Program (PDF)

The final program booklet can be found >>HERE<<

The overview of the final program is shown below.
Please note:
- Regular Track papers will have 25 minutes for presentation and 5 minutes for Q&A.
- Workshop and Industry Track papers will have 15 minutes for presentation and 5 minutes for Q&A.
- Fast Abstract Track papers will have 10 minutes for presentation and Q&A.
- Poster Track papers will be setup during Session 5B for presentation.


Sun 22-Jan

17:00 - 21:00

On-Site Registration

19:00 - 21:00

Reception (Savoy 4)


Mon 23-Jan

08:00 - 17:00

On-Site Registration

09:00 - 09:30

Opening Ceremony (Savoy West)

09:30 - 10:30

Keynote 1 (Savoy West)

Prof. Ravishankar K. Iyer, University of Illinois at Urbana-Champaign, Illinois, USA

Title: Achieving Resilience in Newer Application Domains

10:30 - 11:00

Coffee/Tea Break (Foyer)

11:00 - 12:30

Session 1A: Dependable Network 1 (Savoy West)
1) Voting in the Presence of Byzantine Faults
-L. Tseng
2) On Dependability, Cost and Security Trade-off in Cloud Data Centers
-S. K. Mondal, S. S. Abadhan and J. Muppala
3) Accelerating Integrity Verification on Secure Processors by Promissory Hash
-M. Miyanaga, H. Irie and S. Sakai

Session 1B: Evaluation of Dependability (Savoy 2)
1) Robust ORAM: Enhancing Availability, Confidentiality and Integrity
-T. P. Thao, A. Miyaji, M. S. Rahman, S. Kiyomoto and A. Kubota

2) Resilience Benchmarking of Transactional Systems: Experimental Study of Alternative Metrics
-R. Almeida, A. A. Neto and H. Madeira

3) Mercury: Performance and Dependability Evaluation of Systems with Exponential, Expolynomial and General Distributions
-P. Maciel, R. Matos, B. Silva, J. Figueiredo, D. Oliveira, I. Fé, R. Maciel and J. R. Dantas
Moved to Session 6B

12:30 - 14:00

Lunch at Rydges Latimer Christchurch Hotel (downstairs buffet)

14:00 - 15:30

Session 2A: Testing (Savoy West)
1) Detection of Recovery Patterns in Cluster System Using Resource Usage Data
-N. Gurumdimma and A. Jhumka
This will be a video presentation

2) Light-Weight Techniques for Improving the Controllability and Efficiency of ISA-Level Fault Injection Tools
-B. Sangchoolie, R. Johansson and J. Karlsson

3) Generating High Strength Test Suites for Combinatorial Interaction Testing Using ZDD-Based Graph Algorithms
-T. Ohashi and T. Tsuchiya

Session 2B: Industrial + Workshop 1 (Savoy 2)
1) Expolynomial Modelling for Supporting VANET Infrastructure Planning
-A. Lobo Jr, R. Matos, B. Silva and P. Maciel
Moved to Session 5B Poster
2)Meeting the Challenges of Critical and Extreme Dependability and Security - Analysis and Architectural Solutions
-P. E. Verissimo, M. Völp, J. Decouchant, V. Rahli and F. Rocha
3)Increasing the Accuracy of Cost and Availability Predictions of Quorum Protocols
-R. Schadek and O. Theel
4)A Rejuvenation Strategy of Two-Granularity Software Based on Adaptive Control
-Y. Fang, B. B. Yin, G. Ning, Z. Zheng and K. Y. Cai

15:30 - 16:00

Cofee/Tea Break (Foyer)

16:00 - 17:00

Session 3A: Dependable Network 2 (Savoy West)
1) A Built-in Circuit for Self-Repairing Mesh-Connected Processor Arrays with Spares on Diagonal
-I. Takanami and M. Fukushi

2) Key Management in Internet of Things via Kronecker Product
-I. C. Tsai, C. M. Yu, H. Yokota and S. Y. Kuo

Session 3B: Dependable Systems (Savoy 2)
1) Soft Errors Susceptibility of Virtualization Servers
-F. Cerveira, R. Barbosa and H. Madeira

2) An Empirical Investigation of Fault Triggers in Android Operating System
-F. Qin, Z. Zheng, X. Li, Y. Qiao and K. S. Trivedi


Tue 24-Jan

08:00 - 17:00

On-Site Registration

08:30 - 09:30

Keynote 2 (Savoy West)

Prof. Kishor S. Trivedi, Duke University, North Carolina, USA

Title: Reliability and Availability Modeling in Practice

09:30 - 11:00

Panel Discussion (Savoy West)

Title: Security and Privacy of Big-data Applications

Panellist: Yennun Huang, Paulo Verissimo, Neeraj Suri, William Sanders and Armin Zimmermann

11:00 - 11:30

Cofee/Tea Break (Foyer)

11:30 - 12:30

Session 4A: Security 1 (Savoy West)
1) Learning Process Behavioral Baselines for Anomaly Detection
-A. Fawaz and W. Sanders

2) Integration of Integrity Enforcing Technologies into Embedded Control Devices: Experiences and Evaluation
-T. Rauter, A. Höller, J. Iber and C. Kreiner

Session 4B: Smart Grid (Savoy 2)
1) Application of Congestion Notifications in a Cyber-Physical System
-S. Jackson and B. McMillin

2) SeReCP: A Secure and Reliable Communication Platform for the Smart Grid
-K. Demir and N. Suri

12:30 - 14:00

Lunch at Rydges Latimer Christchurch Hotel (downstairs buffet)

14:00 - 15:30

Session 5A: Dependable VLSI (Savoy West)
1) Designing Networks-on-Chip for High Assurance Real-Time Systems
-E. A. Rambo, C. Seitz, S. Saidi and R. Ernst

2) Multi-Site Synchronous VM Replication for Persistent Systems with Asymmetric Read/Write Latencies
-V. A. Sartakov and R. Kapitza
This will be a video presentation

3) Attack Induced Common-Mode Failures on PLC-based Safety System in a Nuclear Power Plant
-Z. Kalbarczyk, B. Lim, D. Chen and R. Iyer

Session 5B: Fast Abstract and Posters (Savoy 2)
Fast Abstract:

1) Fast Controller-Switching for Fault-Tolerant Cyber-Physical Systems on Software-Defined Networks
-S. Yoon, J. Lee, Y. Kim, S. Kim, and H. Lim
2) Spare-Tile-Based Dependable Logic Design for Sea-of-Tiles Architecture with Ambipolar Devices
-D. Takahashi and M. Arai
3) Erasure-Code-Based DTN Multi-Path Routing for Contact Avoidance
-H. Arai and M. Arai
4) A Diagnostic Fault Simulation Method for a Single Universal Logical Fault Model
-T. Hosokawa, H. Takano, H. Yamazaki, and K. Yamazaki
5) Bitcoin’s Consistency Property
-L. Tseng
6) A Hardware Trojan Circuit Detection Method Using Activation Sequence Generations
-M. Yoshimura, T. Bouyashiki, and T. Hosokawa
7) Efficient Fault-Tolerant Clock Synchronization in Ring Topologies
-K. Echtle and Z. Moztarzadeh
8) Towards Outsourced Privacy-preserving Multiparty DBSCAN
-M. S.  Rahman, A. Basu, and S. Kiyomoto

1) Instagram Spam Detection
-W. Zhang and H. M. Sun
2) Dependability Evaluation of AFDX Real-Time Avionic Communication Networks
-A. Zimmermann and P. Maciel
3) Smart Cage Implementation with Dependable Safety Agent for Dogs
-K. S. Ng, P. Y. Chen and P. H. Ting
4) Trend Analyses of Failures in Information Systems-A Case Study on Communications Networks and Financial Information Systems
-K. Bando, Y. Matsuno, Y. Ishigaki and K. Tanaka

15:30 - 16:00

Cofee/Tea Break (Foyer)

16:00 - 17:00

Session 6A: Security 2 (Savoy West)
1) Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems
-G. Sabaliauskaite, G. S. Ng, J. Ruths and A. Mathur

2) An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms
-G. Averlant, B. Morgan, E. Alata, V. Nicomette and M. Kaâniche

Session 6B: Industrial + Workshop 2 (Savoy 2)

1) Mercury: Performance and Dependability Evaluation of Systems with Exponential, Expolynomial and General Distributions
-P. Maciel, R. Matos, B. Silva, J. Figueiredo, D. Oliveira, I. Fé, R. Maciel and J. R. Dantas
 1) Capacity-Oriented Availability model for Resources Estimation on Private Cloud Infrastructure
-C. Melo, R. Matos, J. Dantas and P. Maciel
Moved to Session 5B Posters

2) Method and Case Study of Model Checking Concurrent Systems That use Unbounded Timestamps
-S. Nakano and T. Tsuchiya
3) Formal Specification and Verification of Security Guidelines
-Z. Zhioua, Y. Roudier and R. B. Ameur
This will be a video presentation

19:00 - 21:00



Wed 25-Jan

08:00 - 11:00

On-Site Registration

09:30 - 10:30

Session 7A: Dependability for Traffic Systems 1 (Savoy West)
1) On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure
-W. G. Temple, B. A. N. Tran, B. Chen, Z. Kalbarczyk and W. H. Sanders

2) Electromagnetic Noise Tolerant Hybrid Communication Protocol for CANs
-M. Nakamura, K. Konomi, M. Ohara, K. Sakai and S. Fukumoto

Session 7B: Coding (Savoy 2)
1) MEC: Network Optimized Multi-stage Erasure Coding for Scalable Storage Systems
-H. Akutsu, T. Yamamoto, K. Ueda and H. Saito

2) A Novel Highly Available Data Replication Strategy exploiting Data Semantics, Coding Techniques and Prior At-Hand Knowledge
-A. Usman, R. Schadek and O. Theel

10:30 - 11:00

Cofee/Tea Break (Foyer)

11:00 - 12:00

Session 8A: Dependability for Traffic Systems 2 (Savoy West)
1) A Probabilistic Analysis of a Leader Election Protocol for Virtual Traffic Lights
-N. Fathollahnejad, R. Barbosa and H. Karlsson
2) Specification, Implementation and Verification of Dynamic Group Membership for Vehicle Coordination
-M. Asplund, J. Lövhall and E. Villani

Session 8B: Security 3 (Savoy 2)
1) Accounting for the Human User in Predictive Security Models
-M. A. Noureddine, A. Marturano, K. Keefe, M. Bashir and W. H. Sanders
2) Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy
-H. L. Chen, J. Y. Chen, Y. T. Tsou, C. M. Yu, B. C. Tai, S. C. Li, Y.
Huang and C. M. Li