/uploads\\\/sites\\\/40\\\/2015\\\/04\\\/pdf.jpg\",\"contentUrl\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/wp-content\\\/uploads\\\/sites\\\/40\\\/2015\\\/04\\\/pdf.jpg\",\"width\":40,\"height\":41},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/program\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/#website\",\"url\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/\",\"name\":\"DSN 2015\",\"description\":\"Just another Wordpress Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wordpress.ft.unicamp.br\\\/dsn2015\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Program - DSN 2015","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/","og_locale":"en_US","og_type":"article","og_title":"Program - DSN 2015","og_description":"Final\u00a0Program:\u00a0 &nbsp; \u00a0Monday, June 22nd 08:00 \u2013 09:00 Registration 09:00 \u2013 10:30 WS1: Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE) WS2:\u00a0\u00a0 Safety and Security of Intelligent Vehicles (SSIV) WS3: Model Based Design for Cyber-Physical Systems (MB4CP) Tutorial &hellip; Continue&nbsp;reading&nbsp;&rarr;","og_url":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/","og_site_name":"DSN 2015","og_image":[{"url":"http:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-content\/uploads\/sites\/40\/2015\/04\/pdf.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/","url":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/","name":"Program - DSN 2015","isPartOf":{"@id":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/#primaryimage"},"image":{"@id":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/#primaryimage"},"thumbnailUrl":"http:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-content\/uploads\/sites\/40\/2015\/04\/pdf.jpg","datePublished":"2015-04-28T13:49:21+00:00","breadcrumb":{"@id":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/#primaryimage","url":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-content\/uploads\/sites\/40\/2015\/04\/pdf.jpg","contentUrl":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-content\/uploads\/sites\/40\/2015\/04\/pdf.jpg","width":40,"height":41},{"@type":"BreadcrumbList","@id":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/"},{"@type":"ListItem","position":2,"name":"Program"}]},{"@type":"WebSite","@id":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/#website","url":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/","name":"DSN 2015","description":"Just another Wordpress Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-json\/wp\/v2\/pages\/545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-json\/wp\/v2\/comments?post=545"}],"version-history":[{"count":0,"href":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-json\/wp\/v2\/pages\/545\/revisions"}],"wp:attachment":[{"href":"https:\/\/wordpress.ft.unicamp.br\/dsn2015\/wp-json\/wp\/v2\/media?parent=545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}