| Paper ID | Title | Author(s) |
| 2 | Dataset Fault Tree Analysis for Systematic Evaluation of Machine Learning Systems | Toshiaki Aoki, Daisuke Kawakami, Nobuo Chida and Takashi Tomita |
| 4 | Generative Deep Learning for Internet of Things Network Traffic Generation | Mustafizur Rahman Shahid, Gregory Blanc, Jmila Houda, Zonghua Zhang and Hervé Debar |
| 5 | Data Poisoning Attacks on Regression Learning and Corresponding Defenses | Nicolas Müller, Daniel Kowatsch and Konstantin Böttinger |
| 8 | Safe Online Reconfiguration of Mixed-Criticality Real-Time Systems | Thawra Kadeed, Borislav Nikolic and Rolf Ernst |
| 10 | Using Attack Injection to Evaluate Intrusion Detection Effectiveness in Container-based Systems | José Flora, Paulo Gonçalves and Nuno Antunes |
| 17 | Trading dependability and energy consumption in critical infrastructures: focus on the rail switch heating system | Silvano Chiaradonna, Felicita Di Giandomenico and Giulio Masetti |
| 18 | Topology Aware Leader Election Algorithm for Dynamic Networks | Arnaud Favier, Nicolas Guittonneau, Jonathan Lejeune, Luciana Arantes, Anne Fladenmuller and Pierre Sens |
| 19 | Using metamodels to improve model-based testing of service orchestrations | Lucas Leal, Leonardo Montecchi, Andrea Ceccarelli and Eliane Martins |
| 22 | A PSD-based fingerprinting approach to detect spoofing attacks in Smart Environments | Florent Galtier, Romain Cayre, Guillaume Auriol, Mohamed Kaâniche and Vincent Nicomette |
| 23 | Dynamic Reconfiguration of Safety-Critical Production Systems | Faiz Ul Muram, Muhammad Atif Javed, Hans Hansson and Sasikumar Punnekkat |
| 25 | Security and Availability Modeling of VM Migration as Moving Target Defense | Matheus Torquato, Paulo Maciel and Marco Vieira |
| 28 | Fengyi: Trusted Data Sharing in VANETs with Blockchain | Chen Zeng, Yifan Wang, Xiaohui Peng and Liang Fan |
| 31 | Risk-Aware Leak Detection at Binary Level | Yuta Koizumi and Yoshitaka Arahori |
| 37 | PLEXUS: A Pattern-Oriented Runtime System Architecture for Resilient Extreme-Scale High-Performance Computing Systems | Saurabh Hukerikar and Christian Engelmann |
| 38 | Introducing Multi-crossover and Multi-mutation Operators to Data Replication Strategies for Distributed Systems | Syed Mohtashim Abbas Bokhari and Oliver Theel |
| 39 | Organization of machine learning based product development as per ISO 26262 and ISO/PAS 21448 | Krystian Radlak, Michal Szczepankiewicz, Tim Jones and Piotr Serwa |
| 40 | Model Compression on Faulty Array based Neural Network Accelerator | Krishna Teja Chitty-Venkata and Arun Somani |
| 44 | GTFuzz: Guard Token Directed Grey-Box Fuzzing | Rundong Li, Hongliang Liang, Liming Liu, Xutong Ma, Rong Qu, Jun Yan and Jian Zhang |