All times are shown in CET (Central European Time)

Monday June 29
Workshop-1 (DSML)
Workshop-2 (SSIV)

Workshop-3 (DCDS)
Workshop-4 (HPC+DS)
Tutorial 1 Tutorial 2 Tutorial 3 Doctoral Forum
15:00-16:00 DSML-1 SSIV-1 DCDS-1 HPC+DS-1 DS-1
16:00-17:00 DSML-2 SSIV-2 DCDS-2 HPC+DS-2 DS-2
17:00-18:00 DSML-3 SSIV-3 X HPC+DS-3 DS-3
18:00-18:30 DSML-4 SSIV-4 X X X X X DS-4

Tuesday June 30
Research Track 1 Research Track 2 Industry track Fast Abstracts

15:00-15:15 Welcome/Opening session
15:15-15:55 Keynote 1
15:55-16:00 Break
16:00-16:45 Best Paper Candidates
16:45-16:55 Break
16:55-17:10 Carter award presentation
17:10-17:15 Break
17:15-18:30 RT-S1 RT-S2 IT-S1 X

Wednesday July 1st
Research Track 1 Research Track 2 Industry track Fast Abstracts
15:00-15:40 Keynote 2
15:40-15:45 Break
15:45-16:45 RT-S3 RT-S4 IT-S2 FA-S1
16:45-16:55 Break
16:55-17:55 RT-S5 RT-S6 IT-S3 FA-S2
17:55-18:00 Break
18:00-18:30 RT-S7 RT-S8 IT-S4 X
18:30-19:00 Social meeting (To be confirmed)

Thursday July 2nd

Research Track 1 Research Track 2 Industry track Fast Abstracts
15:00-15:15 Rising Star in Dependability (RSD) award presentation
15:15-15:55 Keynote 3
15:55-16:00 Break
16:00-17:00 RT-S9 RT-S10 IT-S5 FA-S3
17:00-17:10 Break
17:10-18:10 RT-S11 RT-S12 X FA-S4
18:10-18:15 Break
18:15-18:30 Business meeting

Program Rationale
1. Every session is followed by a 10- or 5-minutes break. This break acts as buffer between sessions (i.e., to avoid overlapping among sessions)
2. All days start with a keynote and or opening session. Keynotes are 30 minutes each + 10 minutes Q&A.
3. Keynotes, Best papers and Awards sessions are all plenary sessions
4. Papers will be presented in strict slots of 15 minutes: 10 min. for recorded presentations + 5 minutes of questions (authors must be available for that)
5. All days go from 3 PM CET to 6:30 PM CET except day 2, which has an optional social event planned

Organizational issues
1. Papers and presentations will become available from the very beginning of the conference (just after the welcome sessions)
2. A communication channel with the author (or similar) will be open for each presentation and it will remain open during 24h. Authors must answer the proposed questions and finally all Q&A will be make public
3. All conference content will become only available for conference attendees
4. Paper presentations will be pre-recorded to avoid issues with unstable internet during the session. These can be made available on a youtube channel for publicity.

Research Track

Tuesday June 30
RT-S0 Best Paper Candidates Session (3 papers)

1. KShot: Live Kernel Patching with SMM and SGX Lei Zhou Southern University of Science and Technology
Fengwei Zhang (Southern University of Science and Technology) Jinghui Liao (Wayne State University) Zhenyu Ning (Southern University of Science and Technology and Wayne State University Jidong Xiao (Boise State University) Kevin Leach (University of Michigan) Westley Weimer (University of Michigan) Guojun Wang (Guangzhou University)

2. CDN Backfired: Amplification Attacks Based on HTTP Range Requests Weizhong Li (Tsinghua University)
Kaiwen Shen (Tsinghua University)
Run Guo (Tsinghua University)
Baojun Liu (Tsinghua University)
Jia Zhang (Tsinghua University)
Haixin Duan (Tsinghua University)
Shuang Hao (University of Texas at Dallas)
Xiarun Chen (Peking University)
Yao Wang (Beijing Information Science & Technology University)

3. Online Payments by Merely Broadcasting Messages Daniel Collins (EPFL)
Rachid Guerraoui (EPFL)
Jovan Komatovic (EPFL)
Petr Kuznetsov (Telecom ParisTech)
Matteo Monti (EPFL)
Matej Pavlovic (EPFL)
Yvonne-Anne Pignolet (DFINITY)
Dragos-Adrian Seredinschi (Interchain Foundation – Lausanne)
Andrei Tonkikh (NRU HSE)
Athanasios Xygkis (EPFL)

RT-S1 Software Dependability (5 papers)
1. Comprehensive Java Metadata Tracking for Attack Detection and Repair
Jeff Perkins (MIT/CSAIL)
Jordan Eikenberry (MIT/CSAIL)
Alessandro Coglio (Kestrel Institute
Martin Rinard (MIT/CSAIL)

2. Trace Sanitizer - Eliminating the Effects of Non-determinism on Error Propagation Analysis
Habib Saissi (Technische Universität Darmstadt)
Stefan Winter (Technische Universität Darmstadt)
Oliver Schwahn (Technische Universität Darmstadt)
Karthik Pattabiraman (University of British Columbia)
Neeraj Suri (Lancaster University)

3. JSKernel: Fortifying JavaScript against Web Concurrency Attacks via a Kernel-like Structure
Zhanhao Chen (Palo Alto Networks)

Yinzhi Cao (Johns Hopkins University)

4. Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic
Jialong Zhang (ByteDance)

Zhongshu Gu (IBM Research)
Jiyong Jang (IBM Research)
Dhilung Kirat (IBM Research)
Marc Ph. Stoecklin (IBM Research)
Xiaokui Shu (IBM Research)
Heqing Huang (ByteDance)

5. CATI: Context-Assisted Type Inference from Stripped Binaries
Ligeng Chen (Nanjing University)

Zhongling He (Nanjing University)
Bing Mao (Nanjing University)

RT-S2 Machine Learning Resilience (5 papers)
1. PolygraphMR: Enhancing the Reliability and Dependability of CNNs
Salar Latifi (University of Michigan)
Babak Zamirai (University of Michigan)
Scott Mahlke (University of Michigan)

2. ML-driven Malware for Targeting AV Safety
Saurabh Jha (UIUC)

Shengkun Cui (UIUC)
Subho Banerjee (UIUC)
James Cyriac (UIUC)
Timothy Tsai (NVIDIA)
Zbigniew Kalbarczyk (UIUC)
Ravi Iyer (UIUC)

3. Leaky DNN: Stealing Deep-learning Model Secret with GPU Context-switching Side-channel
Junyi Wei (Fudan University)

Yicheng Zhang (University of California, Irvine)
Zhe Zhou (Fudan University)
Zhou Li (University of California, Irvine)
Mohammad Abdullah Al Faruque (University of California, Irvine)

4. An Experimental Study of Reduced-Voltage Operation in Modern FPGAs for Neural Network Acceleration
Behzad Salami (Barcelona Supercomputing Center (BSC))
Adrian Cristal (Barcelona Supercomputing Center (BSC)
Osman Unsal (Barcelona Supercomputing Center (BSC))
Hamid Sarbazi-Azad (Sharif University of Technology, IPM)
Onur Mutlu (ETH Zurich)

5. (practice report): Quantifying DNN Model Robustness to the Real-World Threats
Zhenyu Zhong (Baidu Research Institute)

Zhisheng Hu (Baidu Research Institute)
Xiaowei Chen (Baidu Research Institute)

Wednesday July 1st
RT-S3 Systems Dependability (4 papers)

1: The Mystery of the Failing Jobs: Insights from Operational Data from Two University-Wide Computing Systems
Rakesh Kumar (Microsoft)
Saurabh Jha (University of Illinois at Urbana-Champaign)
Ashraf Mahgoub (Purdue University)
Rajesh Kalyanam (Purdue University)
Stephen L Harrell (Purdue University)
Xiaohui Carol Song (Purdue University)
Zbigniew Kalbarczyk (University of Illinois at Urbana-Champaign)
William T Kramer (University of Illinois at Urbana-Champaign)
Ravishankar K. Iye (University of Illinois at Urbana-Champaign)
Saurabh Bagchi (Purdue University)

2: Reliable, Efficient Recovery for Complex Services with Replicated Subsystems
Edward Tremel (Cornell University)

Sagar Jha (Cornell University)
Weijia Song (Cornell University)
David Chu (Cornell University)
Ken Birman (Cornell University)

3: HAMS: High Availability for Distributed Machine Learning Service Graphs
Shixiong Zhao (University of Hong Kong)

Xusheng Chen (University of Hong Kong)
Cheng Wang (University of Hong Kong)
Fanxin Li (University of Hong Kong)
Ji Qi (University of Hong Kong)
Heming Cui (University of Hong Kong)
Cheng Li (University of Science and Technology of China)

4: Fine-Grained Fault Tolerance For Resilient Virtual Machine Monitors
Djob Mvondo (Université Grenoble Alpes)

Alain Tchana (ENS Lyon)
Renaud Lachaize (Université Grenoble Alpes)
Daniel Hagimont (Université de Toulouse)
Noel De Palma (Université Grenoble Alpes)

RT-S4 Blockchain (4 papers)
1: Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma
Maher Alharby (Newcastle University)

Roben Lunardi (PUCRS)
Amjad Aldweesh (Newcastle University)
Aad van Moorsel (Newcastle University)

2: SMACS: Smart Contract Access Control Service Bowen Liu (Singapore University of Technology and Design)
Siwei Sun (Chinese Academy of Sciences)
Pawel Szalachowski (Singapore University of Technology and Design)

3: Smart Contracts on the Move Enrique Fynn (Università della Svizzera Italiana)
Alysson Bessani (FCUL, University of Lisboa)
Fernando Pedone (Università della Svizzera Italiana)

4 (practice report): Impact of Geo-distribution and Mining Pools on Blockchains: A Study of Ethereum
Paulo Silva (University of Lisbon)
David Vavřička (University of Lisbon)
João Barreto (University of Lisbon)
Miguel Matos (University of Lisbon)

RT-S5 Network Security and Privacy (4 papers)
1. Ephemeral Exit Bridges for Tor
Zhao Zhang (Georgetown University)
Tavish Vaidya (Georgetown University)
Kartik Subramanian (Jericho High School)
Wenchao Zhou (Georgetown University)
Micah Sherr (Georgetown University)

2. The Impact of DNS Insecurity on Time
Philipp Jeitner (Tu Darmstadt)
Haya Shulman (Fraunhofer SIT)
Michael Waidner (Fraunhofer SIT, TU Darmstadt)

3: (practice report): Depending on HTTP/2 for Privacy? Good Luck!
Gargi Mitra (Indian Institute of Technology Madras)
Prasanna Karthik Vairam (Indian Institute of Technology Madras)
Patanjali SLPSK (Indian Institute of Technology Madras)
V. Kamakoti (Indian Institute of Technology Madras)
Nitin Chandrachoodan (Indian Institute of Technology Madras)

4. (practice report): Diving Into Email Bomb Attack
Markus Schneider (Fraunhofer SIT),
Haya Shulman (Fraunhofer SIT)
Adi Sidis (Fraunhofer SIT)
Ravid Sidis (Fraunhofer SIT)
Michael Waidner (Fraunhofer SIT, TU Darmstadt)

RT-S6 Embedded and Mobile (3 papers)
1: HardSnap: Leveraging Hardware Snapshotting for Embedded Systems Security Testing
Nassim Corteggiani (EURECOM)

Aurélien Francillon (EURECOM)

2. iScanU: A Portable Scanner for Undocumented Instructions on RISC Processors
Rens Dofferhof (Leiden University)

Michael Göebel (Leiden University)
Kristian Rietveld (Leiden University)

3: Libspector: Context-Aware Large-Scale Network Traffic Analysis of Android Applications
Onur Zungur (Boston University)

Gianluca Stringhini (Boston University)
Manuel Egele (Boston University)

RT-S7 Memory and Storage (2 papers)
1: Foosball Coding: Correcting Shift Errors and Bit Flip Errors in 3D Racetrack Memory
Samantha Archer (Duke University)

Georgios Mappouras (Duke University)
Daniel J. Sorin (Duke University)
Robert Calderbank (Duke University)

2: Extreme Protection against Data Loss with Single-Overlap Declustered Parity
Huan Ke (The University of Chicago)

Haryadi S. Gunawi (The University of Chicago)
David Bonnie (Los Alamos National Laboratory)
Nathan DeBardeleben (Los Alamos National Laboratory)
Michael Grosskopf (Los Alamos National Laboratory)
Terry Grové (Los Alamos National Laboratory)
Dominic Manno (Los Alamos National Laboratory)
Elisabeth Moore (Los Alamos National Laboratory)
Brad Settlemyer (Los Alamos National Laboratory)

RT-S8 Fault Injection Tools (2 papers)
1: Chaser: A Enhanced Fault Injection Tool for Tracing Soft Errors in MPI Applications
Qiang Guan (Kent State University)

Xunchao Hu (DeepBits Technology)
Terence Grove (Los Alamos National Lab)
Bo Fang (University of British Columbia)
Hailong Jiang (Kent State University)
Heng Yin (University of California, Riverside)
Nathen DeBardeleben (Los Alamos National Lab)

2: ProFIPy: Programmable Software Fault Injection as-a-Service
Domenico Cotroneo (Università degli Studi di Napoli Federico II)

Luigi De Simone (Università degli Studi di Napoli Federico II)
Pietro Liguori (Università degli Studi di Napoli Federico II)
Roberto Natella (Università degli Studi di Napoli Federico II)

Thursday July 2nd
RT-S9 IoT and Cyber-physical Systems (4 papers)
1: Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities
Pengfei Sun (Shape Security)

Luis Garcia (University of California, Los Angeles)
Gabriel Salles-Loustau (Rutgers University)
Saman Zonouz (Rutgers University)

2: Real-Time Context-aware Detection of Unsafe Events in Robot-Assisted Surgery
Mohammad Samin Yasar (University of Virginia)

Homa Alemzadeh (University of Virginia)

3: Scalable Approach to Enhancing ICS Resilience by Network Diversity
Tingting Li (Cardiff University)

Cheng Feng (Siemens Corporate Technology)
Chris Hankin (Imperial College London)

4: Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling
Haotian Chi (Temple University)

Qiang Zeng (University of South Carolina)
Xiaojiang Du (Temple University)
Jiaping Yu (Temple University)

RT-S10 Byzantine to Blockchain (4 papers)
1: From Byzantine Replication to Blockchain: Consensus is only the Beginning
Alysson Bessani (FCUL, University of Lisboa)

Eduardo Alchieri (University of Brasilia)
João Sousa (FCUL, University of Lisboa)
André Oliveira (FCUL, University of Lisboa)
Fernando Pedone (University of Lugano)

2: EPIC: Efficient Asynchronous BFT with Adaptive Security
Chao Liu (UMBC)

Sisi Duan (UMBC)
Haibin Zhang (UMBC)

3: On Incentive Compatible Role-based Reward Distribution in Algorand
Mehdi Fooladgar (Isfahan University of Technology)

Mohammad Hossein Manshaei (Florida International University)
Murtuza Jadliwala (University of Texas at San Antonio)
Mohammad Ashiqur Rahman (Florida International University)

4: FSTR: Funds Skewness aware Transaction Routing for Payment Channel Networks


RT-S11 S11. Trusted Cloud Computing (4 papers)
1: SeGShare: Secure Group File Sharing in the Cloud using Enclaves
Benny Fuhry (SAP SE)

Lina Hirschoff (SAP SE)
Samuel Koesnadi (SAP SE)
Florian Kerschbaum (University of Waterloo)

2: Omega: a Secure Event Ordering Service for the Edge
Cláudio Correia (Instituto Superior Técnico, Universidade de Lisboa)

Luis Rodrigues (INESC-ID, IST, ULisboa)
Miguel Correia (INESC-ID / IST / Univ. Lisboa)

3: Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine Stakeholders
Franz Gregor (TU Dresden)

Wojciech Ozga (TU Dresden,)
Sébastien Vaucher (University of Neuchâtel
Rafael Pires (University of Neuchâtel,
Do Le Quoc (TU Dresden)
Sergei Arnautov (Scontain UG)
André Martin (TU Dresden)
Valerio Schiavoni (University of Neuchâtel)
Pascal Felber (University of Neuchâtel)
Christof Fetzer (TU Dresden)

4: UPA: An Automated, Accurate and Efficient Differentially Private Big-data Mining System
Tsz On Li (The University of Hong Kong)

Jianyu Jiang (The University of Hong Kong)
Qi Ji (The University of Hong Kong)
Chi Chiu So (The University of Hong Kong)
JiaCheng Ma (The University of Hong Kong)
Xusheng Chen (The University of Hong Kong)
Tianxiang Shen (The University of Hong Kong)
Heming Cui (The University of Hong Kong)
Amy Wang (The University of Hong Kong)

RT-S12 S12. Formal and ML Modeling (4 papers)
1: Enhancing Reliability-Aware Speedup Modelling via Replication
Zaeem Hussain (University of Pittsburgh)

Taieb Znati (University of Pittsburgh)
Rami Melhem (University of Pittsburgh)

2: Service-based Resilience for Embedded IoT Networks
Doganalp Ergenc (University of Hamburg)

Jacek Rak (Gdansk University of Technology)
Mathias Fischer (University of Hamburg)

3: Mining Multivariate Discrete Event Sequences for Knowledge Discovery and Anomaly Detection
Bin Nie (College of William and Mary)

Jianwu Xu (NEC Laboratories America)
Jacob Alter (College of William and Mary)
Haifeng Chen (NEC Laboratories America)
Evegenia Smirni (College of William and Mary)

4 (practice report): Learning to Reliably Deliver Streaming Data with Apache Kafka
Han Wu (Free University of Berlin)

Zhihao Shang (Free University of Berlin)
Katinka Wolter (Free University of Berlin)

Industry Track
Tuesday June 30
IT-S1 Cyber-Physical Systems and Autonomous Systems

Robustness Inside Out Testing
Deborah Katz

Milda Zizyte
Casidhe Hutchison
David Guttendorf
Patrick Lanigan
Eric Sample
Philip Koopman
Michael Wagner
Claire Le Goues

Towards Host Intrusion Detection For Embedded Industrial Systems
Marine Kadar

Sergey Tverdyshev
Gerhard Fohler

The Monitor as Key Architecture Element for Safe Self-Driving Cars
Ayhan Mehmed

Moritz Antlanger
Wilfried Steiner

Wednesday July 1
IT-S2 ML for Dependable and Secure Systems
Predicting Remediations for Hardware Failures in Large-Scale Datacenters
Fred Lin
Antonio Davoli
Imran Akbar
Sukumar Kalmanje
Leandro Silva
John Stamford
Yanai Golany
Jim Piazza
Sriram Sankar

ZTE-Predictor: a Disk Failure Prediction System based on LSTM
Hongzhang Yang

Zongzhao Li
Huiyuan Qiang
Zhongliang Li
Shuguang Wei
Yahui Yang

Changchang Liu

Wei-Han Lee
Seraphin Calo

IT-S3 Networks
Simulating Reliability of IoT Networks with RelIoT Kazim Ergun
Xiaofan Yu
Nitish Nagesh
Ludmila Cherkasova
Pietro Mercati
Raid Ayoub
Tajana Rosing

Performance-Aware Wi-Fi Problem Diagnosis and Mitigation through Peer-to-Peer Data Sharing
Nathan Mickulicz

IT-S4 Panel

Thursday July 2nd
IT-S5 Modelling and Knowledge Representation
Fundamental Challenges of Cyber-Physical Systems Security Modeling
Georgios Bakirtzis

Garrett Ward
Christopher Deloglos
Carl Elks
Barry Horowitz
Cody Fleming

Ontology Configuration Management for Knowledge-Centric Systems Engineering in Industry
Borja Lopez

Jose María Alvarez Rodríguez
Eugenio Parra
Jose Luis de la Vara

Fast Abstracts
Wednesday July 1
Secure Consensus Generation with Distributed DoH Philipp Jeitner
Haya Shulman
Michael Waidner

Design and Performance Analysis of Software Defined Networking based Web Services adopting Moving Target Defense
Dong Seong Kim
Minjune Kim
Jin-Hee Cho
Hyuk Lim
Terrence J. Moore
Frederica F. Nelson

Tomographic measuring sensors system for analysis and visualization of technological processes
Mariusz Mazurek

Tomasz Rymarczyk
Grzegorz Kłosowski
Michał Maj
Przemysław Adamkiewicz

MPC for Securing Internet Infrastructure
Kris Shrishak

Haya Shulman
Pitfalls of Provably Secure Systems in Internet - The Case of Chronos-NTP
Philipp Jeitner

Haya Shulman
Michael Waidner
SIMBA: An Efficient Simulator for Blockchain Applications
Seyed Mehdi Fattahi

Tokunbo Makanju
Amin Milani Fard

Thursday July 2nd
Fault Tree Analysis: Identifying Maximum Probability Minimal Cut Sets with MaxSAT
Martín Barrère

Chris Hankin
Impact of Coding Styles on Behaviours of Static Analysis Tools for Web Applications
Ibéria Medeiros

Nuno Neves
A Novel Graphical Security Model for Evolving Cyber Attacks in Internet of Things
Dong Seong Kim

Kok Onn Chee
Mengmeng Ge

The Effect of Motion on PPG Heart Rate Sensors
Daniel Hu

Calvin Henry
Saurabh Bagchi

Reliability Analysis of Edge Scenarios using Pedestrian Mobility
Kshitiz Goel

Abhishek Bhaumick
Deepika Kaushal
Saurabh Bagchi

Improving the dependability of the ECG signal for classification of heart diseases
Bartosz Przysucha
Tomasz Rymarczyk
Dariusz Wójcik
Michał Woś
Andres Vejar

Doctoral Symposium

15:00 - 15:15 Welcome
by Sara Bouchenak

15:15 - 16:00 Keynote
Paulo Verissimo, University of Luxembourg
The Hard Path to Excellence or…why excellence is about details
Session chair: Saman Zonouz

16:00 - 16:15 Break
Session 1
Session Chair: TBA
16:15 - 16:30 Safeguarding Data Consistency at the Edge
Claudio Correia, Universidade de Lisboa, Portugal
16:30 - 16:45 Depending on HTTP/2 for Privacy? Good Luck!
Gargi Mitra, IIT Madras - Chennai, India
16:45 - 17:00 Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale
Rania Talbi, INSA-Lyon, France

17:00 - 17:15 Break
Session 2
Session Chair: TBA
17:15 - 17:30 What Exactly Determines the Type?Inferring Types with Context
Ligeng Che, Nanjing University, China
17:30 - 17:45 Impact of geo-distribution and mining pools on blockchains: a study of Ethereum
Paulo Mendes da Silva, INESC-ID & IST. U. Lisboa, Portugal
17:45 - 18:00 Canvas Mirror: Secure Integration of Third-Party Library in WebVR Environment
Jiyeon Lee, KAIST, Korea
18:00 - 18:15 A Framework for Risk Assessment in Augmented Reality-equipped Socio-technical Systems
Soheila Sheikh Bahaei, Malardalen University, Sweden

Workshop on Dependable and Secure Machine Learning (DSML)

15:00 Welcome to DSN-DSML 2020
Homa Alemzadeh, Univ. of Virginia

15:05 Keynote 1: Interpretability-Driven Dependable and Secure Machine Learning
Michael Lyu, Chinese University of Hong Kong

15:35 Q&A
15:45 Break
Paper Session 1: Attacks
15:55 TAaMR: Targeted Adversarial Attack against Multimedia Recommender Systems
Tommaso Di Noia, Daniele Malitesta, Felice Antonio Merra

16:10 On The Generation Of Unrestricted Adversarial Examples
Mehrgan Khoshpasand, Ali Ghorbani

16:25 Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert Mullins, Ross Anderson

16:40 Break
Paper Session 2: Validation, Verification, and Defense

16:50 PyTorchFI: A Runtime Perturbation Tool for DNNs
Abdulrahman Mahmoud, Neeraj Aggarwal, Alex Nobbe, Jose Rodrigo Sanchez Vicarte, Sarita Adve, Christopher W. Fletcher, Iuri Frosio, Siva Kumar Sastry Hari

17:05 Online Verification through Model Checking of Medical Critical Intelligent Systems
João Martins, Raul Barbosa, Nuno Lourenço, Jacques Robin, Henrique Madeira

17:20 BlurNet: Defense by Filtering the Feature Maps
Ravi Raju, Mikko Lipasti

17:35 Break
17:45 Keynote 2: Using Secure AI to Secure Real Users (435M of them)
Rajarshi Gupta, VP, Head of AI at Avast Security

18:15 Q&A
18:25 Discussion and Closing

Workshop on Safety and Security of Intelligent Vehicles (SSIV)

15:05-15:50 Session 1: AI and adaptive systems
• AI and Reliability Trends in Safety Critical Autonomous Systems on Ground and Air
Jyotika Athavale, Michael Paulitsch, Andrea Baldovin, Ralf Graefe and Rafael Rosales

• Reward Tuning for self-adaptive Policy in MDP based Distributed Decision-Making to ensure a Secure Mission Planning
Mohand Hamadouche, Catherine Dezan and Kalinka Regina Lucas Jauqie Castelo Branco

• Adaptive Data Selection for Efficient Cooperative Perceptions
Hui Huang, Huiyun Li, Shaobo Dang and Wenqi Fang


15:50 - 15:55 Break
15:55-16:40 Session 2: Dependability and security analysis
• The Quantitative Risk Norm - A Proposed Tailoring of HARA for ADS
Fredrik Warg, Rolf Johansson, Martin Sanfridson, Mattias Brännström, Magnus Gyllenhammar, Martin Skoglund and Anders Thorsén

• Analysis of Cybersecurity Mechanisms with respect to Dependability and Security Attributes

Behrooz Sangchoolie, Peter Folkesson, Pierre Kleberger and Jonny Vinter

• Exploring Fault Parameter Space using Reinforcement Learning-based Fault Injection

Mehrdad Moradi, Bentley James Oakes, Mustafa Saraoglu, Andrey Morozov, Klaus Janschek and Joachim Denil

16"45-17:30 Session 3: Architecture and deployment
• Flexible Deployment and Enforcement of Flight and Privacy Restrictions for Drone Applications
Nasos Grigoropoulos and Spyros Lalis

• Conceptual Design of Human-Drone Communication in Collaborative Environments

Hans Dermot Doran, Monika Reif, Marco Oehler, Curdin Stöhr and Pierluigi Capone

• A hierarchical fault tolerant architecture for an autonomous robot

Favier Anthony, Messioux Antonin, Jérémie Guiochet, Jean-Charles Fabre and Charles Lesire

17:40 - 18:30 Panel + Closing

Workshop on Data-Centric Dependability and Security (DCDS)

(15H00 CET) Welcome DCDS 2020
Ibéria Medeiros, University of Lisboa

(15H05 - 15H45) Session 1: Keynote
Session Chair: Michael Kamp, Monash University
Title: TBD
Jilles Vreeken, CISPA, Saarland University, Germany

(16H00 - 16H30) Session 2: Network Security & Privacy
Session Chair: Ibéria Medeiros, University of Lisboa

16H00 Association Rule Mining with Differential Privacy
Hao Zhen, Bo-Cheng Chiou, Yao-Tung Tsou and Sy-Yen Kuo

16H15 Pelican: A Deep Residual Network for Network Intrusion Detection
Peilun Wu, Hui Guo and Nour Moustafa

Workshop on High-performance Computing Platforms for Dependable Autonomous Systems

15:00-16:00 Session I: Hardware Platforms
“Open Source Hardware: an opportunity for critical systems"
Jimmy Le Rhun, from Thales Research and Technology, France.
"Development of a NOEL-V RISC-V SoC targeting Space Applications"
Jan Andersson, from Cobham Gaisler, Sweeden.

16:00-17:00 Session II: Software Platforms
"Safe and secure software updates on high-performance embedded computing systems".
Irune Aguirre, from Ikerlan, Spain,
"Safety-compliant autonomous automotive systems".
Edin Arnautovic, from TTTech, Austria

17:00-18:00 Session III: Certification Challenges
"Approaching certification of complex systems".
Nicholas McGuire from OSADL Safety Critical Linux Working Group, and Imanol Allende from Ikerlan, Spain.
"AI Safety Landscape: from short-term specific system engineering to long-term artificial general intelligence”
Jose Hernandez-Orallo, from Universitat Politècnica de València.

Tutorial No. / Title Presenters / Duration

1 / Cross-Layer Soft-Error Resilience Analysis of Computing Systems / half day (3h)
Alberto Bosio, École Centrale de Lyon, France
Stefano Di Carlo, Politecnico di Torino, Italy
Alessandro Savino, Politecnico di Torino, Italy
Dimitris Gizopoulos, University of Athens, Greece
Ramon Canal, Universitat Politècnica de Catalunya and Barcelona Supercomputing Center, Spain

2 / The InterPlanetary File System and the filecoin network / half day
David Dias, Protocol Labs, USA and Portugal
Ioannis Psaras, University College London, UK, and Protocol Labs, USA and Portugal

3 / Into the Unknown: Unsupervised ML Algorithms for Anomaly-Based Intrusion Detection / half day (4 hours)
Tommaso Zoppi, University of Florence, Italy
Andrea Ceccarelli, University of Florence, Italy
Andrea Bondavalli, University of Florence, Italy