Conference Program

 

Local Time (UTC+10) Norfolk Connaught King George Room Olivers Olivers Boardroom
8:30 - 9:00 Registration (all day)
9:00 - 9:30 DSML 1 VERDI 1 Tutorial 1 Tutorial 2 DCCS 1
9:30 - 10:00
10:00 - 10:30
10:30 - 11:00 Morning Tea
11:00 - 11:30 DSML 2 VERDI 2 Tutorial 1 Tutorial 2 DCCS 2
11:30 - 12:00
12:00 - 12:30
12:30 - 13:30 Lunch
13:30 - 14:00 DSML 3 VERDI 3 Tutorial 3 CPS Security Workshop Tutorial 4
14:00 - 14:30
14:30 - 15:00 DSML 4
15:00 - 15:30 Afternoon Tea
15:30 - 16:00 Tutorial 3 CPS Security Workshop Tutorial 4
16:00 - 16:30 DSML 5
16:30 - 17:00
17:00 - 19:00

Legend:

DSML VERDI Tutorial CPS Security Workshop DCCS Social Events

DSML 1: Keynote Talk, at Norfolk, 9:15 - 10:30, June 24
  • DSML Opening
  • DSML Keynote: From Neural Network Verification to Formal Verification for Neuro-Symbolic Artificial Intelligence (AI) by Taylor Johnson, Vanderbilt University
DSML 2: Defense Mechanisms for Secure ML Systems, at Norfolk, 11:00 - 12:15, June 24
  • Adversarial Patch Detection: Leveraging Depth Contrast for Enhanced Threat Visibility by Niklas Bunzel, Jannis Hamborg
  • Unlearning Backdoor Attacks through Gradient-Based Model Pruning by Kealan Dunnett, Reza Arablouei, Dimity Miller, Volkan Dedeoglu, Raja Jurdak
  • Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks by Xiaoyun Xu, Oguzhan Ersoy, Hamidreza Tajalli, Stjepan Picek
DSML 3: Keynote Talk, at Norfolk, 13:30 - 14:45, June 24
  • DSML Keynote: Machine Learning for Privacy Compliance in Software Ecosystems by Guangdong Bai, The University of Queensland
DSML 4: Dependable and Reliable ML Systems, at Norfolk, 14:45 - 15:50, June 24
  • TrustDDL: A Privacy-Preserving Byzantine-Robust Distributed Deep Learning Framework by René Klaus Nikiel, Meghdad Mirabi, Carsten Binnig
  • Measuring the effects of environmental influences on Object Detection by Niklas Bunzel, Michael Geißler, Gerrit Klause
  • Hybrid Convolutional Neural Networks with Reliability Guarantee by Hans Dermot Doran, Suzana Veljanovska
  • Discussion and Closing Remarks
DSML 5: ML Systems for Security and Beyond, at Norfolk, 16:20 - 17:00, June 24
  • Intrusion Detection Systems using Quantum-Inspired Density Matrix Encodings by Larry Huynh, Jin B. Hong, Hajime Suzuki, Ajmal Mian, Seyit Camtepe
  • A Fault Diagnosis Method for Analog Circuits Based on Task Transfer Learning by Zhongyu Gao, Xiaoqing Wen, Aibin Yan
  • Discussion and Closing Remarks
VERDI 1: at Connaught, 9:00 - 10:30, June 24
  • VERDI Opening
  • VERDI Keynote: On Improving the Robustness of Convolutional Neural Networks Using In-Parameter Zero-Space Error Correction Codes by Juan Carlos Ruiz
VERDI 2: at Connaught, 11:00 - 12:30, June 24
  • Hybrid Hardware/Software Detection of Multi-Bit Upsets in Memory by Robin Thunig, Christoph Borchert, Urs Kober, Horst Schirmeier
  • Highly Comprehensive and Efficient Memory Safety Enforcement with Pointer Tagging by Xiaolei Wang, Bin Zhang, Chaojing Tang, Long Zhang
  • Enhancing Continuous Risk Assessment: The Role of Safety Engineers in Early Hazard Identification by Anil Ranjitbhai Patel, Peter Liggesmeyer
VERDI 3: at Connaught, 13:30 - 15:00, June 24
  • Cybersecurity Pathways towards CE-Certified Autonomous Forestry Machines by Mazen Mohamad, Ramana Reddy Avula, Peter Folkesson, Pierre Kleberger, Aria Mirzai, Martin Skoglund, Marvin Damschen
  • Virtual Evaluation of Dependability Attributes for Mission-Critical Cyber-Physical Systems by Adam Bachorek, Benedikt Lüken-Winkels, Iron Prando Da Silva, Stefan Schwenk, Markus Damm, Pablo Oliveira Antonino
Tutorial 1: at King George Room, 9:00 - 12:30, June 24
  • Zero-Knowledge Proofs for Blockchains by Sushmita Ruj
Tutorial 2: at Olivers, 9:00 - 12:30, June 24
  • Evaluating Performance and Dependability of Blockchain Protocols with Diablo by Andrei Lebedev, Vincent Gramoli
Tutorial 3: at King George Room, 13:30 - 17:00, June 24
  • Safe, Secure, and Trustworthy Artificial Intelligence (AI) via Formal Verification of Neural Networks and Autonomous Cyber-Physical Systems (CPS) with NNV by Taylor T. Johnson, Diego Manzanas Lopez, Hoang-Dung Tran
Tutorial 4: at Olivers Boardroom, 13:30 - 17:00, June 24
  • LLTFI and the Art of Fault Injection by Karthik Pattabiraman, Abraham Chan
DCCS 1: at Olivers Boardroom, 9:00 - 10:40, June 24
  • DCCS Opening
  • (9:00 - 9:55) DCCS keynote: Advanced Techniques for Deep Neural Network Repair by Paolo Arcaini
  • (9:55 - 10:20) DDOSHIELD-IoT: A Testbed for Simulating and Lightweight Detection of IoT Botnet DDoS Attacks by Simona De Vivo, Islam Obaidat, Dong Dai, Pietro Liguori
  • (10:20 - 10:40) Caching and Prefetching for Improving ORAM Performance by Naohiro Hayashibara, Kazuaki Kawabata
DCCS 2: at Olivers Boardroom, 10:50 - 12:35, June 24
  • (10:50 - 11:45) DCCS Keynote: On Perfect Sampling for Stochastic Petri Nets by Hiroyuki Okamura
  • (11:45 - 12:10) On Predicting Software Intensity Using Wavelets and Nonlinear Regression by Kaoru Matsui, Xiao Xiao
  • (12:10 - 12:35) Performance Comparison of Bayesian Estimations on the Residual Number of Software Bugs by Yuki Hagiwara, Tadashi Dohi, Hiroyuki Okamura

 

Local Time (UTC+10) Norfolk Connaught King George Room Olivers
8:30 - 9:00 Registration (all day)
9:00 - 9:30 Opening
9:30 - 10:00 Keynote 1
10:00 - 10:30
10:30 - 11:00 Morning Tea
11:00 - 11:30 Best Paper Session
11:30 - 12:00
12:00 - 12:30
12:30 - 13:00 Lunch
13:00 - 13:30
13:30 - 14:00 WC Award
14:00 - 14:30
14:30 - 15:00 Poster Session
15:00 - 15:30 Afternoon Tea
15:30 - 16:00 Research 1 Research 2 Research 3 Industry 1
16:00 - 16:30
16:30 - 17:00

Legend:

Keynotes Research Industry Poster Awards

Opening, 9:00 - 9:30, June 25

Session Chairs: Domenico Cotroneo (Università di Napoli Federico II) and Dan Kim (The University of Queensland)

Keynote 1, 9:30 - 10:30, June 25

Session Chair: Julia Lawall (Inria-Paris)

  • Lions OS: Towards a truly dependable operating system by Prof. Gernot Heiser, UNSW Sydney
Best Paper Session, 11:00 - 12:30, June 25

Session Chair: Domenico Cotroneo (Università di Napoli Federico II)

  • On the Correctness of Metadata-based SBOM Generation: A Differential Analysis Approach (PER) by Sheng Yu, Wei Song, Xunchao Hu, Heng Yin
  • ZLB: A Blockchain to Tolerate Colluding Majorities by Alejandro Ranchal-Pedrosa, Vincent Gramoli
  • JITBULL: Securing JavaScript Runtime with a Go/No-Go policy for JIT Engine by Jean-Baptiste Decourcelle, Boris Teabe, Daniel Hagimont
WC Award, 13:30 - 14:30, June 25

Session Chair: Domenico Cotroneo (Università di Napoli Federico II)

  • Offensive and defensive approaches for wireless communication protocols security in IoT by Romain Cayre
Research 1: Decentralized Finance, at Norfolk, 15:30 - 17:00, June 25

Session Chair: Jiangshan Yu (University of Sydney)

  • BFTRAND: Low-latency Random Number Provider for BFT Smart Contracts (Reg) by Jinghui Liao, Borui Gong, Wenhai Sun, Fengwei Zhang, Zhenyu Ning, Man Ho Allen Au, Weisong Shi
  • Byzantine Attacks Exploiting Penalties in Ethereum PoS (Reg) by Ulysse Pavloff, Yackolley Amoussou-Guenou, Sara Tucci-Piergiovanni
  • AOAB: Optimal and Fair Ordering of Financial Transactions (Reg) by Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian
Research 2: Security 1, at Connaught, 15:30 - 17:00, June 25

Session Chair: Hung Nguyen (University of Adelaide and UNSW)

  • ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse (Reg) by Mingxuan Liu, Zhenglong Jin, Jiahai Yang, Baojun Liu, Haixin Duan, Ying Liu, Ximeng Liu, Shujun Tang
  • Real Time Intrusion Detection and Flow Control with Neural Network in Kernel using eBPF (Reg) by Junyu Zhang, Pengfei Chen, Zilong He, Hongyang Chen, Xiaoyun Li
  • PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer (Reg) by Xingyu Su, Xiaojie Zhu, Yang Li, Yong Li, Chi Chen, Paulo Esteves-Veríssimo
Research 3: Memory, at King George Room, 15:30 - 17:00, June 25

Session Chair: Elmootazbellah Elnozahy (UT Austin)

  • Simultaneous Many-Row Activation in DRAM: An Experimental Characterization and Analysis of Off-the-Shelf DRAM Chips (Reg) by Ismail Emir Yuksel, Yahya Can Tuğrul, Nisa Bostanci, Geraldo Francisco de Oliveira Junior, Giray Yaglikci, Ataberk Olgun, Melina Soysal, Haocong Luo, Juan Gómez Luna, Mohammad Sadrosadati, Onur Mutlu
  • Read Disturbance in High Bandwidth Memory: A Detailed Experimental Study on HBM2 DRAM Chips (Reg) by Ataberk Olgun, Majd Osseiran, Giray Yaglikci, Yahya Can Tuğrul, Haocong Luo, Steve Rhyner, Behzad Salami, Juan Gómez Luna, Onur Mutlu
  • SPP: Safe Persistent Pointers for Memory Safety (Reg) by Dimitrios Stavrakakis, Alexandra Panfill, MJin Nam, Pramod Bhatotia
Industry 1: Security, at Olivers, 15:30 - 17:00, June 25

Session Chair: Catello Di Martino

  • Intrusion Detection at Scale with the Assistance a Command-line Language Model by Jiongliang Lin, Yiwen Guo, Hao Chen
  • Sensitive information leakage prevention in DNSSEC Zone-Walking - A Practical Solution by Fatema Bannat Wala, Stephan Bohacek
  • Road Decals as Trojans: Disrupting Autonomous Vehicle Navigation with Adversarial Patterns by Wei-Jia Chen, Chia-Yi Hsu, Chia-Mu Yu, Chun-Ying Huang, Wei-Bin Lee

 

Local Time (UTC+10) Norfolk Connaught King George Room Olivers
8:30 - 9:00 Awards (JCL)
9:00 - 9:30
9:30 - 10:00 Keynote 2
10:00 - 10:30
10:30 - 11:00 Morning Tea
11:00 - 11:30 Research 4 Research 5 Disrupt 1 Poster
11:30 - 12:00
12:00 - 12:30
12:30 - 13:00 Lunch TPC Meeting Lunch
13:00 - 13:30
13:30 - 14:00 Research 6 Research 7 Disrupt 2 Industry 2
14:00 - 14:30
14:30 - 15:00
15:00 - 15:30 Afternoon Tea
15:30 - 16:00 Poster Session
16:00 - 16:30 Break
16:30 - 19:00
19:00 - 22:00

Legend:

Keynotes Research Industry Disrupt Poster TPC Meeting Awards Social Events

Jean-Claude Laprie (JCL) Award, 8:30 - 9:30, June 26

Session Chair: Marco Vieira (University of North Carolina at Charlotte)

  • (Recording only, download from here) A Methodology for Detection and Estimation of Software Aging by Sachin Garg, Aad van Moorsel, Kalyanaraman Vaidyanathan, Kishor S. Trivedi
  • Flipping Bits in Memory without Accessing Them: An Experimental Study of DRAM Disturbance Errors by Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, Onur Mutlu
Keynote 2, 9:30 - 10:30, June 26

Session Chair: Jin Hong (The University of Western Australia)

  • Verifying the results of complex elections by A/Prof. Vanessa Teague, Australian National University
Research 4: Blockchain and BFT, at Norfolk, 11:00 - 12:30, June 26

Session Chair: Xiaojie Zhu (KAUST)

  • Moonshot: Optimizing Block Period and Commit Latency in Chain-Based Rotating Leader BFT (Reg) by Isaac Doidge, Raghavendra Ramesh, Nibesh Shrestha, Joshua Tobkin
  • Decentagram: Highly-Available Decentralized Publish/Subscribe Systems (Reg) by Haofan Zheng, Tuan Tran, Roy Shadmon, Owen Arden
  • PAROLE: Profitable Arbitrage in Optimistic Rollup with ERC-721 Token Transactions (Reg) by Alvi Ataur Khalil, Mohammad Ashiqur Rahman
Research 5: Hardware, at Connaught, 11:00 - 12:30, June 26

Session Chair: Saurabh Hukerikar (NVIDIA)

  • FIRMRES: Exposing Broken Device-Cloud Access Control in IoT Through Static Firmware Analysis (Reg) by Yuting Xiao, Jiongyi Chen, Yupeng Hu, Jing Huang
  • Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming (Reg) by Siyuan Tang, Eihal Alowaisheq, Xianghang Mi, Yi Chen, XiaoFeng Wang, Yanzhi Dou
  • OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems (Tool) by Jason Blocklove, Md Raz, Prithwish Basu Roy, Hammond Pearce, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri
Disrupt 1: at King George Room, 11:00 - 12:30, June 26

Session Chair: Lelio Di Martino (Nokia Bell Labs)

  • Neural Fault Injection: Generating Software Faults from Natural Language by Domenico Cotroneo and Pietro Liguori
  • Harnessing Explainability to Improve ML Ensemble Resilience by Abraham Chan, Arpan Gujarati, Karthik Pattabiraman and Sathish Gopalakrishnan
  • When Green Computing Meets Performance and Resilience SLOs by Haoran Qiu, Weichao Mao, Chen Wang, Saurabh Jha, Hubertus Franke, Chandra Narayanaswami, Tamer Başar, Zbigniew Kalbarczyk and Ravishankar Iyer
  • AuSSE: A Novel Framework for Security and Safety Evaluation in Autonomous Vehicles by Nhung Nguyen, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai and Dan Kim
Poster: at Olivers, 11:00 - 12:30, June 26
  • Federated Anomaly Detection by Chunjiong Zhang, Byeong-Hee Roh, Gaoyang Shan
  • Mitigating False Positives in DGA Detection for Non-English Domain Names by Huiju Lee, Huy Kang Kim
  • Cryptography-Based Bootstrapping Scheme for Permissionless Sharding Blockchain by Ziqiang Xu, Ahmad Salehi Shahraki, Naveen Chilamkurti
  • Optimizing Tree-based Quorum Certification for BFT Systems at Planetary-Scale by Christian Berger, Hans P. Reiser
  • Boosting Communication Efficiency of Federated Learning's Secure Aggregation by Niousha Nazemi, Omid Tavallaie, Shuaijun Chen, Albert Y. Zomaya, Ralph Holz
  • Balancing Privacy and Attack Utility: Calibrating Sample Difficulty for Membership Inference Attacks in Transfer Learning by Shuwen Liu, Yongfeng Qian, Yixue Hao
  • Synergizing GCN and GAT for Hardware Trojan Detection and Localization by Yu-Chen Hsiao, Chia-Heng Yen, Bo-Yang Ke, Kai-Chiang Wu
Research 6: Software Design, at Norfolk, 13:30 - 15:00, June 26

Session Chair: Lishan Yang (George Mason University)

  • System Call Interposition Without Compromise (Tool) by Adriaan Jacobs, Merve Gülmez, Alicia Andries, Stijn Volckaert, Alexios Voulimeneas
  • A Fast Low-Level Error Detection Technique (PER) by Zhengyang He, Hui Xu, Guanpeng Li
  • ChainNet: A Customized Graph Neural Network Model for Loss-aware Edge AI Service Deployment (Reg) by Zifeng Niu, Manuel Roveri, Giuliano Casale
Research 7: Autonomous Systems, at Connaught, 13:30 - 15:00, June 26

Session Chair: Naohiro Hayashibara (Kyoto Sangyo University)

  • iPrism: Characterize and Mitigate Risk by Quantifying Change in Escape Routes (Reg) by Shengkun Cui, Saurabh Jha, Ziheng Chen, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer
  • RABIT, a Robot Arm Bug Intervention Tool for Self-Driving Labs (PER) by Zainab Saeed Wattoo, Petal Vitis, Ruizhe Zhu, Noah Depner, Ivory Zhang, Jason Hein, Arpan Gujarati, Margo Seltzer
  • A comprehensive study on drones resilience in the presence of Inertial Measurement Unit faults (PER) by Anamta Khan, Naghmeh Ivaki, Henrique Madeira
Disrupt 2: at King George Room, 13:30 - 15:00, June 26

Session Chair: Paulo Verissimo (KAUST)

  • An Experimental Analysis of Combined RowHammer and RowPress Read Disturbance in Modern DRAM Chips by Haocong Luo, İsmail Emir Yüksel, Ataberk Olgun, Giray Yaglikci, Mohammad Sadrosadati and Onur Mutlu
  • PANDA: Practical Adversarial Attacks Against Intrusion Detection Applications by Subrat Kumar Swain, Vireshwar Kumar, Guangdong Bai and Dan Dongseong Kim
  • Exploring Use of Symbolic Execution for Service Analysis by Yang Zhang, Long Wang, Zhengang Wang and Dongdong Shangguan
  • On the Design of Coordination Services for IoT by Tiago Carvalho, Antonio Casimiro and Alysson Bessani
Industry 2: AI and Machine Learning, at Olivers, 13:30 - 15:00, June 26

Session Chair: Dan Kim

  • (Recording only, download from here) Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia by Shengye Wan, Joshua Saxe, Craig Gomes, Sahana Chennabasappa, Avilash Rath, Xinda Wang, Kun Sun
  • Federated Unlearning in the Internet of Vehicles by Guofeng Li, Liangmin Wang, Xia Feng, Haiqin Wu, Boris Düdder
  • Active Learning Omnivariate Decision Trees for Fault Diagnosis in Robotic Systems by Casidhe Hutchison, David Guttendorf, Milda Zizyte, Philip Koopman, Claire Le Goues
  • (Recording only, download from here) Empowering Data Centers with Computational Storage Drive-Based Deep Learning Inference Functionality to Combat Ransomware by Kurt Friday, Elias Bou-Harb, Ron Lee, Pramod Peethambaran, Mayank Saxena

 

Local Time (UTC+10) Norfolk Connaught King George Room Olivers
8:30 - 9:00 Registration (all day)
9:00 - 9:30 Awards (Rising Star and Test-of-Time)
9:30 - 10:00 Keynote 3
10:00 - 10:30
10:30 - 11:00 Morning Tea
11:00 - 11:30 Research 8 Research 9 Research 10 Doctoral
11:30 - 12:00
12:00 - 12:30
12:30 - 13:00 Lunch SC Meeting
13:00 - 13:30
13:30 - 14:00 Research 11 Research 12 Research 13 Industry 3
14:00 - 14:30
14:30 - 15:00
15:00 - 15:30 Afternoon Tea
15:30 - 16:00
16:00 - 16:30

Legend:

Keynotes Research Industry SC Meeting Doctoral Forum Social Events

Awards (Rising Star and Test-of-Time), 9:00 - 9:30, June 27

Session Chair: Domenico Cotroneo (Università di Napoli Federico II)

  • Pramod Bhatotia, TU Munich, Germany
  • Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters by Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, William Kramer
  • State Machine Replication for the Masses with BFT-SMaRt by Alysson Bessani, João Sousa, Eduardo Alchieri
Keynote 3, 9:30 - 10:30, June 27

Session Chair: Karthik Pattabiraman (University of British Columbia)

  • Critical Technologies and Cybersecurity Research: the next 10 years, by Dr. Surya Nepal, CSIRO Data61
Research 8: Distributed Agreement Protocols, at Norfolk, 11:00 - 12:30, June 27

Session Chair: Mohammad Ashiqur Rahman (Florida International University)

  • Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles (Reg) by Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter
  • Verifying Randomized Consensus Protocols with Common Coins (Reg) by Song Gao, Bohua Zhan, Zhilin Wu, Lijun Zhang
  • Iniva: Inclusive and Incentive-compatible Vote Aggregation (Reg) by Arian Baloochestani Asl, Hanish Gogada, Leander Jehl, Hein Meling
Research 9: Networking, at Connaught, 11:00 - 12:30, June 27

Session Chair: Patrick P. C. Lee (The Chinese University of Hong Kong)

  • Towards Shielding 5G Control Plane Functions (Reg) by Sudip Maitra, Tolga Atalay, Angelos Stavrou, Haining Wang
  • Intrusion Tolerance for Networked Systems Through Two-Level Feedback Control (Reg) by Kim Hammar, Rolf Stadler
  • SyRep: Efficient Synthesis and Repair of Fast Re-Route Forwarding Tables for Resilient Networks (Reg) by Csaba Györgyi, Kim Larsen, Stefan Schmid, Jiri Srba
Research 10: Security 2, at King George Room, 11:00 - 12:30, June 27

Session Chair: Baojun Liu (Tsinghua University)

  • IPMES: A Tool for Incremental TTP Detection over the System Audit Event Stream (Tool) by Hong-Wei Li, Ping-Ting Liu, Bo-Wei Lin, Yi-Chun Liao, Yennun Huang
  • ADSynth: Synthesizing Realistic Active Directory Attack Graphs (Tool) by Nhu Long Nguyen, Nick Falkner, Hung Nguyen
  • Grunt Attack: Exploiting Execution Dependencies in Microservices (Reg) by Xuhang Gu, Qingyang Wang, Jianshu Liu, Jinpeng Wei
Doctoral: at Olivers, 11:00 - 12:30, June 27
  • Patching the Cracks: Detecting and Addressing Adversarial Examples in Real-World Applications by Niklas Bunzel
  • (Recording only, watch from here) Reducing the gap between theory and practice in real-time system with MARS by Giann Nandi, David Pereira, José Proença, Eduardo Tovar, Luis Nogueira
  • MTD in Plain Sight: Hiding Network Behavior in Moving Target Defenses by Tina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim
  • Advancing NDN Security for IoT: Harnessing Machine Learning to Detect Attacks by Sai Gautam Mandapati, Chathurika Ranaweera, Robin Doss
  • Novel CAN Bus Fuzzing Framework for Finding Vulnerabilities in Automotive Systems by Manu Jo Varghese, Frank Jiang, Robin Doss, Adnan Anwar
  • Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy by Anuj Nepal, Robin Doss, Frank Jiang
  • (Re)-envisioning Approximate Agreement for Distributed Cryptography and Oracles by Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate
Research 11: Federated Learning, at Norfolk, 13:30 - 15:00, June 27

Session Chair: Angelos Stavrou (Virginia Tech)

  • Privacy Leakage from Logits Attack and Its Defense in Federated Distillation (Reg) by Danyang Xiao, Diying Yang, Jialun Li, Xu Chen, Weigang Wu
  • Goldfish: an Efficient Federated Unlearning Framework (Reg) by Houzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves-Veríssimo
  • Toward Evaluating Robustness of Reinforcement Learning with Adversarial Policy (Reg) by Xiang Zheng, Xingjun Ma, Shengjie Wang, Xinyu Wang, Chao Shen, Cong Wang
Research 12: Virtualization, at Connaught, 13:30 - 15:00, June 27

Session Chair: Marco Vieira (University of North Carolina)

  • SEDSpec: Securing Emulated Devices by Enforcing Execution Specification (Reg) by Yang Chen, Shengzhi Zhang, Qihang Zhou, Xiaoqi Jia, Heqing Huang, Shaowen Xu, Haichao Du
  • Mutiny! How does Kubernetes fail, and what can we do about it? (Reg) by Marco Barletta, Marcello Cinque, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer
  • Reboot-based Recovery of Unikernels at the Component Level (Reg) by Takeru Wada, Hiroshi Yamada
Research 13: Side Channel, at King George Room, 13:30 - 15:00, June 27

Session Chair: Xianghang Mi (USTC)

  • Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels (Reg) by Xiaoxuan Lou, Kangjie Chen, Guowen Xu, Han Qiu, Guo Shangwei, Tianwei Zhang
  • ZipChannel: Cache Side-Channel Vulnerabilities in Compression Algorithms (Reg) by Marina Minkin, Baris Kasikci
  • Owl: Differential-based Side-Channel Leakage Detection for CUDA Applications (Reg) by Yu Zhao, Wenjie Xue, Weijie Chen, Weizhong Qiang, Deqing Zou, Hai Jin
Industry 3: Fault Location/Injection/Prediction, at Olivers, 13:30 - 15:00, June 27

Session Chair: MengMeng Ge

  • Investigating Memory Failure Prediction Across CPU Architectures by Qiao Yu Huawei, Wengui Zhang, Min Zhou, Jialiang Yu, Zhenli Sheng, Jorge Cardoso, Jasmin Bogatinovski, Odej Kao
  • Optimizing Large-Scale Fault Injection Experiments through Martingale Hypothesis: A Systematic Approach for Reliability Assessment of Safety-Critical Systems by Saurabh Hukerikar, Atieh Lotfi, Yanxiang Huang, Nirmal Saxena
  • Fault Localization Using Interventional Causal Learning for Cloud-Native Applications by Saurabh Jha, Jesus Rios, Frank Bagehorn, Larisa Shwartz, Naoki Abe

CONFERENCE ROOMS:
  • Grand Windsor Ballroom (Level 2 Mercure Tower)
  • Olivers + Olivers Boardroom - Located Level 1 Mercure Tower (Directly below King George)
  • Norfolk (Level 2 Mercure Tower)
  • Connaught (Level 2 Mercure Tower)
  • King George Room (Level 2 Mercure Tower)

  • CATERING
  • Lunches in KG Bar (Ground Level - Opposite Goldfinch Restaurant)
  • Arrival TC / Morning Tea / Afternoon Tea in Grand Windsor Ballroom
  • Banquet Dinner in Lincoln & Roosevelt (Level 2 Pullman Tower)
  • Powered by w3.css