The International Conference on Dependable Systems and Networks (DSN) is pleased to announce the 2020 Edition of the Best Paper Award (BPA), created in DSN 2015, to recognise the best accepted scientific paper among all papers from the Main Track, in the terms of the selection process below.

Best Paper Award selection process:

At DSN, attendees will have the opportunity for the final vote, in a plenary paper session, for the best paper among a short list of the following three candidate papers, selected as follows:

  • Phase 1: At the conclusion of the DSN Program Committee meeting, the Program Committee will select from 1 to 6 papers to be considered for the BPA.
  • Phase 2: Then, the DSN Steering Committee selects from 1 to 3 papers from those selected by the Program Committee to be BPA Finalists. BPA finalists will be announced publicly before the conference.
  • Phase 3: In-person voting by DSN attendees
    • BPA Finalist papers will be presented together in a plenary session at DSN.
    • Each registered person who attends the BPA session will have the right to vote. If there is a unique BPA Finalist, no vote is necessary and the paper will be the DSN Best Paper.
    • The vote will be done by secret ballot at the end of the BPA session.
    • Votes will be counted by Steering Committee members who are present at DSN and the winner will be announced at the DSN Banquet.
    • In case of a tie, all BPA Finalists receiving the most votes will be BPA winners.

Note: There is no monetary award given to the Best Paper Award authors

The candidates for the Best Paper Award are:
Best Paper Candidates Session
Chaired by Karthik Pattabiraman, UBC
Video of the session with Q&A

List of Papers in the session and their Teasers

  • KShot: Live Kernel Patching with SMM and SGX
    Lei Zhou Southern University of Science and Technology, Fengwei Zhang (Southern University of Science and Technology), Jinghui Liao (Wayne State University), Zhenyu Ning (Southern University of Science and Technology and Wayne State University, Jidong Xiao (Boise State University), Kevin Leach (University of Michigan), Westley Weimer (University of Michigan), Guojun Wang (Guangzhou University)

  • CDN Backfired: Amplification Attacks Based on HTTP Range Requests
    Weizhong Li (Tsinghua University), Kaiwen Shen (Tsinghua University), Run Guo (Tsinghua University), Baojun Liu (Tsinghua University), Jia Zhang (Tsinghua University), Haixin Duan (Tsinghua University), Shuang Hao (University of Texas at Dallas), Xiarun Chen (Peking University), Yao Wang (Beijing Information Science & Technology University)

  • Online Payments by Merely Broadcasting Messages
    Daniel Collins (EPFL), Rachid Guerraoui (EPFL), Jovan Komatovic (EPFL), Petr Kuznetsov (Telecom ParisTech), Matteo Monti (EPFL), Matej Pavlovic (EPFL), Yvonne-Anne Pignolet (DFINITY), Dragos-Adrian Seredinschi (Interchain Foundation – Lausanne), Andrei Tonkikh (NRU HSE), Athanasios Xygkis (EPFL)

Candidates will present their contributions on Tuesday, June 30 at 16:00 (CEST). Further information can be found in the program of the conference.