PRDC 2018: THE 23RD IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING
PROGRAM

Days: Tuesday, December 4th Wednesday, December 5th Thursday, December 6th Friday, December 7th

Tuesday, December 4th

View this program: with abstractssession overviewtalk overview

Wednesday, December 5th

View this program: with abstractssession overviewtalk overview

09:30-10:30 Session 1: Keynote I
09:30
Kicking and Fixing Software: The Fun & Science of Experimental Approaches (abstract)
10:30-11:00Coffee Break
11:00-12:30 Session 2A: Hardware Reliability
11:00
Do Nothing, but Carefully: Fault Tolerance with Timing Guarantees for Multiprocessor Systems devoid of Online Adaptation (abstract)
11:30
Degradable restructuring of mesh-connected processor arrays with spares on orthogonal sides (abstract)
12:00
SSCMSD - Single-Symbol Correction Multi-Symbol Detection for DRAM subsystem (abstract)
11:00-12:30 Session 2B: Information Security
11:00
Exploring the Relationship Between Dimensionality Reduction and Private Data Release (abstract)
11:30
A certificateless one-way group key agreement protocol for end-to-end email encryption (abstract)
12:00
InfoLeak: Scheduling-based Information Leakage (abstract)
12:30-14:00Lunch Break
14:00-15:30 Session 3A: Cyber-Physical Systems
14:00
Experimental Resilience Assessment of An Open-Source Driving Agent (abstract)
14:30
Cyber-Physical Transactions: A Method for Securing VANETs with Blockchains (abstract)
15:00
Cyber-Physical Security of an Electric Microgrid (abstract)
14:00-15:30 Session 3B: Modeling
14:00
An Approach for Trustworthiness Benchmarking using Software Metrics (abstract)
14:30
Economic Analysis of Blockchain Technology on Digital Platform Market (abstract)
14:40
Specification and Formal Verification of Atomic Concurrent Real-Time Transactions (abstract)
15:30-16:00Coffee Break
16:00-17:00 Session 4A: Cyber-Physical Systems
Chair:
16:00
An Approach for Formal Analysis of the Security of a Water Treatment Testbed (abstract)
16:30
Determining the Tolerable Attack Surface that Preserves Safety of Cyber-Physical Systems (abstract)
16:00-17:00 Session 4B: Modeling
16:00
Modeling the Required Indoor Temperature Change by Hybrid Automata for Detecting Thermal Problems (abstract)
16:30
Software Test-Run Reliability Modeling with Non-homogeneous Binomial Processes (abstract)
Thursday, December 6th

View this program: with abstractssession overviewtalk overview

10:30-11:00Coffee Break
11:00-12:30 Session 6A: Internet of Things
11:00
Effects of GPS Spoofing on Unmanned Aerial Vehicles (abstract)
11:30
DynPolAC: Dynamic Policy-based Access Control for IoT Systems (abstract)
12:00
Evaluating the Security of IoT Networks with Mobile Devices (abstract)
11:00-12:30 Session 6B: Fast Abstracts + Posters I
11:00
Restructuring mesh-connected processor arrays with spares on four sides by orthogonal side rotation (abstract)
11:10
Applying metamorphic testing to e-commerce product search engines (abstract)
11:20
On the Detection of Side-Channel Attacks (abstract)
11:30
Methods for Approximate Adders Reliability Estimation Based on PTM Model (abstract)
11:40
Mobile Software Security Risk Assessment with Program Analysis (abstract)
11:50
Towards a security-enhanced cloud platform (abstract)
12:30-14:00Lunch Break
14:00-15:30 Session 7A: Dependable Software
14:00
FastFI: Accelerating Software Fault Injections (abstract)
14:30
Control Flow Checking Optimization Based On Regular Patterns Analysis (abstract)
15:00
An Improved Data Error Detection Technique for Dependable Embedded Software (abstract)
14:00-15:30 Session 7B: Fast Abstracts + Posters II
14:00
Research on Convolutional Codes are used in RAID (abstract)
14:10
On IoT Misbehavior Detection in Cyber Physical Systems (abstract)
14:20
A SAT-Based Approach for SDN Rule Table Distribution (abstract)
14:30
Attempt to Apply Machine Learning to a Failure Database - A Case Study on Communications Networks (abstract)
14:40
An attack-tolerant agreement algorithm for block chain (abstract)
14:50
Software-Defined Dependable Computing for Spacecraft (abstract)
15:30-16:00Coffee Break
16:00-17:00 Session 8A: Dependable Software
16:00
Deriving Fault Locating Test Cases from Constrained Covering Arrays (abstract)
16:30
On the effectiveness of code normalization for function identification (abstract)
16:00-17:00 Session 8B: Industrial
Chair:
16:00
Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoT (abstract)
16:20
ANTSdroid:Using RasMMA algorithm to generate Malware Behavior Characteristics of Android Malware Family (abstract)
16:40
Enforcing Enterprise Mobile Application Security Policy with Plugin Framework (abstract)
Friday, December 7th

View this program: with abstractssession overviewtalk overview

09:30-10:30 Session 9A: Dependable Network
09:30
Detecting Malicious Web Scraping Activity: a Study with Diverse Detectors (abstract)
10:00
On Algorithms Selection for Unsupervised Anomaly Detection (abstract)
09:30-10:30 Session 9B: Dependable Network
Chair:
09:30
Hierarchical Abnormal-node Detection using Fuzzy Logic for ECA Rule-based Wireless Sensor Networks (abstract)
10:00
Semantic Failover in Software-Defined Networking (abstract)
10:30-11:00Coffee Break