Final Program — Monday

Final program for Monday, 24th June.
Final program for Tuesday, 25th June.
Final program for Wednesday, 26th June.
Final program for Thursday, 27th June.

Monday, 24 June

(Workshop-Tutorial Day)

Time DCDV RSDA WORCS WSR Tutorial 1 Tutorial 2
(Chair: Robert Schwarz) (Chair: Allen Wood)
8:30-8:45 Opening remarks Opening remarks
C. Di Martino, A. Pecchia, J. Stearly
Introduction
M. Kaâniche
P. Verissimo: Beyond the Glamour of Byzantine Fault Tolerance: Or Why Resisting Intrusions Means More than BFT (half day) A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day)
Session 1: Cloud and Data Center Networking Session 1: Security Data Analysis and Modeling Session 1: Human Interactive Automated Driving Systems
8:45-10:00 Towards SDN Enabled Network Control Delegation in Clouds
S. Malik, M. Montanari, J. Ho Huh, R. Bobba, R. Campbell
Keynote: The Role of Data for Safety Critical Systems Development and Validation
N. Silva (Critical Software Inc.)
Keynote: Toward Vehicle Automation- ADAS The New Challenges
S. Boverie
Data Fusion-Based Anomaly Detection in Networked Critical Infrastructures
B. Genge, C. Siaterlis, G. Karopoulos
Fault-Tolerance Characteristics of Data Center Network Topologies Using Fault Regions
Y. Liu, J. Muppala
Investigating DNS Traffic Anomalies for Malicious Activities
F. Yarochkin, V. Kropotov, Y. Huang, S.-Y. Kuo, G.-K. Ni, I.-Y Chen
Autonomous Emergency Braking: A System-of-Systems Perspective
H. Kopetz, S. Poledna
Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures
J. B. Hong, D. S. Kim
10:00-10:15 Break
10:15-10:30 Chair’s Welcome Remarks
H. Maruyama
Session 2: Dependability Evaluation Session 2: Failures and Robustness Analysis Session 2: Security Session 1: Resilience Definitions and Research Opportunities
(Chair: Patricia Longstaff)
Tutorial 1 Tutorial 2
10:30-12:00 Availability Study on Cloud Computing Environments: Live Migration as a Rejuvenation Mechanism
M. Melo, P. Maciel, J. Araujo, R. Matos, C. Araújo
Automatic Collection of Failure Data from the iOS Platform
M. Cinque, D. Cotroneo, C. R. Dominguez, J. L. Garrido
Keynote: Detecting Cognitive State for Operators of Cyber-Physical Systems: Design of Experiments
R. Maxion
Towards Systems Resilience
H. Maruyama
P. Verissimo: Beyond the Glamour of Byzantine Fault Tolerance: Or Why Resisting Intrusions Means More than BFT (half day, cont’d) A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day, cont’d)
Dependability Models for Designing Disaster Tolerant Cloud Computing Systems
B. Silva, P. Maciel, E. Tavares, A. Zimmermann
Towards Evaluating the Impact of Data Quality on Service Applications
N. Ivaki, N. Laranjeiro, M. Vieira
A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks
I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche, Y. Laarouchi
FORISK: Formalizing Information Security Risk and Compliance Management
S. Fenz, T. Neubauer, R. Accorsi, T. Koslowski
Analysis of Bugs in Apache Virtual Computing Lab
F. Frattini, R. Ghosh, M. Cinque, A. Rindos, K. Trivedi
Golden-run Alignment for Analysis of Robustness Testing Results: Dealing with Diagnostics Issues
G. Lemos, E. Martins
Key Issues in Service Systems Resilience
K. Furuta, T. Kanno
Author’s Panel SCoRe: An Across-the-Board Metric for Computer Systems Resilience
Benchmarking
R. Almeida, A. Araújo Neto, M. Vieira
12:00-13:30 Lunch
Session 3: Mobile and Cloud Computing Session 3: Data-Driven Dependability Session 3: Smart Cooperative Driving Session 2: Modeling Resilience
(Chair: Thomas Koslowski)
Tutorial 3 Tutorial 2
13:30-15:00 Model-based Performance Analysis of Local Re-execution Scheme in Offloading System
Q. Wang, H. Wu, K. Wolter
Reducing Service Failures by Failure and Workload aware Load Balancing in SaaS Clouds
A. Roy, R. Ganesan, D. Dash, S. Sarkar
On Reliability Analysis of Leader Election Protocols for Virtual Traffic Lights
N. Fathollahneja, E. Villani, R. Pathan, R. Barbosa , J. Karlsson
Model-Based Evaluation of System Resilience
J. Meyer
R. Baldoni: Living in a Trustworthy Cyberspace (half day) A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day, cont’d)
DataFlasks: an epidemic dependable key-value substrate
F. Maia, M.Matos, R. Vilaça, J. Pereira, R. Oliveira, E. Riviere
Storage-Efficient Data Replica Number Computation for Multi-level Priority Data in Distributed Storage System
C. Cai, C. Abad, R. Campbell
The KARYON project: Predictable and Safe Coordination in Cooperative Vehicular Systems
A. Casimiro, J. Kaiser, E. M. Schiller, P. Costa, J. Parizi, R. Johansson, R. Librino
Resilience Modeling by Means of a Set of Recursive Functions
M. T. Signes, J. M. García, H. Mora, J. Mora
Lilliput meets Brobdingnagian: Data Center Systems Management through Mobile Devices
S. Bagchi, F.Arshad, J. Rellermeyer, T. Osiecki, M. Kistler, A. Gheith
Predicting Job Completion Times Using System Logs in Supercomputing Clusters
X. Chen, C -D. Lu, K. Pattabiraman
Behavioral aspects for agent-based models of resilient urban systems
T. Brudermann, Y. Yamagata
Reliable Mission Deployment in Vulnerable Distributed Systems
M. Albanese, S. Jajodia, R. Jhawar, V. Piuri
Driver Performance in the Presence of Adaptive Cruise Control Related-Failures
J. Nilsson, N. Strand, P. Falcone, J. Vinter
15:00-15:15 Break
Session 4: Virtualization and Cloud Session 4: Data-Driven Security Session 4: Panel and Workshop Wrap-up Session 3: Building Resilient Systems
(Chair: Kazuhiro Minami)
Tutorial 2
15:15-17:00 Increasing the Trustworthiness of Commodity Hardware Through Software
K. Elphinstone, Y. Shen
Practical Experiences with Real-world Systems: Security in the World of Reliable and Safe Systems
N. Silva, R. Lopes
Panel: Human Interactive Autonomous Driving: Future Trends, Resilience Challenges and Research perspectives
Panelists: S. Boverie, J. Karlsson, H. Kopetz, J. Vinter
An Intrusion-Tolerant Firewall Design for Protecting SIEM Systems
M. Garcia, N. Neves, A. Bessani
A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day, cont’d)
Intrusion Detection and Honeypots in Nested Virtualization Environments
M. Beham, M. Vlad, H. P. Reiser
Interoperability in Fingerprint Recognition – A Large Scale Empirical Study
L. Lugini, E. Marasco, B. Cukic, I. Gashi
Community-based Resilient Electricity Sharing: Optimal Spatial Clustering
Y. Yamagata, H. Seya
SAFE: Shoulder-Surfing Attack Filibustered With Ease
N. Gowraj, P. V. Ravi, S. Avireddy , S. Prabhu
Cyber Security Problem based on Multi-Objective Distributed Constraint Optimization Technique
T. Okimoto, N. Ikegai, T. Ribeiro, K. Inoue, H. Okada, H. Maruyama
Addressing Memory Exhaustion Failures in Virtual Machines in a Cloud Environment
J. Navas Molina, S. Mishra
Authors’ Panel Workshop Wrap-up and Conclusions
Concluding remarks
C. Di Martino, A. Pecchia, J. Stearley
18:30-20:00 Welcome Reception
Location: Hungarian Academy of Sciences

Final program for Monday, 24th June.
Final program for Tuesday, 25th June.
Final program for Wednesday, 26th June.
Final program for Thursday, 27th June.