Accepted Papers
Research Track
- Mutiny! How does Kubernetes fail, and what can we do about it? (Reg)
Marco Barletta, Marcello Cinque (Università degli Studi di Napoli Federico II); Catello Di Martino (Nokia Bell Labs);
Zbigniew Kalbarczyk, Ravishankar K. Iyer (University of Illinois at Urbana-Champaign)
- Reboot-based Recovery of Unikernels at the Component Level (Reg)
Takeru Wada, Hiroshi Yamada (TUAT)
- On the Correctness of Metadata-based SBOM Generation: A Differential Analysis Approach (PER)
Sheng Yu (University of California, Riverside & Deepbits Technology Inc.); Wei Song, Xunchao Hu (Deepbits Technology
Inc.); Heng Yin (University of California, Riverside & Deepbits Technology Inc.)
- SPP: Safe Persistent Pointers for Memory Safety (Reg)
Dimitrios Stavrakakis (TU Munich & The University of Edinburgh); Alexandra Panfill, MJin Nam, Pramod Bhatotia (TU
Munich)
- Byzantine Attacks Exploiting Penalties in Ethereum PoS (Reg)
Ulysse Pavloff (CEA LIST, Université Paris-Saclay, France); Yackolley Amoussou-Guenou (Université Paris-Panthéon-
Assas, CRED); Sara Tucci-Piergiovanni (CEA LIST, Université Paris-Saclay, France)
- ADSynth: Synthesizing Realistic Active Directory Attack Graphs (Tool)
Nhu Long Nguyen (University of Adelaide); Nick Falkner, Hung Nguyen (The University of Adelaide)
- Read Disturbance in High Bandwidth Memory: A Detailed
Experimental Study on HBM2 DRAM Chips (Reg)
Ataberk Olgun, Majd Osseiran, Giray Yaglikci (ETH Zurich); Yahya Can Tuğrul (ETH Zurich, TOBB University of Economics
& Technology); Haocong Luo, Steve Rhyner (ETH Zurich); Behzad Salami (BSC and ETH); Juan Gómez Luna (ETH Zurich);
Onur Mutlu (ETH Zurich & Stanford University)
- A Fast Low-Level Error Detection Technique (PER)
Zhengyang He (University of Iowa); Hui Xu (Fudan University); Guanpeng Li (University of Iowa)
- Simultaneous Many-Row Activation in Off-the-Shelf DRAM Chips: Experimental Characterization and Analysis (Reg)
Ismail Emir Yuksel (ETH Zurich); Yahya Can Tuğrul (ETH Zurich, TOBB University of Economics & Technology); Nisa
Bostanci, Geraldo Francisco de Oliveira Junior, Giray Yaglikci, Ataberk Olgun, Melina Soysal, Haocong Luo, Juan Gómez
Luna, Mohammad Sadrosadati (ETH Zurich); Onur Mutlu (ETH Zurich & Stanford University)
- Grunt Attack: Exploiting Execution Dependencies in Microservices (Reg)
Xuhang Gu, Qingyang Wang, Jianshu Liu (Louisiana State University); Jinpeng Wei (University of North Carolina at
Charlotte)
- PAROLE: Profitable Arbitrage in Optimistic Rollup with ERC-721
Token Transactions (Reg)
Alvi Ataur Khalil, Mohammad Ashiqur Rahman (Florida International University)
- iPrism: Characterize and Mitigate Risk by Quantifying Change in
Escape Routes (Reg)
Shengkun Cui (University of Illinois at Urbana-Champaign); Saurabh Jha (IBM Research); Ziheng Chen, Zbigniew T.
Kalbarczyk, Ravishankar K. Iyer (University of Illinois at Urbana-Champaign)
- JITBULL: Securing JavaScript Runtime with a Go/No-Go policy for
JIT Engine (Reg)
Jean-Baptiste Decourcelle (IRIT, Université de Toulouse, CNRS, Toulouse INP, UT3, Toulouse, France); Boris Teabe (INPTIRIT);
Daniel Hagimont (University of Toulouse, Toulouse, France)
- Privacy Leakage from Logits Attack and Its Defense in Federated
Distillation (Reg)
Danyang Xiao, Diying Yang, Jialun Li, Xu Chen, Weigang Wu (Sun Yat-sen University)
- System Call Interposition Without Compromise (Tool)
Adriaan Jacobs (DistriNet, KU Leuven, Belgium); Merve Gülmez (Ericsson Security Research, Sweden and DistriNet, KU
Leuven, Belgium); Alicia Andries, Stijn Volckaert (DistriNet, KU Leuven, Belgium); Alexios Voulimeneas (TU Delft)
- Protecting Confidential Virtual Machines from Hardware
Performance Counter Side Channels (Reg)
Xiaoxuan Lou, Kangjie Chen, Guowen Xu (Nanyang Technological University); Han Qiu (Tsinghua University); Guo
Shangwei (Chongqing University); Tianwei Zhang (Nanyang Technological University)
- ZLB: A Blockchain to Tolerate Colluding Majorities (Reg)
Alejandro Ranchal-Pedrosa (Protocol Labs); Vincent Gramoli (University of Sydney and Redbelly Network)
- ZipChannel: Cache Side-Channel Vulnerabilities in Compression
Algorithms (Reg)
Marina Minkin (University of Michigan); Baris Kasikci (University of Washington and Google)
- ChainNet: A Customized Graph Neural Network Model for Loss-aware
Edge AI Service Deployment (Reg)
Zifeng Niu (Imperial College London); Manuel Roveri (Politecnico di Milano); Giuliano Casale (Imperial College London)
- Goldfish: An Efficient Federated Unlearning Framework (Reg)
Houzhe Wang (University of Chinese Academy of Sciences); Xiaojie Zhu (King Abdullah University of Science and
Technology); Chi Chen (Chinese Academy of Sciences); Paulo Esteves-Veríssimo (Resilient Computing and Cybersecurity
Center (RC3), CEMSE - Faculty of Computer, Electrical and Mathematical Science and Engineering, King Abdullah
University of Science and Technology)
- IPMES: A Tool for Incremental TTP Detection over the System Audit
Event Stream (Tool)
Hong-Wei Li (Research Center for Information Technology Innovation, Academia Sinica, Taiwan); Ping-Ting Liu, Bo-Wei Lin
(Department of Computer Science, National Yang Ming Chiao Tung University, Taiwan); Yi-Chun Liao (Department of
Computer Science and Information Engineering, National Taiwan University, Taiwan); Yennun Huang (Research Center for
Information Technology Innovation, Academia Sinica, Taiwan)
- Decentagram: Highly-Available Decentralized Publish/Subscribe
Systems (Reg)
Haofan Zheng, Tuan Tran, Roy Shadmon, Owen Arden (UC Santa Cruz)
- Toward Evaluating Robustness of Reinforcement Learning with
Adversarial Policy (Reg)
Xiang Zheng (City University of Hong Kong); Xingjun Ma (Fudan University); Shengjie Wang (Tsinghua University); Xinyu
Wang (Tencent Inc.); Chao Shen (Xi'an Jiaotong University); Cong Wang (City University of Hong Kong)
- Towards Shielding 5G Control Plane Functions (Reg)
Sudip Maitra, Tolga Atalay, Angelos Stavrou, Haining Wang (Virginia Tech)
- A comprehensive study on drones resilience in the presence of
Inertial Measurement Unit faults (PER)
Anamta Khan, Naghmeh Ivaki, Henrique Madeira (CISUC, Department of Informatics Engineering, University of Coimbra,
Portugal)
- Stealthy Peers: Understanding Security and Privacy Risks of Peer-
Assisted Video Streaming (Reg)
Siyuan Tang (Indiana University Bloomington); Eihal Alowaisheq (King Saud University); Xianghang Mi (University of
Science and Technology of China); Yi Chen, XiaoFeng Wang (Indiana University Bloomington); Yanzhi Dou (Independent
Researcher)
- Intrusion Tolerance for Networked Systems Through Two-Level
Feedback Control (Reg)
Kim Hammar, Rolf Stadler (KTH Royal Institute of Technology)
- RABIT, a Robot Arm Bug Intervention Tool for Self-Driving Labs (PER)
Zainab Saeed Wattoo, Petal Vitis, Ruizhe Zhu, Noah Depner, Ivory Zhang, Jason Hein, Arpan Gujarati, Margo Seltzer
(University of British Columbia, Vancouver)
- Owl: Differential-based Side-Channel Leakage Detection for CUDA
Applications (Reg)
Yu Zhao, Wenjie Xue, Weijie Chen, Weizhong Qiang, Deqing Zou, Hai Jin (Huazhong University of Science and Technology)
- AOAB: Optimal and Fair Ordering of Financial Transactions (Reg)
Vincent Gramoli (University of Sydney and Redbelly Network); Zhenliang Lu (University of Sydney); Qiang Tang (The
University of Sydney); Pouriya Zarbafian (University of Sydney)
- BFTRAND: Low-latency Random Number Provider for BFT Smart
Contracts (Reg)
Jinghui Liao (Southern University of Science and Technology and Wayne State University); Borui Gong (Southern
University of Science and Technology and The Hong Kong Polytechnic University); Wenhai Sun (Purdue University, West
Lafayette, USA); Fengwei Zhang (Southern University of Science and Technology (SUSTech)); Zhenyu Ning (Hunan
University); Man Ho Allen Au (Hong Kong Polytechnic University); Weisong Shi (University of Delaware)
- Verifying Randomized Consensus Protocols with Common Coins (Reg)
Song Gao, Bohua Zhan, Zhilin Wu, Lijun Zhang (Institute of Software, Chinese Academy of Sciences)
- Real-Time Intrusion Detection and Prevention with Neural Network in Kernel using eBPF (Reg)
Junyu Zhang, Pengfei Chen, Zilong He, Hongyang Chen, Xiaoyun Li (School of Computer Science and Engineering, Sun
Yat-sen University)
- PagPassGPT: Pattern Guided Password Guessing via Generative
Pretrained Transformer (Reg)
Xingyu Su, Yang Li, Yong Li, Chi Chen (University of Chinese Academy of Sciences); Xiaojie Zhu, Paulo Esteves-Veríssimo (King Abdullah University of Science and
Technology)
- Iniva: Inclusive and Incentive-compatible Vote Aggregation (Reg)
Arian Baloochestani Asl, Hanish Gogada, Leander Jehl, Hein Meling (University of Stavanger)
- Delphi: Efficient Asynchronous Approximate Agreement for
Distributed Oracles (Reg)
Akhil Bandarupalli (Purdue University); Adithya Bhat (Visa Research); Saurabh Bagchi, Aniket Kate (Purdue University);
Chen-Da Liu-Zhang (Luzern University of Applied Sciences and Arts); Michael K. Reiter (Duke University)
- Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFT (Reg)
Isaac Doidge, Raghavendra Ramesh, Nibesh Shrestha, Joshua Tobkin (Supra Research)
- SyRep: Efficient Synthesis and Repair of Fast Re-Route Forwarding
Tables for Resilient Networks (Reg)
Csaba Györgyi (University of Vienna); Kim Larsen (Aalborg University); Stefan Schmid (TU Berlin); Jiri Srba (Aalborg
University, Denmark)
- FIRMRES: Exposing Broken Device-Cloud Access Control in IoT
Through Static Firmware Analysis (Reg)
Yuting Xiao (Hunan University); Jiongyi Chen (National University of Defense Technology); Yupeng Hu, Jing Huang (Hunan
University)
- ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name
Abuse (Reg)
Mingxuan Liu (Zhongguancun Laboratory); Zhenglong Jin (Tsinghua University); Jiahai Yang (Fuzhou University); Baojun
Liu, Haixin Duan, Ying Liu (Tsinghua University); Ximeng Liu (Fuzhou University); Shujun Tang (QI-ANXIN Technology
Research Institute)
- SEDSpec: Securing Emulated Devices by Enforcing Execution
Specification (Reg)
Yang Chen, Qihang Zhou, Xiaoqi Jia, Heqing Huang, Shaowen Xu, Haichao Du (Institute of Information Engineering, Chinese Academy of Sciences); Shengzhi Zhang (Department of Computer Science, Metropolitan College, Boston
University)
- OffRAMPS: An FPGA-based Intermediary for Analysis and
Modification of Additive Manufacturing Control Systems (Tool)
Jason Blocklove, Md Raz, Prithwish Basu Roy (NYU Tandon School of Engineering); Hammond Pearce (University of New
South Wales); Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri (NYU Tandon School of Engineering)
Disrupt
- AuSSE: A Novel Framework for Security and Safety Evaluation in Autonomous Vehicles
Nhung Nguyen, Guangdong Bai, Dan Kim (School of EECS, The University of Queensland, Australia); Jin-Hee Cho (Department of Computer Science, Virginia Tech); Terrence J. Moore, Frederica Nelson (US Army Research Laboratory); Seunghyun Yoon, Hyuk Lim (Korea Institute of Energy Technology)
- An Experimental Analysis of Combined RowHammer and RowPress Read Disturbance in Modern DRAM Chips
Haocong Luo, İsmail Emir Yüksel, Ataberk Olgun, Giray Yaglikci, Mohammad Sadrosadati, Onur Mutlu (ETH Zurich)
- Exploring Use of Symbolic Execution for Service Analysis
Yang Zhang, Long Wang (Tsinghua University); Zhengang Wang, Dongdong Shangguan (Huawei Corporation)
- When Green Computing Meets Performance and Resilience SLOs
Haoran Qiu, Weichao Mao (University of Illinois Urbana-Champaign); Chen Wang, Saurabh Jha, Hubertus Franke, Chandra Narayanaswami (IBM Research); Tamer Başar, Zbigniew Kalbarczyk, Ravishankar Iyer (University of Illinois Urbana-Champaign)
- Neural Fault Injection: Generating Software Faults from Natural Language
Domenico Cotroneo, Pietro Liguori (University of Naples Federico II)
- PANDA: Practical Adversarial Attacks Against Intrusion Detection Applications
Subrat Kumar Swain (UQ-IITD Research Academy); Vireshwar Kumar (Indian Institute of Technology Delhi); Guangdong Bai, Dan Dongseong Kim (The University of Queensland)
- Harnessing Explainability to Improve ML Ensemble Resilience
Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan (The University of British Columbia)
- On the Design of Coordination Services for IoT
Tiago Carvalho, Antonio Casimiro, Alysson Bessani (LASIGE, FCUL, University of Lisbon)
Doctoral Forum
- Patching the Cracks: Detecting and Addressing Adversarial Examples in Real-World Applications
Niklas Bunzel
- Reducing the gap between theory and practice in real-time system with MARS
Giann Nandi, David Pereira, José Proença, Eduardo Tovar and Luis Nogueira (CISTER - Research Centre in Real-Time Computing and Embedded Computing Systems, Polytechnic Institute of Porto, Porto, Portugal)
- MTD in Plain Sight: Hiding Network Behavior in Moving Target Defenses
Tina Moghaddam, Guowei Yang, Dan Dongseong Kim (The University of Queensland, Brisbane, Australia); Chandra Thapa, Seyit Camtepe (CSIRO's Data61, Marsfield, Australia)
- Advancing NDN Security for IoT: Harnessing Machine Learning to Detect Attacks
Sai Gautam Mandapati, Chathurika Ranaweera (School of IT, Deakin University, Geelong, Australia); Robin Doss (Centre for Cyber Resilience and Trust, Deakin University, Geelong, Australia)
- Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive Systems
Manu Jo Varghese, Frank Jiang, Robin Doss and Adnan Anwar (Centre for Cyber Resilience and Trust, Deakin University, Geelong, Australia)
- Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy
Anuj Nepal, Robin Doss and Frank Jiang (Centre for Cyber Resilience and Trust, Deakin University, Geelong, Australia)
- (Re)-envisioning Approximate Agreement for Distributed Cryptography and Oracles
Akhil Bandarupalli, Saurabh Bagchi (Purdue University); Aniket Kate (Purdue University and Supra Research)
Tutorial
- Safe, Secure, and Trustworthy Artificial Intelligence (AI) via Formal Verification of Neural Networks and Autonomous Cyber-Physical Systems (CPS) with NNV
Taylor T. Johnson, Diego Manzanas Lopez (Vanderbilt University); Hoang-Dung Tran (University of Nebraska Lincoln)
- Zero-Knowledge Proofs for Blockchains
Sushmita Ruj (University of New South Wales)
- Evaluating Performance and Dependability of Blockchain Protocols with Diablo
Andrei Lebedev, Vincent Gramoli (University of Sydney)
- LLTFI and the Art of Fault Injection
Karthik Pattabiraman, Abraham Chan (Univ. of British Columbia)
Industry
- Intrusion Detection at Scale with the Assistance a Command-line Language Model
Jiongliang Lin (Sun Yat-sen University); Yiwen Guo (Unaffiliated); Hao Chen (UC Davis)
- Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia
Shengye Wan, Joshua Saxe, Craig Gomes, Sahana Chennabasappa (Meta Platforms, Inc.); Avilash Rath, Xinda Wang (University of Texas at Dallas); Kun Sun (George Mason University)
- Investigating Memory Failure Prediction Across CPU Architectures
Qiao Yu Huawei (Munich Research Center and Technical University of Berlin); Wengui Zhang, Min Zhou, Jialiang Yu, Zhenli Sheng (Huawei Technologies Co., Ltd); Jorge Cardoso (Huawei Munich Research Center, Germany and CISUC, University of Coimbra, Portugal); Jasmin Bogatinovski, Odej Kao (Technical University of Berlin)
- Federated Unlearning in the Internet of Vehicles
Guofeng Li, Liangmin Wang (School of Cyber Science and Engineering, Southeast University); Xia Feng (Faculty of Data Science, City University of Macau); Haiqin Wu (Software Engineering Institute, East China Normal University); Boris Düdder (Department of Computer Science, University of Copenhagen)
- Sensitive information leakage prevention in DNSSEC Zone-Walking - A Practical Solution
Fatema Bannat Wala (ESnet); Stephan Bohacek (University of Delaware)
- Optimizing Large-Scale Fault Injection Experiments through Martingale Hypothesis: A Systematic Approach for Reliability Assessment of Safety-Critical Systems
Saurabh Hukerikar, Atieh Lotfi, Yanxiang Huang, Nirmal Saxena (NVIDIA)
- Active Learning Omnivariate Decision Trees for Fault Diagnosis in Robotic Systems
Casidhe Hutchison, David Guttendorf (Carnegie Mellon University, National Robotics Engineering Center); Milda Zizyte (Brown University); Philip Koopman, Claire Le Goues (Carnegie Mellon University)
- Empowering Data Centers with Computational Storage Drive-Based Deep Learning Inference Functionality to Combat Ransomware
Kurt Friday, Elias Bou-Harb (Louisiana State University); Ron Lee, Pramod Peethambaran, Mayank Saxena (Samsung Memory Solutions Lab)
- Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns
Wei-Jia Chen, Chia-Yi Hsu, Chia-Mu Yu, Chun-Ying Huang (National Yang Ming Chiao Tung University); Wei-Bin Lee (Foxconn)
- Fault Localization Using Interventional Causal Learning for Cloud-Native Applications
Saurabh Jha, Jesus Rios, Frank Bagehorn, Larisa Shwartz and Naoki Abe (IBM Research)
Poster
- Federated Anomaly Detection
Chunjiong Zhang, Byeong-Hee Roh, Gaoyang Shan (Ajou University)
- Mitigating False Positives in DGA Detection for Non-English Domain Names
Huiju Lee, Huy Kang Kim (Korea University)
- Cryptography-Based Bootstrapping Scheme for Permissionless Sharding Blockchain
Ziqiang Xu, Ahmad Salehi Shahraki, Naveen Chilamkurti (La Trobe University)
- Optimizing Tree-based Quorum Certification for BFT Systems at Planetary-Scale
Christian Berger (University of Passau); Hans P. Reiser (Reykjavik University)
- Boosting Communication Efficiency of Federated Learning's Secure Aggregation
Niousha Nazemi, Omid Tavallaie, Shuaijun Chen, Albert Y. Zomaya (The University of Sydney); Ralph Holz (University of Münster)
- Balancing Privacy and Attack Utility: Calibrating Sample Difficulty for Membership Inference Attacks in Transfer Learning
Shuwen Liu, Yongfeng Qian (China University of Geosciences); Yixue Hao (Huazhong University of Science and Technology)
- Synergizing GCN and GAT for Hardware Trojan Detection and Localization
Yu-Chen Hsiao, Chia-Heng Yen, Bo-Yang Ke, Kai-Chiang Wu (National Yang Ming Chiao Tung University)
Workshop DCCS24
- DDOSHIELD-IoT: A Testbed for Simulating and Lightweight Detection of IoT Botnet DDoS Attacks
Simona De Vivo, Pietro Liguori (University of Naples Federico II, Italy); Islam Obaidat, Dong Dai (University of North Carolina at Charlotte)
On Predicting Software Intensity Using Wavelets and Nonlinear Regression
Kaoru Matsui, Xiao Xiao (Tokyo Metropolitan University)
- Performance Comparison of Bayesian Estimations on the Residual Number of Software Bugs
Yuki Hagiwara, Tadashi Dohi, Hiroyuki Okamura (Hiroshima University)
- Caching and Prefetching for Improving ORAM Performance
Naohiro Hayashibara, Kazuaki Kawabata (Kyoto Sango University)
- On Predicting Software Intensity Using Wavelets and Nonlinear Regression
Kaoru Matsui, Xiao Xiao (Tokyo Metropolitan University)
Workshop DSML24
- Measuring the effects of environmental influences on Object Detection
Niklas Bunzel (Fraunhofer SIT | ATHENE | Tu-Darmstadt); Michel Geißler (TU Darmstadt); Gerrit Klause (Fraunhofer SIT | ATHENE)
- Intrusion Detection Systems using Quantum-Inspired Density Matrix Encodings
Larry Huynh, Jin B. Hong, Ajmal Mian (University of Western Australia); Hajime Suzuki, Seyit Camtepe (CSIRO Data61)
- Adversarial Patch Detection: Leveraging Depth Contrast for Enhanced Threat Visibility
Niklas Bunzel (Fraunhofer SIT | ATHENE | TU-Darmstadt); Jannis Hamborg (Hochschule Darmstadt | ATHENE)
- Unlearning Backdoor Attacks through Gradient-Based Model Pruning
Kealan Dunnett, Dimity Miller, Raja Jurdak (Queensland University of Technology); Reza Arablouei, Volkan Dedeoglu (CSIRO's Data61)
- TrustDDL: A Privacy-Preserving Byzantine-Robust Distributed Deep Learning Framework
René Klaus Nikiel, Meghdad Mirabi, Carsten Binnig, Meghdad Mirabi (Technical University of Darmstadt)
- Hybrid Convolutional Neural Networks with Reliabality Guarantee
Hans Dermot Doran, Suzana Veljanovska (ZHAW / InES)
- Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks
Xiaoyun Xu, Oguzhan Ersoy, Hamidreza Tajalli, Stjepan Picek (Radboud University)
- A Fault Diagnosis Method for Analog Circuits Based on Task Transfer Learning
Zhongyu Gao (Anhui University); Xiaoqing Wen (Kyushu Institute of Technology); Aibin Yan (Hefei University of Technology)
Workshop VERDI
- Highly Comprehensive and Efficient Memory Safety Enforcement with Pointer Tagging
Xiaolei Wang, Bin Zhang, Chaojing Tang, Long Zhang (National University of Defense Technology)
- Enhancing Continuous Risk Assessment: The Role of Safety Engineers in Early Hazard Identification
Anil Ranjitbhai Patel (RPTU Kaiserslautern); Peter Liggesmeyer (Fraunhofer IESE)
- Virtual Evaluation of Dependability Attributes for Mission-Critical Cyber-Physical Systems
Adam Bachorek, Benedikt Lüken-Winkels, Iron Prando Da Silva, Stefan Schwenk, Markus Damm, Pablo Oliveira Antonino (Fraunhofer IESE)
- Hybrid Hardware/Software Detection of Multi-Bit Upsets in Memory
Robin Thunig, Urs Kober, Horst Schirmeier (TU Dresden); Christoph Borchert (Osnabrück University)
- Cybersecurity Pathways towards CE-Certified Autonomous Forestry Machines
Mazen Mohamad, Ramana Reddy Avula, Peter Folkesson, Pierre Kleberger, Aria Mirzai, Martin Skoglund, Marvin Damschen (Research Institutes of Sweden (RISE))