Final Program > Main Track Sessions

Wednesday, June 29th, 2016, 09:00 – 09:30
Room: Bellonte

Best Paper Candidates
Wednesday, June 29th, 2016, 09:30 – 11:00
Chair: Domenico Cotroneo (Università di Napoli Federico II, IT) - Room: Bellonte

A Quantitative Methodology for Security Monitor Deployment
Uttam Thakore, Gabriel A. Weaver, William H. Sanders (University of Illinois at Urbana-Champaign, US)

Dynamic Scalable State Machine Replication
Long Hoang Le, Carlos Eduardo Bezerra, Fernando Pedone (University of Lugano, CH)

OSIRIS: Efficient and Consistent Recovery of Compartmentalized Operating Systems
Koustubha Bhat, Dirk Vogt, Erik van der Kouwe, Ben Gras, Lionel Sambuc, Andrew Tanenbaum, Herbert Bos, Cristiano Giuffrida (Vrije University Amsterdam, NL)


Session MT1A: Models
Wednesday, June 29th, 2016, 11:30 – 12:30
Chair: Susanna Donatelli (University of Turin, IT) - Room: Bellonte

Mean Field Approximation of Uncertain Stochastic Models
Luca Bortolussi (University of Trieste, IT), Nicolas Gast (INRIA, FR)

Uncovering Dynamic Fault Trees
Sebastian Junges (RWTH Aachen University, DE), Dennis Guck (University of Twente, NL), Joost-Pieter Katoen (RWTH Aachen University, DE), Marielle Stoelinga (University of Twente, NL)


Session MT1B: Practical Experience Reports I
Wednesday, June 29th, 2016, 11:30 – 12:30
Chair: Andrea Ceccarelli (University of Florence, IT) - Room: Costes

Equipping WAP with Weapons to Detect Vulnerabilities
Ibéria Medeiros, Nuno Neves (University of Lisbon, LaSIGE, PT); Miguel Correia (University of Lisbon, INESC-ID, PT)

Characterizing the Consistency of Online Services
Filipe Freitas (ISEL & NOVA LINCS & FCT, UNL, PT), João Leitão (NOVA LINCS & FCT, UNL, PT), Nuno Preguiça (NOVA LINCS & FCT, University of Lisbon, PT), Rodrigo Rodrigues (INESC-ID & IST, University of Lisbon, PT)


Session MT2A: Storage Systems
Wednesday, June 29th, 2016, 14:00 – 15:30
Chair: Karthik  Pattabiraman,  (University of British Columbia, CA) - Room: Bellonte

Towards a Scalable and Write-free Multi-version Checkpointing Scheme in Solid State Drives
Hoda Aghaei Khouzani, Chengmo Yang (University of Delaware, US)

Elastic Parity Logging for SSD RAID Arrays
Yongkun Li (University of Science and Technology of China, CN); Helen H. W. Chan, Patrick P. C. Lee (The Chinese University of Hong Kong, HK), Yinlong Xu (University of Science and Technology of China, CN)

OI-RAID: A Two-layer RAID Architecture Towards Fast Recovery and High Reliability
Neng Wang, Yinlong Xu, Yongkun Li, Si Wu (University of Science and Technology of China, CN)


Session MT2B: Software-Defined Networks 
Wednesday, June 29th, 2016, 14:00 – 15:30
Chair: Catello Di Martino (Bell-Labs - Nokia, US) - Room: Costes

JURY: Validating Controller Actions in Software-Defined Networks
Kshiteej Mahajan (University of Wisconsin, US), Rishabh Poddar (University of California Berkeley, US); Mohan Dhawan, Vijay Mann (IBM Research, US)

SDNShield: Reconciliating Configurable Application Permissions for SDN App Markets
Xitao Wen (Northwestern University, US), Bo Yang (Zhejiang University, CN), Yan Chen (Northwestern University, US), Chengchen Hu (Xi’an Jiaotong University, CN); Yi Wang, Bin Liu (Tsinghua University, CN), Xiaolin Chen (Chuxiong Normal University, CN)

Can’t Touch This: Consistent Network Updates for Multiple Policies
Szymon Dudycz (Uni Wroclaw, PL), Arne Ludwig (TU Berlin, DE), Stefan Schmid (TU Berlin & T-Labs, DE)


Session MT2C: Anomaly Detection and Exploits 
Wednesday, June 29th, 2016, 14:00 – 15:30
Chair: Will Robertson (Purdue University, US) - Room: Breguet

Kizzle: A Signature Compiler for Detecting Exploit Kits
Ben Stock (CISPA, Saarland University, DE); Benjamin Livshits, Benjamin Zorn (Microsoft Research, US)

A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity
Kui Xu, Ke Tian, Danfeng (Daphne) Yao, Barbara Ryder (Virgina Tech, US)

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks
Xin Hu (Pinterest, US); Jiyong Jang, Marc Ph. Stoecklin (IBM Research, US), Ting Wang (Lehigh University, US); Douglas L. Schales, Dhilung Kirat, Josyula R. Rao (IBM Research, US)


Session MT3A: Data Centers Dependability 
Wednesday, June 29th, 2016, 16:00 – 17:30
Chair: Marcello Cinque (University of Naples Federico II, IT) - Room: Bellonte

Power-aware Checkpointing: Toward the Optimal Checkpointing Interval under Power Capping
Kun Tang (Virginia Commonwealth University, US), Devesh Tiwari (Oak Ridge National Laboratory, US), Saurabh Gupta (Oak Ridge National Laboratory, US); Ping Huang, QiQi Lu (Virginia Commonwealth University, US), Christian Engelmann (Oak Ridge National Laboratory, US), Xubin He (Virginia Commonwealth University, US)

Reconsidering Single Failure Recovery in Cluster File Systems
Zhirong Shen, Jiwu Shu (Tsinghua University, CN), Patrick P.C. Lee (The Chinese University of Hong Kong, HK)

Managing Data Center Tickets: Prediction and Active Sizing
Ji Xue (College of William and Mary, US); Robert Birke, Lydia Y. Chen (IBM Research Zurich Lab, CH), Evgenia Smirni (College of William and Mary, US)


Session MT3B: Software Dependability 
Wednesday, June 29th, 2016, 16:00 – 17:30
Chair: Michael Lyu (University of Hong Kong, HK) - Room: Costes

HSFI: representative fault injection scalable to large code bases
Erik van der Kouwe, Andrew S. Tanenbaum (Vrije University Amsterdam, NL)

Making Fast Consensus Generally Faster
Sebastiano Peluso, Alexandru Turcu, Roberto Palmieri, Giuliano Losa, Binoy Ravindran (Virginia Tech, US)

ePVF: An Enhanced Program Vulnerability Factor Methodology for Cross-layer Resilience Analysis
Bo Fang, Qining Lu, Karthik Pattabiraman, Matei Ripeanu (The University of British Columbia, Canada), Sudhanva Gurumurthi (IBM, US)


Session MT3C: Privacy
Wednesday, June 29th, 2016, 16:00 – 17:30
Chair: Nuno Neves (University of Lisbon, PT) - Room: Breguet

A Privacy Analysis of Google and Yandex Safe Browsing
Thomas Gerbet (Université Joseph Fourier, FR), Amrit Kumar (Université Grenoble Alpes & INRIA, FR), Cédric Lauradoux (INRIA, FR)

PuPPIeS: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing
Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin (Samsung Research America, US), George Kesidis (Penn State, US)

Modeling Privacy and Tradeoffs in Multichannel Secret Sharing Protocols
Devin J. Pohly, Patrick McDaniel (Penn State University, US)


Keynote: Pascal Andrei, AIRBUS GROUP:
Aircraft Security from the Manufacturer Perspective
Thursday, June 30th, 2016, 9:00 – 10:00
Chair: Mohamed Kaâniche (LAAS-CNRS, FR) - Room:

William Carter PhD Dissertation Award in Dependability
Sebastiano Peluso
(La Sapienza University of Rome & Instituto Superior Tècnico, Lisbon, PT)
Efficient Protocols for Replicated Transactional Systems
Thursday, June 30th, 2016, 10:00 – 10:30
Chairs: Doug Blough (Georgia Tech, US) - Paulo Verissimo (Univ. of Luxemburg, LU) - Room: Bellonte


Session MT4A: Memory and Caches 
Thursday, June 30th, 2016, 11:00 – 12:30
Chair: Antonio Pecchia (University of Naples Federico II, IT) - Room: Bellonte

Methuselah Flash: Rewriting Codes for Extra-Long Storage Lifetime
Georgios Mappouras, Alireza Vahid, Robert Calderbank, Daniel J. Sorin (Duke University, US)

Enabling Deep Voltage Scaling in Delay Sensitive L1 Caches
Chao Yan, Russ Joseph (Northwestern University, US)

ReadDuo: Constructing Reliable MLC Phase Change Memory through Fast and Robust Readout
Rujia Wang, Youtao Zhang, Jun Yang (University of Pittsburgh, US)


Session MT4B: Cyber-Physical Systems Security 
Thursday, June 30th, 2016, 11:00 – 12:30
Chair: Felicita Di Giandomenico (CNR, IT) - Room: Costes

On False Data Injection Attacks Against Railway Traction Power Systems
Subhash Lakshminarayana, Teo Zhan Teng, Rui Tan (Advanced Digital Sciences Center, Illinois at Singapore, SG), David Yau (Singapore University of Technology and Design, SG), Pablo Arboleya (University of Oviedo, SP)

Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-based Detection and Mitigation
Homa Alemzadeh, Daniel Chen, Xiao Li, Thenkurussi Kesavadas, Zbigniew Kalbarczyk, Ravishankar K. Iyer (University of Illinois at Urbana-Champaign, US)

F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids
Varun Badrinath Krishna, Kiryung Lee, Gabriel A. Weaver, Ravishankar K. Iyer, William H. Sanders (University of Illinois at Urbana-Champaign, US)


Session MT4C: Malware
Thursday, June 30th, 2016, 11:00 – 12:30 
Chair: Juan Carlos Ruiz (University of Valencia, ES) - Room: Breguet

Repackage-proofing Android Apps
Lannan Luo, Yu Fu , Dinghao Wu, Sencun Zhu, Peng Liu (The Pennsylvania State University, US)

Measuring the Role of Greylisting and Nolisting in Fighting Spam
Fabio Pagani, Matteo De Astis (Universita' degli Studi di Milano, IT); Mariano Graziano (Eurecom and Cisco Systems, Inc.), Andrea Lanzi (Universita' degli Studi di Milano, IT), Davide Balzarotti (Eurecom, FR)

Malware Slums: Measurement and Analysis of Malware on Traffic Exchanges
Salman Yousaf, Umar Iqbal (Lahore University of Management Sciences, PK); Shehroze Farooqi (The University of Iowa, USA), Raza Ahmad (Lahore University of Management Sciences, PK), Zubair Shafiq (The University of Iowa, US), Fareed Zaffar (Lahore University of Management Sciences, PK)


Session MT5A: Hardware Errors Resiliency 
Thursday, June 30th, 2016, 14:00 – 15:30
Chair: Zbigniew Kalbarczyk (Univ. of Illinois at Urbana Champaign, US) - Room: Bellonte

Leveraging ECC to Mitigate Read Disturbance, False Reads and Write Faults in STT-RAMSeyed Mohammad Seyedzadeh (University of Pittsburgh, US), Rakan Maddah (Intel Corporation, US), Alex K Jones, Rami Melhem (University of Pittsburgh, US)

SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems
Jiguo Song, Gedare Bloom, Gabriel Parmer (The George Washington University, US)

PARBOR: An Efficient System-Level Technique to Detect Data Dependent Failures in DRAM
Samira Khan (University of Virginia, US), Donghyuk Lee (Carnegie Mellon University, US), Chris Wilkerson (Intel Labs, US), Onur Mutlu (Carnegie Mellon University, US)


Session MT5B: Operating Systems Security and Privacy  
Thursday, June 30th, 2016, 14:00 – 15:30
Chair: Paulo Verissimo (University of Luxembourg, LU) - Room: Costes

Secure Identification of Actively Executed Code on a Generic Trusted Component
Bruno Vavala (Carnegie Mellon University, US & University of Lisbon, PT), Nuno Neves (University of Lisbon, PT), Peter Steenkiste (Carnegie Mellon University, US)

Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization
Koen Koning, Herbert Bos, Cristiano Giuffrida (Vrije University Amsterdam, NL)

Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems
Kaan Onarlioglu, William Robertson, Engin Kirda (Northeastern University, US)


Session MT5C: Android Security 
Thursday, June 30th, 2016, 14:00 – 15:30
Chair: Pascal Felber (University of Neuchâtel, CH) - Room: Breguet

Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android
Hamid Bagheri, Alireza Sadeghi, Reyhaneh Jabbarvand, Sam Malek (University of California Irvine, US)

Don't just BYOD, Bring-Your-Own-App Tool Protection via Virtual Micro Security Perimeters
Gabriel Salles-Loustau, Luis Garcia, Saman Zonouz (Rutgers University, US); Kaustubh Joshi (AT&T Research, US)

Can we Trust the Privacy Policies of Android Apps?
Le Yu, Xiapu Luo, Xule Liu, Tao Zhang (The Hong Kong Polytechnic University, HK)



Keynote: Nicolas Demassieux, Orange Labs; FR
Paving the way for Dependable Software Defined Infrastructure

Friday, July 1st, 2016, 09:00 – 10:00
Chair: Karama Kanoun (LAAS-CNRS, FR)- Room: Bellonte


IEEE Innovation in Societal Infrastructure Award
“For the Assessment-driven Design of Trustworthy Cyber Infrastructure for Electrical Systems:
William B. Sanders (UIUC, US)

Friday, July 1st, 2016, 10:00 – 10:30
Chair: Doug Blough (Georgia Tech, US) - John Walz (IEEE, US)- Room: Bellonte


Session MT6A: Clouds & Networks
Friday, July 1st, 2016, 11:00 – 12:30

Chair: Eliane Martins (UNICAMP, BR) - Room: Bellonte

StorM: Enabling Tenant-defined Cloud Storage Middle-box Services
Hui Lu (Purdue University, US), Abhinav Srivastava (AT&T Research, US); Brendan Saltaformaggio, Dongyan Xu (Purdue University, US)

Process-Oriented Non-Intrusive Recovery for Sporadic Operations on the Cloud
Min Fu, Liming Zhu, Ingo Weber, Len Bass, Anna Liu, Xiwei Xu (NICTA, Data61 CSIRO, University of New South Wales, AU)

Network Recovery after Massive Failures
Novella Bartolini, Stefano Ciavarella (University Sapienza of Rome, IT); Thomas F. La Porta (Penn State University, US), Simone Silvestri (Missouri S&T University, US)


Session MT6B: Practical Experience Reports II 
Friday, July 1st, 2016, 11:00 – 12:30
Chair: Veena Mendiratta (Bell Labs -Nokia, US) - Room: Costes

ELZAR: Triple Modular Redundancy using Intel Advanced Vector Extensions
Dmitrii Kuvaiskii, Oleksii Oleksenko, Pramod Bhatotia (TU Dresden, DE); Pascal Felber (University of Neuchâtel, CH), Christof Fetzer (TU Dresden, DE)

An Evaluation Study on Log Parsing and Its Use in Log Mining
Pinjia He, Jieming Zhu (The Chinese University of Hong Kong, HK), Shilin He (South China University of Technology, CN); Jian Li, Michael R. Lyu (The Chinese University of Hong Kong, HK)

Reliability-centered Maintenance of the Electrically Insulated Joint via Fault Tree Analysis: A Practical Experience Report
Enno Ruijters, Dennis Guck (University of Twente, NL), Martijn van Noort (ProRail, NL), Marielle Stoelinga (University of Twente, NL)


Session MT6C: Encryption and Security vs Performance 
Friday, July 1st, 2016, 11:00 – 12:00
Chair: Marco Vieira  (Univ. of Coimbra, PT) - Room: Breguet

Balancing Security and Performance for Agility in Dynamic Threat Environments
Michael L. Winterrose, Kevin M. Carter (MIT Lincoln Laboratory, US)

Rekeying for Encrypted Deduplication Storage
Jingwei Li, Chuan Qin, Patrick P.C. Lee (The Chinese University of Hong Kong, HK), Jin Li (Guangzhou University, CN)


Session MT7A: Dependability Applications 
Friday, July 1st, 2016, 14:00 – 15:30
Chair: Christof Fetzer (TU Dresden, DE)- Room: Bellonte

Efficient Algorithm-Based Fault Tolerance for Sparse Matrix Operations
Alexander Schöll, Claus Braun, Michael A. Kochte, Hans-Joachim Wunderlich (University of Stuttgart, DE)

Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids
Mohammad Ashiqur Rahman (Tennessee Tech University, US), A H M Jakaria (BUET), Ehab Al-Shaer (UNC Charlotte, US)

A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain
Leonardo Montecchi (Università di Firenze, IT), Atle Refsdal (SINTEF, NW), Paolo Lollini, Andrea Bondavalli (Università di Firenze, IT)


Session MT7B: Passwords
Friday, July 1st, 2016, 14:00 – 15:00
Chair: Emmanuelle Anceaume  (IRISA, FR) - Room: Costes

Secure Point-of-Care Medical Diagnostics via Trusted Sensing and Cyto-Coded Passwords
Tuan Le, Gabriel Salles-Loustau, Laleh Najafizadeh, Mehdi Javanmard, Saman Zonouz (Rutgers University, US)

fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars
Ding Wang (Peking University, CN), Debiao He (Wuhan University, CN); Haibo Cheng, Ping Wang  (Peking University, CN)


Session MT7C: Network Security
Friday, July 1st, 2016, 14:00 – 15:00
Chair: Jean Arlat (LAAS-CNRS, FR) - Room: Breguet

DomainProfiler: Discovering Domain Names Abused in Future
Daiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Toshiki Shibahara, Takeshi Yada (NTT Secure Platform Laboratories, JP); Tatsuya Mori, Shigeki Goto (Waseda University, JP)

FTP: The Forgotten Cloud
Drew Springall, Zakir Durumeric, J. Alex Halderman (University of Michigan, US)


Wrap Up and TC Meeting
Friday, July 1st, 2016, 15:30 – 16:30
Chair: Doug Blough (Georgia Tech, US) - Room: Bellonte


Online user: 1 RSS Feed