Monday, 24 June
(Workshop-Tutorial Day)
Time | DCDV | RSDA | WORCS | WSR | Tutorial 1 | Tutorial 2 |
---|---|---|---|---|---|---|
8:30 – 8:45 | Opening remarks | Opening remarks C. Di Martino, A. Pecchia, J. Stearly |
Introduction M. Kaâniche |
|||
Session 1: Cloud and Data Center Networking | Session 1: Security Data Analysis and Modeling | Session 1: Human Interactive Automated Driving Systems | Tutorial 1 | Tutorial 2 | ||
8:45-10:00 | Towards SDN Enabled Network Control Delegation in Clouds S. Malik, M. Montanari, J. Ho Huh, R. Bobba, R. Campbell |
Keynote: The Role of Data for Safety Critical Systems Development and Validation N. Silva (Critical Software Inc.) |
Keynote: Toward Vehicle Automation- ADAS The New Challenges S. Boverie |
P. Verissimo: Beyond the Glamour of Byzantine Fault Tolerance: Or Why Resisting Intrusions Means More than BFT (half day) | A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day) | |
Data Fusion-Based Anomaly Detection in Networked Critical Infrastructures B. Genge, C. Siaterlis, G. Karopoulos |
||||||
Fault-Tolerance Characteristics of Data Center Network Topologies Using Fault Regions Y. Liu, J. Muppala |
Investigating DNS Traffic Anomalies for Malicious Activities F. Yarochkin, V. Kropotov, Y. Huang, S.-Y. Kuo, G.-K. Ni, I.-Y Chen |
Autonomous Emergency Braking: A System-of-Systems Perspective H. Kopetz, S. Poledna |
||||
Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures J. B. Hong, D. S. Kim |
||||||
10:00-10:15 | Break | |||||
10:15-10:30 | Chair’s Welcome Remarks H. Maruyama |
|||||
Session 2: Dependability Evaluation | Session 2: Failures and Robustness Analysis | Session 2: Security | Session 1: Resilience Definitions and Research Opportunities | Tutorial 1 | Tutorial 2 | |
10:30-12:00 | Availability Study on Cloud Computing Environments: Live Migration as a Rejuvenation Mechanism M. Melo, P. Maciel, J. Araujo, R. Matos, C. Araújo |
Automatic Collection of Failure Data from the iOS Platform M. Cinque, D. Cotroneo, C. R. Dominguez, J. L. Garrido |
Keynote: Detecting Cognitive State for Operators of Cyber-Physical Systems: Design of Experiments R. Maxion |
Towards Systems Resilience H. Maruyama |
P. Verissimo: Beyond the Glamour of Byzantine Fault Tolerance: Or Why Resisting Intrusions Means More than BFT (half day, cont’d) | A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day, cont’d) |
Dependability Models for Designing Disaster Tolerant Cloud Computing Systems B. Silva, P. Maciel, E. Tavares, A. Zimmermann |
Towards Evaluating the Impact of Data Quality on Service Applications N. Ivaki, N. Laranjeiro, M. Vieira |
A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche, Y. Laarouchi |
FORISK: Formalizing Information Security Risk and Compliance Management S. Fenz, T. Neubauer, R. Accorsi, T. Koslowsk |
|||
Analysis of Bugs in Apache Virtual Computing Lab F. Frattini, R. Ghosh, M. Cinque, A. Rindos, K. Trivedi |
Golden-run Alignment for Analysis of Robustness Testing Results: Dealing with Diagnostics Issues G. Lemos, E. Martins |
Key Issues in Service Systems Resilience K. Furuta, T. Kanno |
||||
Author’s Panel | SCoRe: An Across-the-Board Metric for Computer Systems Resilience Benchmarking R. Almeida, A. Araújo Neto, M. Vieira |
|||||
12:00-13:30 | Lunch | |||||
Session 3: Mobile and Cloud Computing | Session 3: Data-Driven Dependability | Session 3: Smart Cooperative Driving | Session 2: Modeling Resilience | Tutorial 3 | Tutorial 2 | |
13:30-15:00 | Model-based Performance Analysis of Local Re-execution Scheme in Offloading System Q. Wang, H. Wu, K. Wolter |
Reducing Service Failures by Failure and Workload aware Load Balancing in SaaS Clouds A. Roy, R. Ganesan, D. Dash, S. Sarkar |
On Reliability Analysis of Leader Election Protocols for Virtual Traffic Lights N. Fathollahneja, E. Villani, R. Pathan, R. Barbosa , J. Karlsson |
Model-Based Evaluation of System Resilience J. Meyer |
R. Baldoni: Living in a Trustworthy Cyberspace (half day) | A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day, cont’d) |
DataFlasks: an epidemic dependable key-value substrate F. Maia, M.Matos, R. Vilaça, J. Pereira, R. Oliveira, E. Rivière |
Storage-Efficient Data Replica Number Computation for Multi-level Priority Data in Distributed Storage System C. Cai, C. Abad, R. Campbell |
The KARYON project: Predictable and Safe Coordination in Cooperative Vehicular Systems A. Casimiro, J. Kaiser, E. M. Schiller, P. Costa, J. Parizi, R. Johansson, R. Librino |
Resilience Modeling by Means of a Set of Recursive Functions M. T. Signes, J. M. García, H. Mora, J. Mora |
|||
Lilliput meets Brobdingnagian: Data Center Systems Management through Mobile Devices S. Bagchi, F.Arshad, J. Rellermeyer, T. Osiecki, M. Kistler, A. Gheith |
Predicting Job Completion Times Using System Logs in Supercomputing Clusters X. Chen, C -D. Lu, K. Pattabiraman |
Behavioral aspects for agent-based models of resilient urban systems T. Brudermann, Y. Yamagata |
||||
Reliable Mission Deployment in Vulnerable Distributed Systems M. Albanese, S. Jajodia, R. Jhawar, V. Piuri |
Driver Performance in the Presence of Adaptive Cruise Control Related-Failures J. Nilsson, N. Strand, P. Falcone, J. Vinter |
|||||
15:00-15:15 | Break | |||||
Session 4: Virtualization and Cloud | Session 4: Data-Driven Security | Session 4: Panel and Workshop Wrap-up | Session 3: Building Resilient Systems | Tutorial 2 | ||
15:15-17:00 | Increasing the Trustworthiness of Commodity Hardware Through Software K. Elphinstone, Y. Shen |
Practical Experiences with Real-world Systems: Security in the World of Reliable and Safe Systems N. Silva, R. Lopes |
Panel: Human Interactive Autonomous Driving: Future Trends, Resilience Challenges and Research perspectives Panelists: S. Boverie, J. Karlsson, H. Kopetz, J. Vinter |
An Intrusion-Tolerant Firewall Design for Protecting SIEM Systems M. Garcia, N. Neves, A. Bessani |
A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day, cont’d) | |
Intrusion Detection and Honeypots in Nested Virtualization Environments M. Beham, M. Vlad, H. P. Reiser |
Interoperability in Fingerprint Recognition – A Large Scale Empirical Study L. Lugini, E. Marasco, B. Cukic, I. Gashi |
Community-based Resilient Electricity Sharing: Optimal Spatial Clustering Y. Yamagata, H. Seya |
||||
SAFE: Shoulder-Surfing Attack Filibustered With Ease N. Gowraj, P. V. Ravi, S. Avireddy , S. Prabhu |
Cyber Security Problem based on Multi-Objective Distributed Constraint Optimization Technique T. Okimoto, N. Ikegai, T. Ribeiro, K. Inoue, H. Okada, H. Maruyama |
|||||
Addressing Memory Exhaustion Failures in Virtual Machines in a Cloud Environment J. Navas Molina, S. Mishra |
Authors’ Panel | Workshop Wrap-up and Conclusions |
||||
Concluding remarks C. Di Martino, A. Pecchia, J. Stearley |
Resilience: The Case of International Treaties O. Dahlman, N. Kyriakopoulos |
|||||
18:30-20:00 | Welcome Reception |
Preliminary program for Tuesday, 25th June.
Preliminary program for Wednesday, 26th June.
Preliminary program for Thursday, 27th June.