PROGRAM
Days: Tuesday, December 4th Wednesday, December 5th Thursday, December 6th Friday, December 7th
Tuesday, December 4th
View this program: with abstractssession overviewtalk overview
Wednesday, December 5th
View this program: with abstractssession overviewtalk overview
09:30-10:30 Session 1: Keynote I
Chair:
Location: Conference Room 1
09:30 | Kicking and Fixing Software: The Fun & Science of Experimental Approaches (abstract) |
10:30-11:00Coffee Break
11:00-12:30 Session 2A: Hardware Reliability
Chair:
Location: Conference Room 1
11:00 | Do Nothing, but Carefully: Fault Tolerance with Timing Guarantees for Multiprocessor Systems devoid of Online Adaptation (abstract) |
11:30 | Degradable restructuring of mesh-connected processor arrays with spares on orthogonal sides (abstract) |
12:00 | SSCMSD - Single-Symbol Correction Multi-Symbol Detection for DRAM subsystem (abstract) |
11:00-12:30 Session 2B: Information Security
Chair:
Location: Conference Room 3
11:00 | Exploring the Relationship Between Dimensionality Reduction and Private Data Release (abstract) |
11:30 | A certificateless one-way group key agreement protocol for end-to-end email encryption (abstract) |
12:00 | InfoLeak: Scheduling-based Information Leakage (abstract) |
12:30-14:00Lunch Break
14:00-15:30 Session 3A: Cyber-Physical Systems
Chair:
Location: Conference Room 1
14:00 | Experimental Resilience Assessment of An Open-Source Driving Agent (abstract) |
14:30 | Cyber-Physical Transactions: A Method for Securing VANETs with Blockchains (abstract) |
15:00 | Cyber-Physical Security of an Electric Microgrid (abstract) |
14:00-15:30 Session 3B: Modeling
Chair:
Location: Conference Room 3
14:00 | An Approach for Trustworthiness Benchmarking using Software Metrics (abstract) |
14:30 | Economic Analysis of Blockchain Technology on Digital Platform Market (abstract) |
14:40 | Specification and Formal Verification of Atomic Concurrent Real-Time Transactions (abstract) |
15:30-16:00Coffee Break
16:00-17:00 Session 4A: Cyber-Physical Systems
Chair:
Location: Conference Room 1
16:00 | An Approach for Formal Analysis of the Security of a Water Treatment Testbed (abstract) |
16:30 | Determining the Tolerable Attack Surface that Preserves Safety of Cyber-Physical Systems (abstract) |
16:00-17:00 Session 4B: Modeling
Chair:
Location: Conference Room 3
16:00 | Modeling the Required Indoor Temperature Change by Hybrid Automata for Detecting Thermal Problems (abstract) |
16:30 | Software Test-Run Reliability Modeling with Non-homogeneous Binomial Processes (abstract) |
Thursday, December 6th
View this program: with abstractssession overviewtalk overview
10:30-11:00Coffee Break
11:00-12:30 Session 6A: Internet of Things
Chair:
Location: Conference Room 1
11:00 | Effects of GPS Spoofing on Unmanned Aerial Vehicles (abstract) |
11:30 | DynPolAC: Dynamic Policy-based Access Control for IoT Systems (abstract) |
12:00 | Evaluating the Security of IoT Networks with Mobile Devices (abstract) |
11:00-12:30 Session 6B: Fast Abstracts + Posters I
Chair:
Location: Conference Room 3
11:00 | Restructuring mesh-connected processor arrays with spares on four sides by orthogonal side rotation (abstract) |
11:10 | Applying metamorphic testing to e-commerce product search engines (abstract) |
11:20 | On the Detection of Side-Channel Attacks (abstract) |
11:30 | Methods for Approximate Adders Reliability Estimation Based on PTM Model (abstract) |
11:40 | Mobile Software Security Risk Assessment with Program Analysis (abstract) |
11:50 | Towards a security-enhanced cloud platform (abstract) |
12:30-14:00Lunch Break
14:00-15:30 Session 7A: Dependable Software
Chair:
Location: Conference Room 1
14:00 | FastFI: Accelerating Software Fault Injections (abstract) |
14:30 | Control Flow Checking Optimization Based On Regular Patterns Analysis (abstract) |
15:00 | An Improved Data Error Detection Technique for Dependable Embedded Software (abstract) |
14:00-15:30 Session 7B: Fast Abstracts + Posters II
Chair:
Location: Conference Room 3
14:00 | Research on Convolutional Codes are used in RAID (abstract) |
14:10 | On IoT Misbehavior Detection in Cyber Physical Systems (abstract) |
14:20 | A SAT-Based Approach for SDN Rule Table Distribution (abstract) |
14:30 | Attempt to Apply Machine Learning to a Failure Database - A Case Study on Communications Networks (abstract) |
14:40 | An attack-tolerant agreement algorithm for block chain (abstract) |
14:50 | Software-Defined Dependable Computing for Spacecraft (abstract) |
15:30-16:00Coffee Break
16:00-17:00 Session 8A: Dependable Software
Chair:
Location: Conference Room 1
16:00 | Deriving Fault Locating Test Cases from Constrained Covering Arrays (abstract) |
16:30 | On the effectiveness of code normalization for function identification (abstract) |
16:00-17:00 Session 8B: Industrial
Chair:
Location: Conference Room 3
16:00 | Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoT (abstract) |
16:20 | ANTSdroid:Using RasMMA algorithm to generate Malware Behavior Characteristics of Android Malware Family (abstract) |
16:40 | Enforcing Enterprise Mobile Application Security Policy with Plugin Framework (abstract) |
18:00-20:00 Banquet
Location: Diamond Tony`s 101
Friday, December 7th
View this program: with abstractssession overviewtalk overview
09:30-10:30 Session 9A: Dependable Network
Chair:
Location: Conference Room 1
09:30 | Detecting Malicious Web Scraping Activity: a Study with Diverse Detectors (abstract) |
10:00 | On Algorithms Selection for Unsupervised Anomaly Detection (abstract) |
09:30-10:30 Session 9B: Dependable Network
Chair:
Location: Conference Room 3
09:30 | Hierarchical Abnormal-node Detection using Fuzzy Logic for ECA Rule-based Wireless Sensor Networks (abstract) |
10:00 | Semantic Failover in Software-Defined Networking (abstract) |
10:30-11:00Coffee Break