Conference Program

 

Local Time
(UTC+2)
Aula A
(Centro Congressi)
Aula B
(Centro Congressi)
Sveva
(Royal)
Santa Lucia
(Royal)
Catalana
(Royal)
Aragonese
(Royal)
Angioina
(Royal)
Capuana
(Royal)
8:30 - 9:00 Registration
9:00 - 10:30 VERDI 1 DSML 1 DT4DRS 1 EnvSys 1 AxC 1 Tutorial 1 Tutorial 2 Tutorial 3
10:30 - 11:00 Coffee Break
11:00 - 12:30 VERDI 2 DSML 2 DT4DRS 2 EnvSys 2 AxC 2 Tutorial 1 Tutorial 2 Tutorial 3
12:30 - 14:00 Lunch
14:00 - 15:30 VERDI 3 DSML 3 DT4DRS 3 EnvSys 3 AxC 3 Tutorial 4 Tutorial 5 Tutorial 6
15:30 - 16:00 Coffee Break
16:00 - 17:30 VERDI 4 DSML 4 AxC 4 Tutorial 4 Tutorial 5 Tutorial 6
19:00 - 20:30

VERDI 1: Opening and Keynote at Aula A (Centro Congressi), 9:00 - 10:30, June 23
  • Session Chair: Behrooz Sangchoolie, RISE Research Institutes of Sweden, Sweden
  • Welcome to VERDI 2025 by Behrooz Sangchoolie (RISE Research Institutes of Sweden, Sweden), David Pereira (VORTEX CoLab, Portugal), José Proença (CISTER, Faculty of Sciences, University of Porto, Portugal)
  • Keynote: Graphical Security Models and Their Applications by Dan Dongseong Kim, University of Queensland, Australia
VERDI 2: Autonomous Vehicles at Aula A (Centro Congressi), 11:00 - 12:30, June 23
  • Session Chair: David Pereira, VORTEX CoLab, Portugal
  • A Hybrid Cybersecurity Assessment Framework for Unmanned Aircraft Vehicles Based on IMECA and Penetration Testing by Artem Abakumov, Vyacheslav Kharchenko (National Aerospace University KhAI, Kharkiv, Ukraine), Peter Popov (City St George’s, University of London, United Kingdom)
  • Refining Environmental Requirements for Autonomous Driving Systems: Leveraging the FRAV Framework by Mahwish Kundi (Maynooth University, Ireland), Faraz Ahmad (Abdul Wali Khan University Mardan, Pakistan), Rosemary Monahan (Maynooth University, Ireland)
  • Safety-Centric Architecture for AI-Enabled Autonomous Driving Systems by Jatin Arora (VORTEX CoLab and CISTER, ISEP, Portugal), Alexandre Esper (Capgemini Engineering, Porto, Portugal), Vasco Santos (VORTEX CoLab, Portugal)
VERDI 3: Logical Reasoning at Aula A (Centro Congressi), 14:00 - 15:30, June 23
  • Session Chair: Raul Barbosa, University of Coimbra, Portugal
  • Model-driven, logic-supported exploratory dependability analysis by András Földvári (Budapest University of Technology and Economics, Hungary), András Pataricza (Budapest University of Technology and Economics, Hungary)
  • Enhancing Cyber-Physical System Dependability via Synthesis: Challenges and Future Directions by Max Taylor (Idaho National Laboratory, United States), Arthur Amorim (The University of Central Florida, United States)
  • Reasoning with Happens-Before Relations about Concurrent Programs in the Theta Framework by Csanád Telbisz, Levente Bajczi, Dániel Szekeres, András Vörös, István Majzik (Budapest University of Technology and Economics, Hungary)
VERDI 4: AI for V&V at Aula A (Centro Congressi), 16:00 - 17:30, June 23
  • Session Chair: Peter Popov, City St George’s, University of London, United Kingdom
  • Dependability Assurance with Symbolic Reasoning in LLM-enabled Systems by András Gergely Deé-Lukács, András Földvári (Budapest University of Technology and Economics, Hungary)
  • Program Verification for Rigorous Analysis of Decision Tree Ensembles against Specifications by Iat Tou Leong (University of Coimbra, CISUC, Portugal), Aleksandar Avdalovic (Louisiana State University, United States), Raul Barbosa (University of Coimbra, CISUC, Portugal)
  • DURA‑CPS: A Multi‑Role Orchestrator for Dependability Assurance in LLM‑Enabled Cyber‑Physical Systems by Trisanth Srinivasan (Department of AI Deployment and Safety, Cyrion Labs, United States), Santosh Patapati (Molecular Engineering & Sciences Institute, University of Washington, United States), Himani Musku (School of Computer Science, Carnegie Mellon University, United States), Idhant Gode (College of Engineering, Cornell University, United States), Aditya Arora (ACM AI, University of California San Diego, United States), Samvit Bhattacharya (Department of R&D, Cyrion Labs, United States), Abubakr Nazriev (Sentinel DE, University of Montana, United States), Sanika Hirave (Dept. of Computer Science & Engineering, Oakland University, United States), Zaryab Kanjiani (Dyson AEM, Cornell University, United States), Srinjoy Ghose (School of Science, University of North Texas, United States)
DSML 1: Keynote Talk 1 at Aula B (Centro Congressi), 9:00 - 10:30, June 23
  • Session Chair: Xugui Zhou, Louisiana State University
  • Welcome words
  • Keynote: Dependability and Security of Machine Learning: Old Wine in a New Bottle or Not? by Karthik Pattabiraman, University of British Columbia
DSML 2: Adversarial Machine Learning and Defenses at Aula B (Centro Congressi), 11:00 - 12:30, June 23
  • Session Chair: Zhengping Jay Luo, Rider University
  • Revisiting Adversarial Perception Attacks and Defense Methods on Autonomous Driving Systems by Cheng Chen, Yuhong Wang, Nafis S Munir, Xiangwei Zhou, Xugui Zhou (Louisiana State University)
  • On the Transferability of Adversarial Attacks from Convolutional Neural Networks to Variants of ChatGPT4 by Niklas Bunzel (Fraunhofer Institute for Secure Information Technology)
  • Learning from the Good Ones: Risk Profiling-Based Defenses Against Evasion Attacks on DNNs by Mohammed Elnawawy, Gargi Mitra (University of British Columbia), Shahrear Iqbal (National Research Council Canada), Karthik Pattabiraman (University of British Columbia)
  • Audio Jailbreak Attacks: Exposing Vulnerabilities in SpeechGPT in a White-Box Framework by Binhao Ma (University of Missouri-Kansas City), Hanqing Guo (University of Hawaii at Mānoa), Zhengping Jay Luo (Rider University), Rui Duan (University of Missouri-Kansas City)
DSML 3: Keynote Talk 2 at Aula B (Centro Congressi), 14:00 - 15:30, June 23
  • Session Chair: Niklas Bunzel (Fraunhofer Institute for Secure Information Technology)
  • Keynote: Securing the Machine Learning Components of Autonomous Vehicles: Risk Assessment and Mitigation by Evgenia Smirni, Chair and Sidney P. Chockley Professor, Computer Science, College of William and Mary, USA
  • FHE ML Tuxedo: A Tailored Wrapper Architecture for Homomorphic Encryption in Machine Learning by Martin Nocker, Linus Henke, Pascal Schöttle (Josef Ressel Centre for Security Analysis of IoT Devices, MCI The Entrepreneurial School, Innsbruck, Austria)
DSML 4: Trust and Vulnerabilities in Generative AI Systems at Aula B (Centro Congressi), 16:00 - 17:30, June 23
  • Session Chair:Karthik Pattabiraman (University of British Columbia)
  • Hallucination Detection in LLMs via Beam Search Sampling and Semantic Consistency Analysis by Radouane Bouchekir (fortiss GmbH), Fathiyeh Faghih (fortiss GmbH), Tewodros Beyene (fortiss GmbH)
  • Securing AI Code Generation Through Automated Pattern-Based Patching by Francesco Altiero, Domenico Cotroneo, Roberta De Luca, Pietro Liguori (Università degli Studi di Napoli Federico)
  • Decoding Neighborhood Environments with Large Language Models by Andrew Cart, Shaohu Zhang, Melanie Escue, Xugui Zhou, Haitao Zhao, Prashanth BusiReddyGari (University of North Carolina at Pembroke), Beiyu Lin (University of Oklahoma), Shuang Li (North Carolina A&T State University)
  • A Lightweight Reputation-Based Mechanism for Incentivizing Cooperation in Decentralized Federated Learning by Kavindu Bagchi, Suraj Mahangade, Saurabh Bagchi (Purdue University)
  • Closing Remarks
DT4DRS 1: Opening at Sveva (Royal), 9:00 - 10:30, June 23
  • Session Chairs: Alessandra Somma, Alessandra De Benedictis, University of Naples Federico II
  • Keynote: Digital Twins for Trustworthy Autonomy by Prof. Francesco Flammini, University of Florence
DT4DRS 2: Digital Twins for Environment Management and Urban Mobility Safety at Sveva (Royal), 11:00 - 12:30, June 23
  • Session Chair: Alessandra Somma, University of Naples Federico II
  • An Architectural Framework for Urban Digital Twin Design: a Case Study on Hydrogeological Risk Management by Angelo Martella, Antonella Longo, Cristian Martella, Marco Zappatore, Francesca Miccoli (Università del Salento, Italy)
  • An Integrated Digital Twin Architecture for Real-Time Urban Air Quality Management by Manoj Herath, Hrishikesh Dutta, Roberto Minerva, Noël Crespi, Maira Alvi, Syed Raza (Telecom SudParis, France)
  • A Digital Twin Approach to Autonomous Emergency Braking: HiL Testing with Raspberry Pi and Standardized Scenarios by Roland Nagy, Árpád Török (Budapest University of Technology and Economics, Hungary)
  • Network and Vehicle Digital Twins for Hardware-in-the-Loop Simulation of C-ITS Applications by Andrea Marchetta (University Federico II of Naples, Italy), Tamás Márton Kazár (Budapest University of Technology and Economics, Hungary), Marcello Cinque (University Federico II of Naples, Italy), Angelo Coppola (University Federico II of Naples, Italy), Zsombor Pethő (Budapest University of Technology and Economics, Hungary), Zsolt Szalay (Budapest University of Technology and Economics, Hungary), and Árpád Török (Budapest University of Technology and Economics, Hungary)
DT4DRS 3: Resilient and Secure Infrastructures through Digital Twins at Sveva (Royal), 14:00 - 15:30, June 23
  • Session Chair: Alessandra De Benedictis, University of Naples Federico II
  • A Digital Twin Network for Proactive Security: The Smart Grid Use-Case by Biagio Boi, Christian Esposito (Università di Salerno, Italy)
  • A Model-based Approach for Cybersecurity Assessment of Off-Road and Defense Vehicles by Umberto Bellini (Università di Trento, Italy), Marzieh Kordi (IMT School for Advanced Studies, Italy), Bruno Crispo (Università di Trento, Italy), Paolo Lollini (Università degli Studi di Firenze, Italy), Andrea Bondavalli (Università degli Studi di Firenze), and Davide Compar (IDV, Italy)
  • Using Digital Twins as an Upgrade Path for Critical Infrastructure Control Systems by Huzaifah Nadeem, Amy Babay (University of Pittsburgh, USA)
  • Toward Predictive Diagnostics: Real-Time Digital Twin for Electric Vehicle Power Systems by Emil Nagy, Dávid Tollner (Budapest University of Technology and Economics, Hungary), József Pázmány (Jaguar Land Rover Hungary Kft., Hungary), Árpád Török (Budapest University of Technology and Economics, Hungary)
  • Closing
EnvSys 1: Opening at Santa Lucia (Royal), 9:00 - 10:30, June 23
  • Session Chair: Wen-Ping Tsai National Cheng Kung University)
  • Ice-breaking activities
  • Keynote: The Power of On-line Indirect Surveys to Monitor Society by Antonio Fernández Anta (IMDEA), Nicolas Nicolaou (Algolysis Ltd), Efstathios Stavrakis (Algolysis Ltd)
  • Invited Talk: Flood Resilience through Hybrid Deep Learning: Optimizing Taipei’s Urban Drainage System by Fi-John Chang (National Taiwan University)
EnvSys 2: Full Papers Session at Santa Lucia (Royal), 11:00 - 12:30, June 23
  • Session Chair: Lewis Tseng (UMass Lowell)
  • Weather Impact Analysis for UAV-based Deforestation Monitoring Systems by Tasfia Nuzhat, Fumio Machida (University of Tsukuba), Ermeson Andrade (Federal Rural University of Pernambuco)
  • Federated Learning-Based Approach for Landslide Prediction – The Case Study in Taiwan by Po-Wu Cheng, Wen-Ping Tsai (National Cheng Kung University)
  • Beyond Control: Embracing Emergent Behavior in Symbiotic Digital Twin and CPS Ecosystems by Andrea Garbugli, Paolo Bellavista, Armir Bujari (University of Bologna)
EnvSys 3: Tutorial and Short Papers Session at Santa Lucia (Royal), 14:00 - 15:30, June 23
  • Session Chair: Wen-Ping Tsai National Cheng Kung University)
  • Tutorial: Water Sustainability and Computing by Wen-Ping Tsai (National Cheng Kung University), Lewis Tseng (UMass Lowell)
  • Risk Assessment and Adaptive Management: Integrating LSTM-Based Groundwater Forecasting for Climate-Driven Water Resource Planning by Pei Ju Tsang, Wen-Ping Tsai (National Cheng Kung University)
  • Experience: Evaluating Real-time Drone OS under Extreme and Adversarial Environment by Vina Dang, Layann Shaban, Lewis Tseng (UMass Lowell)
  • Roundtable discussion and conclusion
AxC 1: Keynote Talks at Catalana (Royal), 9:00 - 10:30, June 23
  • Keynote: Architectural-Level Approximate Accelerator Synthesis: Techniques, Challenges, and Future Directions by Muhammad Awais, Paderborn University, Germany
  • Keynote: Low Cost Protection of Streaming Data with Approximate Block Sums by Somayeh Sadeghi Kohan, Paderborn University, Germany
AxC 2: Precision Meets Pragmatism: Approximating for Efficiency in AI at Catalana (Royal), 11:00 - 12:30, June 23
  • On the resilience of INT8 Quantized Neural Networks on Low-Power RISC-V Devices by Antonio Porsia, Giacomo Perlo, Annachiara Ruospo, Ernesto Sanchez (Politecnico di Torino)
  • A Margin Based Early-Stopping Approach for Random Forest classifiers by Mario Barbareschi, Antonio Emmanuele (University of Naples Federico II)
AxC 3: Optimized Circuits and Computation: Reliability, Health, and Energy Efficiency at Catalana (Royal), 14:00 - 15:30, June 23
  • XMULT: An Energy-Efficient Design of Approximate Multiplier by Ahsan Rafiq, Maksim Jenihhin (Tallinn University of Technology, Estonia)
  • Deep&Wide: Achieving Area Efficiency in Scalable Approximate Accelerators by Farjana Jalil, Qazi Arbab Ahmed, Hassan Ghasemzadeh Mohammadi, Thorsten Jungeblut (Bielefeld University of Applied Sciences and Arts), Muhammad Awais, Marco Platzner (Paderborn University), Reneo Group GmbH
AxC 4: Keynote Talk at Catalana (Royal), 16:00 - 17:30, June 23
  • Keynote: Approximate and Stochastic Ising Machines by Jie Han, University of Alberta, Canada
Tutorial 1: at Aragonese (Royal), 09:00 - 12:30, June 23
  • Generative AI in Cybersecurity: Generating Offensive Code from Natural Language by Pietro Liguori, Roberto Natella, Domenico Cotroneo (Università degli Studi di Napoli Federico II, Italy)
Tutorial 2: at Angioina (Royal), 09:00 - 12:30, June 23
  • Model-based Qualitative Dependability and Security Evaluation by András Földvári, András Pataricza (Budapest University of Technology and Economics, Hungary)
Tutorial 3: at Capuana (Royal), 09:00 - 12:30, June 23
  • Evaluating Blockchain Fault Tolerance with STABL by Vincent Gramoli (University of Sydney and Redbelly Network, Australia), Rachid Guerraoui (EPFL, Switzerland), Andrei Lebedev (University of Sydney, Australia), Gauthier Voron (EPFL, Switzerland)
Tutorial 4: at Aragonese (Royal), 14:00 - 17:30, June 23
  • Quantum Computing and Post-Quantum Cryptography: Preparing for the Next Era of Cybersecurity by Hazel Murray, George O’Mahony, Anila Mjeda (Munster Technological University, Ireland)
Tutorial 5: at Angioina (Royal), 14:00 - 17:30, June 23
  • Decentralized Federated Learning: Enhancing Reliability with Blockchain by Antonella Del Pozzo, Maxence Perion (Université Paris-Saclay, CEA, List, France)
Tutorial 6: at Capuana (Royal), 14:00 - 17:30, June 23
  • Benchmarking of AI Agents for IT Automation Tasks using ITBench by Rohan Arora, Saurabh Jha (IBM Research, Yorktown Heights, USA)

 

Local Time
(UTC+2)
Aula Magna
(Centro Congressi)
Aula A
(Centro Congressi)
Aula B
(Centro Congressi)
Aragonese
(Royal)
Catalana
(Royal)
8:00 - 8:30 Registration
08:45 - 9:45 Opening and Test of Time Award — Mirabilis (Royal)
9:45 - 10:30 Keynote 1 — Mirabilis (Royal)
10:30 - 11:00 Coffee Break
11:00 - 12:30 RS1 (Best Paper) — Mirabilis (Royal)
12:30 - 14:00 Lunch
14:00 - 15:30 RS2 Poster pitch RS3 Industry 1 RS4
15:30 - 16:00 Coffee Break
16:00 - 17:30 RS5 Disrupt 1 RS6 Industry 2 RS7
17:30 - 18:30 Poster Spritz Reception (Posters Exhibition Room)
18:30 - 21:30

Legend:

RS: Research

Opening, at Mirabilis (Royal), 8:45 - 9:15, June 24

Speakers: Marcello Cinque and Domenico Cotroneo, Università degli Studi di Napoli Federico II

Speakers: Patrick Lee, The Chinese University of Hong Kong and Saman Zonouz, Georgia Institute of Technology

Test of Time (TOT) Award, at Mirabilis (Royal), 09:15 - 09:45, June 24

Session Chair: Domenico Cotroneo, Università degli Studi di Napoli Federico II

  • FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks by Haopei Wang, Lei Xu, Guofei Gu
  • AVATAR: A Variable-Retention-Time (VRT) Aware Refresh for DRAM Systems by Moinuddin K. Qureshi, Dae-Hyun Kim, Samira Khan, Prashant J. Nair, Onur Mutlu
Keynote 1, at Mirabilis (Royal), 9:45 - 10:30, June 24

Session Chair: Domenico Cotroneo (Università degli Studi di Napoli Federico II)

  • The AI Paradox: Between Global Power, Technology Sourcing, Errors and (De)regulation Shifts by Roberto Baldoni (Senior Advisor for Technology and Cybersecurity Policy, Embassy of Italy in Washington DC)
RS1: Best Paper Award, at Mirabilis (Royal), 11:00 - 12:30, June 24

Session Chair: Saman Zonouz, Georgia Institute of Technology, USA

  • Privacy Analysis of Oblivious DNS over HTTPS: a Website Fingerprinting Study by Mohammad Amir Salari (Saint Louis University), Abhinav Kumar (University of Massachusetts Amherst), Federico Rinaudi (Politecnico Di Torino), Reza Tourani (Saint Louis University), Alessio Sacco (Politecnico Di Torino), Flavio Esposito (Saint Louis University)
  • GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses by Pierrick Philippe (University of Rennes, CNRS, IRISA), Mohamed Sabt (University of Rennes, CNRS, IRISA), Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)
  • Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement by Hanwen Feng (The University of Sydney); Zhenliang Lu (Nanyang Technological University); Tiancheng Mai, Qiang Tang (The University of Sydney)
RS2: Blockchains, at Aula Magna (Centro Congressi), 14:00 - 15:30, June 24

Session Chair: Silvia Bonomi (Università degli Studi di Roma "La Sapienza", Italy)

  • ammBoost: State Growth Control for AMMs by Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh (University of Connecticut)
  • Mitigating Front-Running Attacks through Fair and Resilient Transaction Dissemination by Wassim Yahyaoui (SnT, University of Luxembourg); Joachim Bruneau-Queyreix (Université de Bordeaux); Jérémie Decouchant (TU Delft); Marcus Völp (SnT, University of Luxembourg)
  • Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains by Yuqi Liu, Rui Xi, Karthik Pattabiraman (University of British Columbia)
RS3: AI Security, at Aula B (Centro Congressi), 14:00 - 15:30, June 24

Session Chair: Roberto Natella (Università degli Studi di Napoli Federico II, Italy)

  • Towards Automated and Explainable Threat Hunting with Generative AI by Moumita Das Purba, Bei-Tseng Chu, Will French (University of North Carolina at Charlotte)
  • Prompting the Unseen: Detecting Hidden Backdoors in Black-Box Models by Zixuan Huang, Jia-Wei Chen, Zhipeng Zhang, Chia-Mu Yu (National Yang Ming Chiao Tung University)
  • Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation by Hao Tian (South China University of Technology); Hao-Tian Wu (Guangzhou University); Yiu-ming Cheung (Hong Kong Baptist University); Junhui He (South China University of Technology); Zhihong Tian (Guangzhou University)
RS4: Voice and UAV Security, at Catalana (Royal), 14:00 - 15:30, June 24

Session Chair: Saurabh Bagchi (Purdue University, USA)

  • LiveGuard: Voice Liveness Detection via Wavelet Scattering Transform and Mel Spectrogram Scaling by Liqun Shan, Xingli Zhang, Md Imran Hossen, Xiali Hei (University of Louisiana at Lafayette)
  • SOUNDBOOST: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel by Haoran Wang, Zheng Yang (Georgia Institute of Technology); Sangdon Park (Pohang University of Science and Technology); Yibin Yang (Georgia Institute of Technology); Seulbae Kim (Pohang University of Science and Technology); Willian Lunardi, Martin Andreoni (Technology Innovation Institute); Taesoo Kim, Wenke Lee (Georgia Institute of Technology)
  • "I will always be by your side": A Side-channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles by Muneeba Asif, Jean C Tonday Rodriguez, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Kemal Akkaya (Florida International University)
RS5: Blockchains and Federated Learning, at Aula Magna (Centro Congressi), 16:00 - 17:30, June 24

Session Chair: Sara Bouchenak (Institut National des Sciences Appliquées (INSA) Lyon, France)

  • PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes by Pasquale De Rosa, Simon Queyrut (University of Neuchâtel, Switzerland); Yérom-David Bromberg (University of Rennes, INRIA, France); Pascal Felber, Valerio Schiavoni (University of Neuchâtel, Switzerland)
  • GTV: Generating Tabular Data via Vertical Federated Learning by Zilong Zhao (National University of Singapore); Han Wu (University of Southampton); Aad Van Moorsel (University of Birmingham); Lydia Chen (TU Delft)
  • VerifyVFL: Practical Verifiable Vertical Federated Learning by Junchen Hou, Lan Zhang (University of Science and Technology of China)
RS6: Architecture Evaluation, at Aula B (Centro Congressi), 16:00 - 17:30, June 24

Session Chair: Hiroshi Yamada (Tokyo University of Agriculture and Technology (TUAT), Japan)

  • EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM Techniques by Oğuzhan Canpolat (TOBB ETÜ and ETH Zurich); Ataberk Olgun (ETH Zurich); David Novo (LIRMM, Univ Montpellier, CNRS); Oguz Ergin (University of Sharjah and TOBB ETÜ); Onur Mutlu (ETH Zurich)
  • Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture by Suman Kumar, Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy (Drexel University)
  • ConfBench: A Tool for Easy Evaluation of Confidential Virtual Machines by Andrea De Murtas (Sapienza University of Rome, Italy and University of Neuchâtel, Switzerland); Daniele Cono D'Elia, Giuseppe Antonio Di Luna (Sapienza University of Rome, Italy); Pascal Felber (University of Neuchatel, Switzerland); Leonardo Querzoni (Sapienza University of Rome, Italy); Valerio Schiavoni (University of Neuchâtel, Switzerland)
RS7: IoT and Smart Homes, at Catalana (Royal), 16:00 - 17:30, June 24

Session Chair: Kenji Kono (Keio University, Japan)

  • On Security Vulnerabilities in Transportation IoT Devices by Jason Yih (College of Computer, Mathematical, and Natural Sciences; University of Maryland, College Park, MD); Katerina Goseva-Popstojanova (Lane Department of Computer Science and Electrical Engineering; West Virginia University, Morgantown, WV); Michel Cukier (Department of Mechanical Engineering, University of Maryland, College Park, MD)
  • Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV Ecosystem by Christian Böttger (Institute for Internet Security, Westphalian University of Applied Sciences); Henry Hosseini (University of Münster; Institute for Internet Security, Westphalian University of Applied Sciences); Christine Utz (Radboud University); Nurullah Demir (Institute for Internet Security, Westphalian University of Applied Sciences); Jan Hörnemann (AWARE7 GmbH); Christian Wressnegger (Karlsruhe Institute of Technology); Thomas Hupperich (University of Münster); Norbert Pohlmann (Institute for Internet Security, Westphalian University of Applied Sciences); Matteo Große-Kampmann (Rhine-Waal University of Applied Sciences); Tobias Urban (Institute for Internet Security, Westphalian University of Applied Sciences)
Industry 1: Security in Cyber-Physical and Industrial Systems, at Aragonese (Royal), 14:00 - 15:30, June 24

Session Chair: George Violettas, SYSGO GmbH, Germany

  • Quantitative Security Metrics: Assessment of Cyberattack Scenarios for Cyber-Physical Systems by Mike Da Silva (De Vinci Higher Education, De Vinci Research Center, Paris, France), Nga Nguyen (De Vinci Higher Education, De Vinci Research Center, Paris, France)
  • Regulating Prosumer Device Security: a Key Priority in Power Grid Protection by Luigi Coppolino (University of Naples Parthenope), Roberto Nardone (University of Naples Parthenope), Alfredo Petruolo (University of Naples Parthenope), Luigi Romano (University of Naples Parthenope)
  • Runtime Verification of Program Organization Units in Safe Programmable Logic Controller Systems by Hisham Unniyankal (University of Genova), Davide Ancona (University of Genova), Angelo Ferrando (University of Modena and Reggio Emilia), Fabio Parodi (Technoleader Srl), Alessandro Alessi (Technoleader Srl), Federico Bottino (COBO SpA)
  • Assessing the Transferability of Adversarial Patches in Real-World Systems: Implications for Adversarial Testing of Image Recognition Security by Stephan Kleber (Mercedes-Benz Tech Innovation GmbH), Tim Palm (Ulm University), Jeremias Eppler (Mercedes-Benz Tech Innovation GmbH), Dennis Eisermann (Ulm University), Frank Kargl (Ulm University)
Industry 2: Hardware Endurance and Interference, at Aragonese (Royal), 16:00 - 17:30, June 24

Session Chair: Jan Micha Borrmann, ExpectedIT GmbH, Germany

  • Observe and Regulate Memory Interference on MPSoC: a Practical Approach by Andrea Bastoni (TUM), Alexander Zuepke (TUM), Marco Solieri (Minerva Systems)
  • Hardware Telemetry at Scale: A Case Study on SSDs Endurance Monitoring in Datacenters by Olusiji Medaiyese (Meta Platforms Inc.), Fred Lin (Meta Platforms Inc.), Harish Dixit (Meta Platforms Inc.), Richa Mishra (Meta Platforms Inc.), Andrea Baglioni (Meta Platforms Inc.), Leandro Silva (Meta Platforms Inc.), Mike Elkin (Meta Platforms Inc.), Andrei Ilyashenko (Meta Platforms Inc.), Gor Safaryan (Meta Platforms Inc.), Dhankaran Singh Ajravat (Meta Platforms Inc.), Xun Jiao (Meta Platforms Inc.), Vineet Parekh (Meta Platforms Inc.)
  • On the Feasibility of Exploiting the USB Power Line for Side-Channel Attacks against Samsung Smartphone Models by Leonardo da Costa (Samsung Research and Development Institute Brazil), Witor Oliveira (Samsung Research and Development Institute Brazil), Caio Peres (Samsung Research and Development Institute Brazil), Rene de Mello (Samsung Research and Development Institute Brazil), Jonghun Song (Samsung Electronics), Seokwon Jeong (Samsung Electronics), Hyungchul Jung (Samsung Electronics)
  • Towards Robust Autonomous Landing Systems: Iterative Solutions and Key Lessons Learned by Sebastian Schroder (Macquarie University), Yao Deng (Macquarie University), Alice James (Macquarie University), Avishkar Seth (Macquarie University), Kye Morton (Skyy Network), Subhas Mukhopadhyay (Macquarie University), Richard Han (Macquarie University), Xi Zheng (Macquarie University)
Posters, at Aula A (Centro Congressi), 14:00 - 15:30, June 24

Session Chair: Nuno Laranjeiro, University of Coimbra, Portugal

  • DeepICS: Deep Causal Relationship Modeling for Multi-Source Log-Based Anomaly Detection in Industrial Control Systems by Seong-Su Yoon, Ieck-Chae Euom and Dong-hyuk Shin (System Security Research Center, Chonnam National University)
  • Real-Time GOOSE Attack Detection in IEC 61850 Substations Using SDN-Based Traffic Inspection by Seunghyun Yoon (Korea Institute of Energy Technology (KENTECH)), Ryangsoo Kim (Electronics and Telecommunications Research Institute (ETRI)), Hark Yoo (Electronics and Telecommunications Research Institute (ETRI)), Hyuk Lim (Korea Institute of Energy Technology (KENTECH))
  • Intrusion Detection System with Domain-incremental Continual Learning by Hyejin Kim (Korea Institute of Energy Technology (KENTECH)), Seunghyun Yoon (Korea Institute of Energy Technology (KENTECH)), Dan Dongseong Kim (The University of Queensland), Jin-Hee Cho (Virginia Tech), Terrence J. Moore (DEVCOM Army Research Lab), Frederica F. Nelson (DEVCOM Army Research Lab), Hyuk Lim (Korea Institute of Energy Technology (KENTECH))
  • Looking for Anomalies in Cross-Chain Bridges by André Augusto (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa), Rafael Belchior (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa), Jonas Pfannschmidt (Blockdaemon), André Vasconcelos (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa), Miguel Correia (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa)
  • Adaptive Identity Management: Unified Personalization and Privacy Protection for Web Apps by Min-Chieh Wu, Yu-Sung Wu (National Yang Ming Chiao Tung University)
  • Security Vulnerability Risk Growth Model based on CVSS 4.0 by Sora Okada, Masaya Shimakawa, Takashi Minohara (Dept. of Comp. Sci. Takushoku University)
  • Study of Appropriate Information Combination in Image-based Obfuscated Malware Detection by Tetsuro Takahashi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka University)
  • Detecting Scrapers on E-commerce Websites Using a Reduced Feature Set by Umberto Fontana (Amadeus IT Group and Telecom SudParis France), Elisa Chiapponi (Amadeus IT Group, France), Claudio Costanza (Amadeus IT Group, France), Vincent Rigal (Amadeus IT Group, France), Olivier Thonnard (Amadeus IT Group, France), Martynas Buozis (Amadeus IT Group, France), Herve Debar (Telecom SudParis)
  • Jailbreaking Generative AI: Empowering Novices to Conduct Phishing Attacks by Rina Mishra, Gaurav Varshney, Shreya Singh (IIT Jammu)
  • PhishingHook by Pasquale De Rosa (University of Neuchâtel), Simon Queyrut (University of Neuchâtel), Yérom-David Bromberg (Univ Rennes, Inria, CNRS, IRISA), Pascal Felber (University of Neuchâtel), Valerio Schiavoni (University of Neuchâtel)
  • Learnable Encryption with a Diffusion Property by Ijaz Ahmad (Department of Electrical and Computer Engineering, Korea University), Joongheon Kim (Department of Electrical and Computer Engineering, Korea University), Seokjoo Shin (Chosun University)
  • TOSense: We Read, You Click by Xinzhang Chen, Hassan Ali, Arash Shaghaghi, Salil S. Kanhere, Sanjay Jha (UNSW Sydney)
  • Agree to Disagree: Revisiting the Comparison of (Multi-) Paxos and Raft by Lewis Tseng (UMass Lowell)
  • Designing Scalable, Secure Systems for Atomic-Scale Physical AI: Enabling Open Science and Collaborative Data Management and Analytics by Lewis Tseng (UMass Lowell), Yu-Tsun Shao (USC)
Disrupt 1: Trust and Assurance in LLM and ML-Enabled Systems, at Aula A (Centro Congressi), 16:00 - 17:30, June 24

Session Chair: Marco Vieira, University of North Carolina at Charlotte, USA

  • Assessing the Validity of LLM-Driven Hazard Analysis: An Assessor’s Perspective by Michael Kevvay (MIREA - Russian Technical University), Vladislav Gryaznykh (MIREA - Russian Technical University), Oleg Kirovski (SafetyConsult LLC), Anton Korolev (Russian Technical University)
  • Trusted Federated Learning: Towards a Partial Zero-Knowledge Proof Approach by Yannis Formery (COSYS-ERENA, Université Gustave Eiffel), Leo Mendiboure (COSYS-ERENA, Université Gustave Eiffel), Jonathan Villain (COSYS-Leost, Université Gustave Eiffel), Virginie Deniau (COSYS-Leost, Université Gustave Eiffel), Christophe Gransart (COSYS-Leost, Université Gustave Eiffel), Stephane Delbruel (Université de Bordeaux)
  • Rethinking BFT: Leveraging Diverse Software Components with LLMs by João Imperadeiro (INESC TEC), Ana Nunes Alonso (INESC TEC & University of Minho), José Orlando Pereira (U. Minho & INESCTEC)
Poster Spritz Reception at Poster Exhibition Room (Centro Congressi), 17:30 - 18:30, June 24

Come to visit DSN posters while tasting the famous Italian aperitif (Spritz)!

 

Local Time
(UTC+2)
Aula Magna
(Centro Congressi)
Aula A
(Centro Congressi)
Aula B
(Centro Congressi)
Aragonese
(Royal)
Catalana
(Royal)
8:30 - 9:00 Registration
9:00 - 9:45 Award (Jean-Claude Laprie) — Aula Magna (Centro Congressi) WDMD 1
9:45 - 10:30 Keynote 2 — Aula Magna (Centro Congressi)
10:30 - 11:00 Coffee Break
11:00 - 12:30 RS8 Disrupt 2 RS9 WDMD 2
12:30 - 14:00 Lunch
14:00 - 15:30 RS10 RS11 Doctoral 1 Industry 3 WDMD 3
15:30 - 16:00 Coffee Break (Mentor - Mentee meet up at Posters)
16:00 - 17:30 RS12 RS13 Doctoral 2 Industry 4 WDMD 4
17:30 - 23:00

Legend:

RS: Research

Jean-Claude Laprie (JCL) Award, at Aula Magna (Centro Congressi), 09:00 - 09:45, June 25

Session Chair: Marco Vieira, University of North Carolina at Charlotte, USA

  • Flikker: saving DRAM refresh power through critical data partitioning by Song Liu, Karthik Pattabiraman, Thomas Moscibroda, and Benjamin G. Zorn. ASPLOS XVI, 2011. https://doi.org/10.1145/1950365.1950391
  • Lightweight Probabilistic Broadcast by Patrick Th. Eugster, Rachid Guerraoui, S. B. Handurukande, Petr Kouznetsov, and Anne-Marie Kermarrec. DSN 2001. https://doi.org/10.1109/DSN.2001.941428
Keynote 2, at Aula Magna (Centro Congressi), 09:45 - 10:30, June 25

Session Chair: Marcello Cinque

  • Provable Guarantees for Data-driven Policy Synthesis: a Formal Verification Perspective by Marta Kwiatkowska (University of Oxford)
RS8: Network Intrusion Detection, at Aula Magna (Centro Congressi), 11:00 - 12:30, June 25

Session Chair: Miguel Correia (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa, Portugal)

  • LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection by Ke He (University of Canterbury), Dan Dongseong Kim (The University of Queensland), Muhammad Rizwan Asghar (University of Surrey)
  • IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics by Hong-Wei Li (Research Center for Information Technology Innovation, Academia Sinica), Ping-Ting Liu, Bo-Wei Lin (National Yang Ming Chiao Tung University), Yennun Huang (Research Center for Information Technology Innovation, Academia Sinica)
  • MalTAG: Encrypted Malware Traffic Detection Framework via Graph Based Flow Interaction Mining by Renjie Li, Zhou Zhou, Hao Miao, Fengyuan Shi (University of Chinese Academy of Sciences China, Institute of Information Engineering), Qingyun Liu (Institute of Information Engineering, Chinese Academy of Sciences)
RS9: Cyber-Physical Systems, at Aula B (Centro Congressi), 11:00 - 12:30, June 25

Session Chair: Pascal Felber (University of Neuchatel, Switzerland)

  • ICSTRACKER: Backtracking Intrusions in Modern Industrial Control Systems by Md Raihan Ahmed, Jainta Paul, Levi Taiji Li, Luis Garcia, Mu Zhang (University of Utah)
  • MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers by Mert D. Pesé, Bulut Gozubuyuk (Clemson University), Eric Andrechek (University of Michigan), Habeeb Olufowobi (University of Texas at Arlington), Mohammad Hamad (Technical University of Munich), Kang G. Shin (University of Michigan)
  • ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation by Nkuba Kayembe Carlos, Jimin Kang, Seunghoon Woo, Heejo Lee (Korea University)
RS10: Network Measurement, at Aula Magna (Centro Congressi), 14:00 - 15:30, June 25

Session Chair: Haining Wang (Virginia Tech, USA)

  • PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script Generation by Yuanda Wang, Xinhui Han (Peking University)
  • Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers by Qihang Peng, Mingming Zhang, Deliang Chang, Jia Zhang, Baojun Liu, Haixin Duan (Tsinghua University; Zhongguancun Laboratory; QI-ANXIN Technology Research Institute)
  • Towards Continuous Integrity Attestation and Its Challenges in Practice: A Case Study of Keylime by Margie Ruffin, Chenkai Wang (University of Illinois Urbana-Champaign), Gheorghe Almasi, Abdulhamid Adebayo, Hubertus Franke (IBM Research), Gang Wang (University of Illinois Urbana-Champaign)
RS11: Autonomous Systems, at Aula A (Centro Congressi), 14:00 - 15:30, June 25

Session Chair: Xugui Zhou (Louisiana State University, USA)

  • RAVAGE: Robotic Autonomous Vehicles’ Attack Generation Engine by Pritam Dash, Karthik Pattabiraman (University of British Columbia)
  • Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System by Cheng Chen (Louisiana State University), Grant Xiao (University of Virginia), Daehyun Lee, Lishan Yang (George Mason University), Evgenia Smirni (William & Mary), Homa Alemzadeh (University of Virginia), Xugui Zhou (Louisiana State University)
  • Multi-version Machine Learning and Rejuvenation for Resilient Perception in Safety-critical Systems by Qiang Wen (University of Tsukuba), Júlio Mendonça (University of Luxembourg), Fumio Machida (University of Tsukuba), Marcus Völp (University of Luxembourg)
RS12: Network Traffic Security, at Aula Magna (Centro Congressi), 16:00 - 17:30, June 25

Session Chair: Patrick Lee (The Chinese University of Hong Kong, Hong Kong)

  • Secure access to network data for mobile network traffic analysis applications by Djob Mvondo, Yérom-David Bromberg (Univ Rennes, CNRS, INRIA, IRISA)
  • Securing In-Network Traffic Control Systems with P4Auth by Ranjitha K, Medha Rachel Panna, Stavan Nilesh Christian, Karuturi Havya Sree, Sri Hari Malla, Dheekshitha Bheemanath (Indian Institute of Technology Hyderabad), Rinku Shah (Indraprastha Institute of Information Technology Delhi), Praveen Tammana (Indian Institute of Technology Hyderabad)
  • QUIC-Aware Load Balancing: Attacks and Mitigations by Liliana Kistenmacher, Anum Talpur, Mathias Fischer (Universität Hamburg)
RS13: Hardware Security, at Aula A (Centro Congressi), 16:00 - 17:30, June 25

Session Chair: Dan Kim (The University of Queensland, Australia)

  • GREAT: Global Representation and Edge-Attention for Hardware Trojan Detection by Zhengyi Li (Xiangtan University), Wei Cheng (National University of Defense Technology), Huanrong Tang (Xiangtan University), Yaohua Wang (National University of Defense Technology)
  • MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution by Moein Ghaniyoun (The Ohio State University), Kristin Barber (Google), Yinqian Zhang (Southern University of Science and Technology), Radu Teodorescu (The Ohio State University)
  • Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory by Nisa Bostanci, Konstantinos Kanellopoulos, Ataberk Olgun, Giray Yaglikci, Ismail Emir Yuksel, Nika Mansouri Ghiasi (ETH Zurich); Zülal Bingöl (Bilkent University); Mohammad Sadrosadati, Onur Mutlu (ETH Zurich)
Disrupt 2: Security and Resilience in Emerging Computing Paradigms, at Aula A (Centro Congressi), 11:00 - 12:30, June 25

Session Chair: Andrea Bondavalli (Università degli Studi di Firenze, Italy)

  • Enhancing Accuracy in Approximate Byzantine Agreement with Bayesian Inference by Roy Shadmon, Owen Arden (UC Santa Cruz)
  • UniPHY: Unified Physical Layer Security for LPWANs by Stephane Delbruel (LaBRI - Univ. of Bordeaux, France), Léo Mendiboure, Yannis Formery (Univ. Gustave Eiffel), Joachim Bruneau-Queyreix, Laurent Réveillère (LaBRI - Univ. of Bordeaux)
  • Digital Cluster Circuits for Reliable Datacenters by Davide Rovelli, Patrick Eugster (Università della Svizzera Italiana (USI))
  • Replicating Human Immune System via Harmonic Radar: A Framework and Preliminary Results in Thwarting Cyber-physical Attacks by Nathanaël Denis, Roberto Di Pietro (King Abdullah University of Science and Technology)
Doctoral 1: Autonomous drones and vehicles, at Aula B (Centro Congressi), 14:00 - 15:30, June 25

Session Chair: Sonia Ben Mokhtar, Centre national de la recherche scientifique (CNRS), France

  • AI Agent-based Adaptive Task Offloading for Autonomous Drones in Dynamic Environments by Qingyang Zhang, Fumio Machida (University of Tsukuba)
  • Effect of Human-Selected Hard Examples to Improve Accuracy of Semantic Segmentation by Yuriko Ueda, Marin Wada, Miho Adachi, Ryusuke Miyamoto (Meiji University)
  • Leaving No Blind Spots: Toward Automotive Cybersecurity by Francesco Marchiori, Mauro Conti (University of Padova)
  • Keynote: From Draft to DSN: How to Get Your Paper In by Valerio Schiavoni (Université de Neuchâtel, Switzerland)
Doctoral 2: Cybersecurity and Fault-tolerance, at Aula B (Centro Congressi), 16:00 - 17:30, June 25

Session Chair: Sonia Ben Mokhtar, Centre national de la recherche scientifique (CNRS), France

  • On Predictive Modeling of Multi-Bit Upsets for Emulated Fault Injection by Trishna Rajkumar, Johnny Öberg (KTH Royal Institute of Technology)
  • Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure by Paul Robert Balthazar Houssel, Sylvie Laniepce (Orange Innovation), Olivier Levillain (Institut Polytechnique de Paris)
  • Strategies to Describe and Timely Detect Attacks by Tommaso Puccetti (Department of Mathematics and Informatics, University of Florence)
  • Enhanced Cybersecurity Monitoring in Multi-Plant Flexible Manufacturing Environments by Antonio Iannaccone, Roberto Nardone (University of Naples "Parthenope")
  • SCAMDETECT: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts by Pasquale De Rosa, Pascal Felber, Valerio Schiavoni (University of Neuchâtel)
Industry 3: Reliability and Safety in Complex Systems, at Aragonese (Royal), 14:00 - 15:30, June 25

Session Chair: Luca Porzio, Micron Technology, Italy

  • Keynote: Increasing memory density, complexity and reliability: sustainable trend at reasonable cost? by Mauro Luigi Sali, Senior Director Micron Technology, Italy
  • Beyond Component Failures: Safety Challenges in Complex Maritime Control Systems by Odd Ivar Haugen, Aleks Karlsen, Steven Mearns Cargill, Jan van Tiggelen (DNV)
  • Integrating Testing with Runtime Verification for Mission-Critical Distributed Control Systems by Davide Ancona, Stefano Avola, Angelo Ferrando, Pierpaolo Baglietto, Maurice ter Beek, Giancarlo Camera, Andrea Parodi, Matteo Pinasco (Various Institutions in Italy and CNR)
  • Large-Scale AI Infra Reliability: Challenges, Strategies, and Llama 3 Training Experience by Xun Jiao, Abhinav Pandey, Karthik Pattabiraman, Fred Lin (Meta Platforms Inc and University of British Columbia)
Industry 4: Anomaly and Fault Detection, at Aragonese (Royal), 16:00 - 17:30, June 25

Session Chair: George Violettas, SYSGO GmbH, Germany

  • Anomaly Detection in Energy Performance Certificates: From Oblivious to Enlightened by Nawel Benarba (INSA Lyon), Mathieu Chevalier (INSA Lyon), Sara Bouchenak (INSA Lyon), Olivier Jung (Kardino), Benjamin Bertin (INSA Lyon)
  • When Features Gets Exploited: Functional Abuse and the Future of Industrial Fraud Prevention by Elisa Chiapponi, Umberto Fontana, Elyssa Boulilla, Claudio Costanza, Vincent Rigal, Olivier Thonnard (Amadeus IT Group and Télécom SudParis)
  • Energy-Efficient Anomaly Detection in Autonomous Vehicles Using RSNNs by Daeho Kim, Eun-Kyu Lee (Incheon National University), Ji-Woo Lee (Korea Automotive Technology Institute)
  • Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice by Larry Huynh, Jake Hesford, Daniel Cheng, Alan Wan (University of Western Australia), Seungho Kim, Hyoungshick Kim (Sungkyunkwan University), Jin Hong (University of Western Australia)
  • Cordial: Cross-row Failure Prediction Method Based on Bank-level Error Locality for HBMs by Wenwei Gu, Jiazhen Gu, Renyi Zhong, Wenyu Zhang, Ming Li (Huawei Hong Kong Research Center), Michael R. Lyu (The Chinese University of Hong Kong)
WDMD 1: Keynote Session 1, at Catalana (Royal), 09:00 - 10:30, June 25

Session Chair: Chengqiang Huang (Huawei Technologies Co., Ltd.)

  • AI for Intelligent Maintenance by Enrico Zio (Politecnico di Milano, Italy)
  • When Spatio-Temporal Data Meet Large Language Models by Yuxuan Liang (Hong Kong University of Science and Technology, Guangzhou)
  • Advancing Decentralized AI: Scalable, Adaptive, and Client-Centric Learning Systems by Ahmed M. A. Sayed (Queen Mary University of London, UK)
WDMD 2: Keynote Session 2, at Catalana (Royal), 11:00 - 12:30, June 25

Session Chair: Chengqiang Huang (Huawei Technologies Co., Ltd.)

  • Reliability challenges and opportunities for AI infra: from industry perspective by Zheng Yang (Huawei Technologies Co., Ltd.)
  • Characterizing Modern GPU Resilience and Impact in HPC Systems: A Case Study of A100 GPUs by Shengkun Cui (University of Illinois Urbana-Champaign, United States), Archit Patke (University of Illinois Urbana-Champaign, United States), Ziheng Chen (University of Illinois Urbana-Champaign, United States), Aditya Ranjan (University of Illinois Urbana-Champaign, United States), Hung Nguyen (University of Illinois Urbana-Champaign, United States), Phuong Cao (University of Illinois Urbana-Champaign, United States), Brett Bode (University of Illinois Urbana-Champaign, United States), Gregory Bauer (University of Illinois Urbana-Champaign, United States), Saurabh Jha (IBM Research, United States), Chandra Narayanaswam (IBM Research, United States), Daby Sow (IBM Research, United States), Catello Di Martino (Nokia Bell Labs, Brazil), Zbigniew T. Kalbarczyk (University of Illinois Urbana-Champaign, United States), Ravishankar K. Iyer (University of Illinois Urbana-Champaign, United States)
  • Panel: How LLM Change the Nature of Reliability Engineering
WDMD 3: Long Presentation Session, at Catalana (Royal), 14:00 - 15:30, June 25

Session Chair: Yuchu Fang (Huawei Technologies Co., Ltd.)

  • Recent Advances in Agentic AI by Yunpu Ma (Ludwig Maximilian University of Munich, Germany)
  • Reinforcement learning for multi-agent with asynchronous missing information fusion method by Jiashan Gao (Beihang University, China)
  • Cultural Reliability of LLMs: Can AI Truly Reflect Global Perspectives? by Yong Cao (University of Tübingen, Germany)
  • Generating Structured Outputs with Language Models: Evaluation and Studies by Saibo Geng (École Polytechnique Fédérale de Lausanne, Switzerland)
  • Understanding and Modeling Human Label Variation in LLM by Beiduo Chen (Ludwig Maximilian University of Munich, Germany)
  • Q&A Slot
  • Posters during coffee-break
WDMD 4: Short Presentation Session, at Catalana (Royal), 16:00 - 17:30, June 25

Session Chair: Zhaojun Hao (Huawei Technologies Co., Ltd.)

  • Optimal energy-efficient scheduling of flexible manufacturing systems based on Petri net simulation and mathematical programming by Mei Chen (Politecnico di Milano, Italy)
  • A knowledge-inspired physics-informed neural network for hydraulic transient simulation of liquid pipelines by Jian Du (China University of Petroleum, China)
  • A human reliability analysis method based on STPA-IDAC and BN-SLIM for driver take-over in Level 3 automated driving by Wenyi Liao (Northwestern Polytechnical University, China)
  • Interpretable wavelet packet kernel-constrained convolutional neural network for bearing fault diagnosis by Sinan Li (Xi'an Jiaotong University, China)
  • Towards uncertainty-aware remaining useful life prediction by Weijun Xu (Politecnico di Milano, Italy)
  • Multimodal explainable few-shot learning for trustworthy PHM operations in the smart manufacturing process by Wujin Deng (Politecnico di Milano, Italy)
  • Research on PHM method based on deep learning technology by Zhiqiang Xu (Politecnico di Milano, Italy)
  • Predictive Maintenance Decision Making for Critical Equipment in Industrial system Based on Remaining Useful Life Estimation by Zongyao Wang (Beijing Jiaotong University, China)
  • Q&A Slot
  • Discussion of Challenging Questions

 

Local Time
(UTC+2)
Aula Magna
(Centro Congressi)
Aula A
(Centro Congressi)
Aula B
(Centro Congressi)
Aragonese
(Royal)
Catalana
(Royal)
8:30 - 9:00 Registration
9:00 - 9:45 Awards (Rising Star + William Carter) — Aula Magna (Centro Congressi) FORCE 1
9:45 - 10:30 Keynote 3 — Aula Magna (Centro Congressi)
10:30 - 11:00 Coffee Break
11:00 - 12:30 R14 RS15 RS16 Industry 5 FORCE 2
12:30 - 14:00 Lunch
14:00 - 15:30 RS17 RS18 RS19 Industry 6 S2AIM 1
15:30 - 16:00 Coffee Break
16:00 - 17:00 Business Meeting S2AIM 2
17:00 - 17:30

Legend

RS: Research

Award: Rising Star and William Carter, at Aula Magna (Centro Congressi), 09:00 - 09:45, June 26

Session Chair: Domenico Cotroneo, Università degli Studi di Napoli Federico II

  • Rising Star: Baris Kasikci (University of Washington, USA)
  • William Carter: “Enabling Efficient and Scalable DRAM Read Disturbance Mitigation via New Experimental Insights into Modern DRAM Chips” by Abdullah Giray Yağlıkçı (ETH Zurich, Switzerland)
Keynote 3, at Aula Magna (Centro Congressi), 09:45 - 10:30, June 26

Session Chair: Marcello Cinque

  • Unifying Communication, Computation, and Storage from the Cloud to the Microcontroller by Angelo Corsaro, Ph.D., CEO, CTO, and Co-Founder of ZettaScale Technology
RS14: Software Vulnerabilities, at Aula Magna (Centro Congressi), 11:00 - 12:30, June 26

Session Chair: Regina Moraes (Universidade Estadual de Campinas (UNICAMP), Brazil)

  • What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software by Jialiang Dong, Xinzhang Chen (The University of New South Wales); Willy Susilo (University of Wollongong); Nan Sun (The University of New South Wales); Arash Shaghaghi (The University of New South Wales (UNSW Sydney)); Siqi Ma (The University of New South Wales)
  • An Analysis of Malicious Packages in Open-Source Software in the Wild by Xiaoyan Zhou (Beijing JiaoTong University); Ying Zhang, Wenjia Niu, Jiqiang Liu (Beijing Jiaotong University); Haining Wang (Virginia Tech); Qiang Li (Beijing Jiaotong University)
  • Automatically Generating Rules of Malicious Software Packages via Large Language Model by XiangRui Zhang, XueJie Du, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li (Beijing Jiaotong University)
RS15: Web and Application Security, at Aula A (Centro Congressi), 11:00 - 12:30, June 26

Session Chair: Angelos Stavrou (Virginia Tech, USA)

  • Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit by Lorenzo Cazzaro, Stefano Calzavara, Maksim Kovalkov (Università Ca' Foscari Venezia); Aleksei Stafeev, Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
  • A Closer Look At Modern Evasive Phishing Emails by Elyssa Boulila (Amadeus), Marc Dacier (KAUST), Siva Prem Vengadessa Peroumal, Nicolas Veys (Amadeus); Simone Aonzo (EURECOM)
  • SemiAF: Semi-Supervised App Fingerprinting on Unknown Traffic via Graph Neural Network by Xiaodong Lei, Yongjun Wang, Lin Liu, Junjie Huang, Jiangyong Shi, Luming Yang (National University of Defense and Technology)
RS16: Fault Tolerance, at Aula B (Centro Congressi), 11:00 - 12:30, June 26

Session Chair: Fumio Machida (University of Tsukuba, Japan)

  • ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data by Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan (The University of British Columbia)
  • ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers by Minli Julie Liao (University of Cambridge); Sam Ainsworth (University of Edinburgh); Lev Mukhanov (Queen Mary University London); Adrian Barredo (Barcelona Supercomputing Center); Markos Kynigos (The University of Manchester); Timothy Jones (University of Cambridge)
  • ReCraft: Self-Contained Split, Merge, and Membership Change of Raft Protocol by Kezhi Xiong (Northeastern University); Soonwon Moon (Inha University); Joshua Kang, Bryant Curto (Northeastern University); Jieung Kim (Yonsei University); Ji-Yong Shin (Northeastern University)
RS17: Binary Analysis, at Aula Magna (Centro Congressi), 14:00 - 15:30, June 26

Session Chair: Jin Hong (The University of Western Australia, Australia)

  • BASSET: Enhancing Binary Code Clone Searching through Multi-Level Hybrid Semantic Indexing by Yong Zhao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Ang Xia (State Grid Corporation of China Information and Communication Branch); Jie Yin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhi Wang (Zhongguancun Laboratory, Beijing, China); Yaqin Cao, Xiangyi Zeng, Yuling Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
  • A Human Study of Automatically Generated Decompiler Annotations by Yuwei Yang, Skyler Grandel (Vanderbilt University); Jeremy Lacomis, Edward Schwartz, Bogdan Vasilescu, Claire Le Goues (Carnegie Mellon University); Kevin Leach (Vanderbilt University)
  • Detecting Code Vulnerabilities using LLMs by Larry Huynh, Yinghao Zhang, Djimon Jayasundera (The University of Western Australia); Woojin Jeon, Hyoungshick Kim (Sungkyunkwan University); Tingting Bi, Jin B. Hong (The University of Western Australia)
RS18: Containers and Microservices, at Aula A (Centro Congressi), 14:00 - 15:30, June 26

Session Chair: Sibin Mohan (The George Washington University, USA)

  • Zero-Interference Containers: A Framework to Orchestrate Mixed-Criticality Applications by Daniele Ottaviano (Technical University of Munich); Marco Barletta, Francesco Boccola (University of Naples Federico II, Italy)
  • KubeFence: Security Hardening of the Kubernetes Attack Surface by Carmine Cesarano, Roberto Natella (University of Naples Federico II)
  • 5G-STREAM: 5G Service Mesh Tailored for Reliable, Efficient and Authorized Microservices in the Cloud by Tolga Atalay, Alireza Famili, Sudip Maitra (Virginia Tech); Dragoslav Stojadinovic (Kryptowire LLC); Angelos Stavrou, Haining Wang (Virginia Tech)
RS19: Attack Modeling, at Aula B (Centro Congressi), 14:00 - 15:30, June 26

Session Chair: Clay Stevens (Iowa State University, USA)

  • Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks by Nikhilesh Singh (Technische Universität Darmstadt); Chester Rebeiro (IIT Madras)
  • Attack-Defense Trees with Offensive and Defensive Attributes by Danut-Valentin Copae, Reza Soltani, Milan Lopuhaä-Zwakenberg (University of Twente)
  • Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches by Md Rashedul Hasan (University of Nebraska-Lincoln); Mohannad Alhanahnah (Chalmers University of Technology/Gothenburg University); Clay Stevens (Iowa State University); Hamid Bagheri (University of Nebraska-Lincoln)
Industry 5: Security and Privacy in Emerging Technologies, at Aragonese (Royal), 11:00 - 12:30, June 26

Session Chair: Luca Porzio, Micron Technology, Italy

  • To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic Prompt by Zhilong Wang (The Pennsylvania State University), Neha Nagaraja (Northern Arizona University), Lan Zhang (Northern Arizona University), Peng Liu (The Pennsylvania State University), Pawan Patil (University of Southern California), Hayretdin Bahsi (Northern Arizona University)
  • Security-by-Design at the Telco Edge with OSS: Challenges and Lessons Learned by Carmine Cesarano (Università degli Studi di Napoli Federico II), Alessio Foggia (Università degli Studi di Napoli Federico II), Gianluca Roscigno (System Management S.p.A), Luca Andreani (DigitalPlatforms S.p.A), Roberto Natella (Università degli Studi di Napoli Federico II)
  • Bridging the Safety Gap: A C-ITS Solution for Protecting Vulnerable Road Users with DSRC/C-V2X by Mario Fiorentino (SOUTH ENGINEERING SRL), Michele Caggiano (SOUTH ENGINEERING SRL), Alessandro Magliacane (SOUTH ENGINEERING SRL), Angelo Coppola (Federico II University of Naples Dept. of Civil, Building and Environmental Engineering), Andrea Marchetta (Federico II University of Naples Dept. of Civil, Building and Environmental Engineering)
  • An Open-source Implementation and Security Analysis of Triad’s TEE Trusted Time Protocol by Matthieu Bettinger (LIRIS - INSA Lyon), Sonia Ben Mokhtar (LIRIS CNRS), Anthony Simonet-Boulogne (iExec Blockchain Tech)
  • LLMPrism: Black-box Performance Diagnosis for Production LLM Training Platforms by Zhihan Jiang (The Chinese University of Hong Kong), Rui Ren (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Guangba Yu (The Chinese University of Hong Kong), Yulun Wu (The Chinese University of Hong Kong), Wenwei Gu (The Chinese University of Hong Kong), Yichen Li (The Chinese University of Hong Kong), Yujie Huang (The Chinese University of Hong Kong), Cong Feng (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Zengyin Yang (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Yongqiang Yang (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Michael R. Lyu (The Chinese University of Hong Kong)
Industry 6: System Management and Reliability, at Aragonese (Royal), 14:00 - 15:30, June 26

Session Chair: Jan Micha Borrmann, ExpectedIT GmbH, Germany

  • DDR5 DRAM Faults in the Field by Majed Valad Beigi (Advanced Micro Devices, Inc), Yi Cao (Google), Grace Tsai (Google), Sudhanva Gurumurthi (Advanced Micro Devices, Inc), Vilas Sridharan (Advanced Micro Devices, Inc)
  • KubeChecker: Detecting Configuration Bugs in Container Orchestration by Yilin Sun (Fudan University), Dian Lv (Fudan University), Cheng Cui (Huawei Cloud Computing Technology Co., Ltd), Hui Xu (Fudan University)
  • IAM Role Diet: A Scalable Approach to Detecting RBAC Data Inefficiencies by Roberto Moratore (ING Bank), Eduardo Barbaro (ING Bank & TU Delft), Yury Zhauniarovich (TU Delft)
  • Be My Guest: Welcoming Interoperability into IBC-Incompatible Blockchains by Michał Nazarewicz, Dhruv D. Jain (Inclusive Layer), Miguel Matos (IST Lisbon & INESC-ID), Blas Rodriguez (Inclusive Layer)
FORCE 1: Toward Reliable and Scalable Quantum-Classical Integration, at Catalana (Royal), 09:00 - 10:30, June 26

Session Chair: Edoardo Giusto, University of Naples, Federico II

  • Keynote: Quantum computing and applications at DOE’s SQMS Quantum Research Center by Silvia Zorzetti (SQMS - Fermilab)
  • Assessing the Elephant in the Room in Scheduling for Current Hybrid HPC-QC Clusters by Paolo Viviani (LINKS Foundation), Roberto Rocco (E4 Computer Engineering), Matteo Barbieri (E4 Computer Engineering), Gabriella Bettonte (E4 Computer Engineering), Elisabetta Boella (E4 Computer Engineering), Marco Cipollini (Politecnico di Torino), Jonathan Frassineti (CINECA), Fulvio Ganz (E4 Computer Engineering), Sara Marzella (CINECA), Daniele Ottaviani (CINECA), Simone Rizzo (E4 Computer Engineering), Alberto Scionti (LINKS Foundation), Chiara Vercellino (LINKS Foundation - Politecnico di Torino), Giacomo Vitali (LINKS Foundation - Politecnico di Torino), Olivier Terzo (LINKS Foundation), Bartolomeo Montrucchio (Politecnico di Torino), Daniele Gregori (E4 Computer Engineering)
  • A Typology of Quantum-Classical Faults by Edoardo Giusto (University of Naples, Federico II), Santiago Núñez-Corrales (UIUC), Alessandro Cilardo (University of Naples Federico II), Nicola Mazzocca (University of Naples Federico II), Travis Humble (Oak Ridge National Laboratory)
  • Near-term Application Engineering Challenges in Emerging Superconducting Qudit Processors by Davide Venturelli (SQMS, NASA QuAIL & USRA), Erik Gustafson (SQMS, NASA QuAIL & USRA), Doga Kurkcuoglu (SQMS, Fermilab), Silvia Zorzetti (SQMS, Fermilab)
FORCE 2: Quantum-Enhanced Applications: Learning, Security, and Optimization in Practice, at Catalana (Royal), 11:00 - 12:30, June 26

Session Chair: Edoardo Giusto, University of Naples, Federico II

  • Keynote: Security Challenges in Hybrid Classical-Quantum Computing Systems by Jakub Szefer (Northwestern University)
  • ATTAQ: Adversarial Robustness of Quantum Machine Learning by Francesco Marchiori, Mauro Conti (University of Padova)
  • Supply Chain Malware Detection via Classical and Quantum Kernel Methods in Embedded Systems by Sthefanie Passo, Vishal Kothavade, Jeff Prevost (The University of Texas at San Antonio)
  • AI-Augmented Parameter Initialization for QAOA by Jai Nana, Xinpeng Li, Ning Xie, Shusen Pu, Yifan Yu, Qiang Guan, Xiaotian Han, Shuai Xu, Vipin Chaudhary (Case Western Reserve University, Florida International University, University of West Florida, University of Washington, Kent State University)
  • Quantum Circuit Optimization for Protein Structure Prediction by Xinpeng Li, Vinooth Rao Kulkarni, Jai Nana, Shusen Pu, Ning Xie, Qiang Guan, Ruihao Li, Shulei Zhang, Shuai Xu, Daniel Blankenberg, Vipin Chaudhary (Case Western Reserve University, University of West Florida, Florida International University, Kent State University, Cleveland Clinic)
S2AIM 1, at Catalana (Royal), 14:00 - 15:30, June 26

Session Chair: Davide De Vita (University of Naples Federico II, Italy)

  • Keynote: Advancing Secure & Safe IoT and Edge Computing Platforms: Lessons from LoLiPoP IoT and SuzECK projects by George Violettas (SysGO GmbH)
  • Leveraging Time-Frequency Features For Contact Classification And Regression With A Piezoelectric Tactile Skin For Robotic Fingertips by Nicole Alati, Davide Bargellini, Alex Pasquali, Gianluca Palli, Roberto Meattini (Alma Mater University of Bologna, Italy), Yahya Abbass, Maurizio Valle (University of Genova, Italy)
  • Ransomware Threats in Manufacturing Industry: Patterns based on Dark Web Telegram Groups by Luis de Marcos, Adrián Dominguez Díaz, Carlos Cilleruelo, Daniel Rodriguez (University of Alcalá, Spain)
  • Human-AI interaction implementation in consolidate digital environments through a collaborative and multidisciplinary design approach by Michele Zannoni, Virginia Vignali (Alma Mater University of Bologna, Italy)
S2AIM 2, at Catalana (Royal), 16:00 - 17:30, June 26

Session Chair: Virginia Vignali (Alma Mater University of Bologna, Italy)

  • Orchestration of Sustainable Mixed-Criticality Systems over Heterogenous Edge Nodes by Francesco Boccola, Marcello Cinque, Luigi De Simone, Davide De Vita, Nike Di Giacomo (University of Naples Federico II, Italy)
  • Robot Situation and Task Awareness using Large Language Models and Ontologies by Victor Molina, Oriol Ruiz-Celada, Raul Suarez, Jan Rosell, Isiah Zaplana (Universitat Politècnica de Catalunya - BarcelonaTech, Spain)
  • Experimental Evaluation Of A User-Centered Unilateral Telemanipulation System For Training And Control In Robotic Industrial Scenarios by Mattia Tafuri, Davide Chiaravalli, Mona Saber Gharamaleki, Claudio Melchiorri, Gianluca Palli, Roberto Meattini (Alma Mater University of Bologna, Italy)

Monday, June 23


VERDI 1: Opening and Keynote at Aula A (Centro Congressi), 9:00 - 10:30, June 23
  • Session Chair: Behrooz Sangchoolie, RISE Research Institutes of Sweden, Sweden
  • Welcome to VERDI 2025 by Behrooz Sangchoolie (RISE Research Institutes of Sweden, Sweden), David Pereira (VORTEX CoLab, Portugal), José Proença (CISTER, Faculty of Sciences, University of Porto, Portugal)
  • Keynote: Graphical Security Models and Their Applications by Dan Dongseong Kim, University of Queensland, Australia
VERDI 2: Autonomous Vehicles at Aula A (Centro Congressi), 11:00 - 12:30, June 23
  • Session Chair: David Pereira, VORTEX CoLab, Portugal
  • A Hybrid Cybersecurity Assessment Framework for Unmanned Aircraft Vehicles Based on IMECA and Penetration Testing by Artem Abakumov, Vyacheslav Kharchenko (National Aerospace University KhAI, Kharkiv, Ukraine), Peter Popov (City St George’s, University of London, United Kingdom)
  • Refining Environmental Requirements for Autonomous Driving Systems: Leveraging the FRAV Framework by Mahwish Kundi (Maynooth University, Ireland), Faraz Ahmad (Abdul Wali Khan University Mardan, Pakistan), Rosemary Monahan (Maynooth University, Ireland)
  • Safety-Centric Architecture for AI-Enabled Autonomous Driving Systems by Jatin Arora (VORTEX CoLab and CISTER, ISEP, Portugal), Alexandre Esper (Capgemini Engineering, Porto, Portugal), Vasco Santos (VORTEX CoLab, Portugal)
VERDI 3: Logical Reasoning at Aula A (Centro Congressi), 14:00 - 15:30, June 23
  • Session Chair: Raul Barbosa, University of Coimbra, Portugal
  • Model-driven, logic-supported exploratory dependability analysis by András Földvári (Budapest University of Technology and Economics, Hungary), András Pataricza (Budapest University of Technology and Economics, Hungary)
  • Enhancing Cyber-Physical System Dependability via Synthesis: Challenges and Future Directions by Max Taylor (Idaho National Laboratory, United States), Arthur Amorim (The University of Central Florida, United States)
  • Reasoning with Happens-Before Relations about Concurrent Programs in the Theta Framework by Csanád Telbisz, Levente Bajczi, Dániel Szekeres, András Vörös, István Majzik (Budapest University of Technology and Economics, Hungary)
VERDI 4: AI for V&V at Aula A (Centro Congressi), 16:00 - 17:30, June 23
  • Session Chair: Peter Popov, City St George’s, University of London, United Kingdom
  • Dependability Assurance with Symbolic Reasoning in LLM-enabled Systems by András Gergely Deé-Lukács, András Földvári (Budapest University of Technology and Economics, Hungary)
  • Program Verification for Rigorous Analysis of Decision Tree Ensembles against Specifications by Iat Tou Leong (University of Coimbra, CISUC, Portugal), Aleksandar Avdalovic (Louisiana State University, United States), Raul Barbosa (University of Coimbra, CISUC, Portugal)
  • DURA‑CPS: A Multi‑Role Orchestrator for Dependability Assurance in LLM‑Enabled Cyber‑Physical Systems by Trisanth Srinivasan (Department of AI Deployment and Safety, Cyrion Labs, United States), Santosh Patapati (Molecular Engineering & Sciences Institute, University of Washington, United States), Himani Musku (School of Computer Science, Carnegie Mellon University, United States), Idhant Gode (College of Engineering, Cornell University, United States), Aditya Arora (ACM AI, University of California San Diego, United States), Samvit Bhattacharya (Department of R&D, Cyrion Labs, United States), Abubakr Nazriev (Sentinel DE, University of Montana, United States), Sanika Hirave (Dept. of Computer Science & Engineering, Oakland University, United States), Zaryab Kanjiani (Dyson AEM, Cornell University, United States), Srinjoy Ghose (School of Science, University of North Texas, United States)
DSML 1: Keynote Talk 1 at Aula B (Centro Congressi), 9:00 - 10:30, June 23
  • Session Chair: Xugui Zhou, Louisiana State University
  • Welcome words
  • Keynote: Dependability and Security of Machine Learning: Old Wine in a New Bottle or Not? by Karthik Pattabiraman, University of British Columbia
DSML 2: Adversarial Machine Learning and Defenses at Aula B (Centro Congressi), 11:00 - 12:30, June 23
  • Session Chair: Zhengping Jay Luo, Rider University
  • Revisiting Adversarial Perception Attacks and Defense Methods on Autonomous Driving Systems by Cheng Chen, Yuhong Wang, Nafis S Munir, Xiangwei Zhou, Xugui Zhou (Louisiana State University)
  • On the Transferability of Adversarial Attacks from Convolutional Neural Networks to Variants of ChatGPT4 by Niklas Bunzel (Fraunhofer Institute for Secure Information Technology)
  • Learning from the Good Ones: Risk Profiling-Based Defenses Against Evasion Attacks on DNNs by Mohammed Elnawawy, Gargi Mitra (University of British Columbia), Shahrear Iqbal (National Research Council Canada), Karthik Pattabiraman (University of British Columbia)
  • Audio Jailbreak Attacks: Exposing Vulnerabilities in SpeechGPT in a White-Box Framework by Binhao Ma (University of Missouri-Kansas City), Hanqing Guo (University of Hawaii at Mānoa), Zhengping Jay Luo (Rider University), Rui Duan (University of Missouri-Kansas City)
DSML 3: Keynote Talk 2 at Aula B (Centro Congressi), 14:00 - 15:30, June 23
  • Session Chair: Niklas Bunzel (Fraunhofer Institute for Secure Information Technology)
  • Keynote: Securing the Machine Learning Components of Autonomous Vehicles: Risk Assessment and Mitigation by Evgenia Smirni, Chair and Sidney P. Chockley Professor, Computer Science, College of William and Mary, USA
  • FHE ML Tuxedo: A Tailored Wrapper Architecture for Homomorphic Encryption in Machine Learning by Martin Nocker, Linus Henke, Pascal Schöttle (Josef Ressel Centre for Security Analysis of IoT Devices, MCI The Entrepreneurial School, Innsbruck, Austria)
DSML 4: Trust and Vulnerabilities in Generative AI Systems at Aula B (Centro Congressi), 16:00 - 17:30, June 23
  • Session Chair:Karthik Pattabiraman (University of British Columbia)
  • Hallucination Detection in LLMs via Beam Search Sampling and Semantic Consistency Analysis by Radouane Bouchekir (fortiss GmbH), Fathiyeh Faghih (fortiss GmbH), Tewodros Beyene (fortiss GmbH)
  • Securing AI Code Generation Through Automated Pattern-Based Patching by Francesco Altiero, Domenico Cotroneo, Roberta De Luca, Pietro Liguori (Università degli Studi di Napoli Federico)
  • Decoding Neighborhood Environments with Large Language Models by Andrew Cart, Shaohu Zhang, Melanie Escue, Xugui Zhou, Haitao Zhao, Prashanth BusiReddyGari (University of North Carolina at Pembroke), Beiyu Lin (University of Oklahoma), Shuang Li (North Carolina A&T State University)
  • A Lightweight Reputation-Based Mechanism for Incentivizing Cooperation in Decentralized Federated Learning by Kavindu Bagchi, Suraj Mahangade, Saurabh Bagchi (Purdue University)
  • Closing Remarks
DT4DRS 1: Opening at Sveva (Royal), 9:00 - 10:30, June 23
  • Session Chairs: Alessandra Somma, Alessandra De Benedictis, University of Naples Federico II
  • Keynote: Digital Twins for Trustworthy Autonomy by Prof. Francesco Flammini, University of Florence
DT4DRS 2: Digital Twins for Environment Management and Urban Mobility Safety at Sveva (Royal), 11:00 - 12:30, June 23
  • Session Chair: Alessandra Somma, University of Naples Federico II
  • An Architectural Framework for Urban Digital Twin Design: a Case Study on Hydrogeological Risk Management by Angelo Martella, Antonella Longo, Cristian Martella, Marco Zappatore, Francesca Miccoli (Università del Salento, Italy)
  • An Integrated Digital Twin Architecture for Real-Time Urban Air Quality Management by Manoj Herath, Hrishikesh Dutta, Roberto Minerva, Noël Crespi, Maira Alvi, Syed Raza (Telecom SudParis, France)
  • A Digital Twin Approach to Autonomous Emergency Braking: HiL Testing with Raspberry Pi and Standardized Scenarios by Roland Nagy, Árpád Török (Budapest University of Technology and Economics, Hungary)
  • Network and Vehicle Digital Twins for Hardware-in-the-Loop Simulation of C-ITS Applications by Andrea Marchetta (University Federico II of Naples, Italy), Tamás Márton Kazár (Budapest University of Technology and Economics, Hungary), Marcello Cinque (University Federico II of Naples, Italy), Angelo Coppola (University Federico II of Naples, Italy), Zsombor Pethő (Budapest University of Technology and Economics, Hungary), Zsolt Szalay (Budapest University of Technology and Economics, Hungary), and Árpád Török (Budapest University of Technology and Economics, Hungary)
DT4DRS 3: Resilient and Secure Infrastructures through Digital Twins at Sveva (Royal), 14:00 - 15:30, June 23
  • Session Chair: Alessandra De Benedictis, University of Naples Federico II
  • A Digital Twin Network for Proactive Security: The Smart Grid Use-Case by Biagio Boi, Christian Esposito (Università di Salerno, Italy)
  • A Model-based Approach for Cybersecurity Assessment of Off-Road and Defense Vehicles by Umberto Bellini (Università di Trento, Italy), Marzieh Kordi (IMT School for Advanced Studies, Italy), Bruno Crispo (Università di Trento, Italy), Paolo Lollini (Università degli Studi di Firenze, Italy), Andrea Bondavalli (Università degli Studi di Firenze), and Davide Compar (IDV, Italy)
  • Using Digital Twins as an Upgrade Path for Critical Infrastructure Control Systems by Huzaifah Nadeem, Amy Babay (University of Pittsburgh, USA)
  • Toward Predictive Diagnostics: Real-Time Digital Twin for Electric Vehicle Power Systems by Emil Nagy, Dávid Tollner (Budapest University of Technology and Economics, Hungary), József Pázmány (Jaguar Land Rover Hungary Kft., Hungary), Árpád Török (Budapest University of Technology and Economics, Hungary)
  • Closing
EnvSys 1: Opening at Santa Lucia (Royal), 9:00 - 10:30, June 23
  • Session Chair: Wen-Ping Tsai National Cheng Kung University)
  • Ice-breaking activities
  • Keynote: The Power of On-line Indirect Surveys to Monitor Society by Antonio Fernández Anta (IMDEA), Nicolas Nicolaou (Algolysis Ltd), Efstathios Stavrakis (Algolysis Ltd)
  • Invited Talk: Flood Resilience through Hybrid Deep Learning: Optimizing Taipei’s Urban Drainage System by Fi-John Chang (National Taiwan University)
EnvSys 2: Full Papers Session at Santa Lucia (Royal), 11:00 - 12:30, June 23
  • Session Chair: Lewis Tseng (UMass Lowell)
  • Weather Impact Analysis for UAV-based Deforestation Monitoring Systems by Tasfia Nuzhat, Fumio Machida (University of Tsukuba), Ermeson Andrade (Federal Rural University of Pernambuco)
  • Federated Learning-Based Approach for Landslide Prediction – The Case Study in Taiwan by Po-Wu Cheng, Wen-Ping Tsai (National Cheng Kung University)
  • Beyond Control: Embracing Emergent Behavior in Symbiotic Digital Twin and CPS Ecosystems by Andrea Garbugli, Paolo Bellavista, Armir Bujari (University of Bologna)
EnvSys 3: Tutorial and Short Papers Session at Santa Lucia (Royal), 14:00 - 15:30, June 23
  • Session Chair: Wen-Ping Tsai National Cheng Kung University)
  • Tutorial: Water Sustainability and Computing by Wen-Ping Tsai (National Cheng Kung University), Lewis Tseng (UMass Lowell)
  • Risk Assessment and Adaptive Management: Integrating LSTM-Based Groundwater Forecasting for Climate-Driven Water Resource Planning by Pei Ju Tsang, Wen-Ping Tsai (National Cheng Kung University)
  • Experience: Evaluating Real-time Drone OS under Extreme and Adversarial Environment by Vina Dang, Layann Shaban, Lewis Tseng (UMass Lowell)
  • Roundtable discussion and conclusion
AxC 1: Keynote Talks at Catalana (Royal), 9:00 - 10:30, June 23
  • Keynote: Architectural-Level Approximate Accelerator Synthesis: Techniques, Challenges, and Future Directions by Muhammad Awais, Paderborn University, Germany
  • Keynote: Low Cost Protection of Streaming Data with Approximate Block Sums by Somayeh Sadeghi Kohan, Paderborn University, Germany
AxC 2: Precision Meets Pragmatism: Approximating for Efficiency in AI at Catalana (Royal), 11:00 - 12:30, June 23
  • On the resilience of INT8 Quantized Neural Networks on Low-Power RISC-V Devices by Antonio Porsia, Giacomo Perlo, Annachiara Ruospo, Ernesto Sanchez (Politecnico di Torino)
  • A Margin Based Early-Stopping Approach for Random Forest classifiers by Mario Barbareschi, Antonio Emmanuele (University of Naples Federico II)
AxC 3: Optimized Circuits and Computation: Reliability, Health, and Energy Efficiency at Catalana (Royal), 14:00 - 15:30, June 23
  • XMULT: An Energy-Efficient Design of Approximate Multiplier by Ahsan Rafiq, Maksim Jenihhin (Tallinn University of Technology, Estonia)
  • Deep&Wide: Achieving Area Efficiency in Scalable Approximate Accelerators by Farjana Jalil, Qazi Arbab Ahmed, Hassan Ghasemzadeh Mohammadi, Thorsten Jungeblut (Bielefeld University of Applied Sciences and Arts), Muhammad Awais, Marco Platzner (Paderborn University), Reneo Group GmbH
AxC 4: Keynote Talk at Catalana (Royal), 16:00 - 17:30, June 23
  • Keynote: Approximate and Stochastic Ising Machines by Jie Han, University of Alberta, Canada
Tutorial 1: at Aragonese (Royal), 09:00 - 12:30, June 23
  • Generative AI in Cybersecurity: Generating Offensive Code from Natural Language by Pietro Liguori, Roberto Natella, Domenico Cotroneo (Università degli Studi di Napoli Federico II, Italy)
Tutorial 2: at Angioina (Royal), 09:00 - 12:30, June 23
  • Model-based Qualitative Dependability and Security Evaluation by András Földvári, András Pataricza (Budapest University of Technology and Economics, Hungary)
Tutorial 3: at Capuana (Royal), 09:00 - 12:30, June 23
  • Evaluating Blockchain Fault Tolerance with STABL by Vincent Gramoli (University of Sydney and Redbelly Network, Australia), Rachid Guerraoui (EPFL, Switzerland), Andrei Lebedev (University of Sydney, Australia), Gauthier Voron (EPFL, Switzerland)
Tutorial 4: at Aragonese (Royal), 14:00 - 17:30, June 23
  • Quantum Computing and Post-Quantum Cryptography: Preparing for the Next Era of Cybersecurity by Hazel Murray, George O’Mahony, Anila Mjeda (Munster Technological University, Ireland)
Tutorial 5: at Angioina (Royal), 14:00 - 17:30, June 23
  • Decentralized Federated Learning: Enhancing Reliability with Blockchain by Antonella Del Pozzo, Maxence Perion (Université Paris-Saclay, CEA, List, France)
Tutorial 6: at Capuana (Royal), 14:00 - 17:30, June 23
  • Benchmarking of AI Agents for IT Automation Tasks using ITBench by Rohan Arora, Saurabh Jha (IBM Research, Yorktown Heights, USA)

Tuesday, June 24


Opening, at Mirabilis (Royal), 8:45 - 9:15, June 24

Speakers: Marcello Cinque and Domenico Cotroneo, Università degli Studi di Napoli Federico II

Speakers: Patrick Lee, The Chinese University of Hong Kong and Saman Zonouz, Georgia Institute of Technology

Test of Time (TOT) Award, at Mirabilis (Royal), 09:15 - 09:45, June 24

Session Chair: Domenico Cotroneo, Università degli Studi di Napoli Federico II

  • FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks by Haopei Wang, Lei Xu, Guofei Gu
  • AVATAR: A Variable-Retention-Time (VRT) Aware Refresh for DRAM Systems by Moinuddin K. Qureshi, Dae-Hyun Kim, Samira Khan, Prashant J. Nair, Onur Mutlu
Keynote 1, at Mirabilis (Royal), 9:45 - 10:30, June 24

Session Chair: Domenico Cotroneo (Università degli Studi di Napoli Federico II)

  • The AI Paradox: Between Global Power, Technology Sourcing, Errors and (De)regulation Shifts by Roberto Baldoni (Senior Advisor for Technology and Cybersecurity Policy, Embassy of Italy in Washington DC)
RS1: Best Paper Award, at Mirabilis (Royal), 11:00 - 12:30, June 24

Session Chair: Saman Zonouz, Georgia Institute of Technology, USA

  • Privacy Analysis of Oblivious DNS over HTTPS: a Website Fingerprinting Study by Mohammad Amir Salari (Saint Louis University), Abhinav Kumar (University of Massachusetts Amherst), Federico Rinaudi (Politecnico Di Torino), Reza Tourani (Saint Louis University), Alessio Sacco (Politecnico Di Torino), Flavio Esposito (Saint Louis University)
  • GnuZero: A Compiler-Based Zeroization Static Detection Tool for the Masses by Pierrick Philippe (University of Rennes, CNRS, IRISA), Mohamed Sabt (University of Rennes, CNRS, IRISA), Pierre-Alain Fouque (Univ Rennes, CNRS, IRISA)
  • Faster Hash-based Multi-valued Validated Asynchronous Byzantine Agreement by Hanwen Feng (The University of Sydney); Zhenliang Lu (Nanyang Technological University); Tiancheng Mai, Qiang Tang (The University of Sydney)
RS2: Blockchains, at Aula Magna (Centro Congressi), 14:00 - 15:30, June 24

Session Chair: Silvia Bonomi (Università degli Studi di Roma "La Sapienza", Italy)

  • ammBoost: State Growth Control for AMMs by Nicolas Michel, Mohamed E. Najd, Ghada Almashaqbeh (University of Connecticut)
  • Mitigating Front-Running Attacks through Fair and Resilient Transaction Dissemination by Wassim Yahyaoui (SnT, University of Luxembourg); Joachim Bruneau-Queyreix (Université de Bordeaux); Jérémie Decouchant (TU Delft); Marcus Völp (SnT, University of Luxembourg)
  • Reentrancy Redux: The Evolution of Real-World Reentrancy Attacks on Blockchains by Yuqi Liu, Rui Xi, Karthik Pattabiraman (University of British Columbia)
RS3: AI Security, at Aula B (Centro Congressi), 14:00 - 15:30, June 24

Session Chair: Roberto Natella (Università degli Studi di Napoli Federico II, Italy)

  • Towards Automated and Explainable Threat Hunting with Generative AI by Moumita Das Purba, Bei-Tseng Chu, Will French (University of North Carolina at Charlotte)
  • Prompting the Unseen: Detecting Hidden Backdoors in Black-Box Models by Zixuan Huang, Jia-Wei Chen, Zhipeng Zhang, Chia-Mu Yu (National Yang Ming Chiao Tung University)
  • Semantically Improved Adversarial Attack Based on Masked Language Model via Context Preservation by Hao Tian (South China University of Technology); Hao-Tian Wu (Guangzhou University); Yiu-ming Cheung (Hong Kong Baptist University); Junhui He (South China University of Technology); Zhihong Tian (Guangzhou University)
RS4: Voice and UAV Security, at Catalana (Royal), 14:00 - 15:30, June 24

Session Chair: Saurabh Bagchi (Purdue University, USA)

  • LiveGuard: Voice Liveness Detection via Wavelet Scattering Transform and Mel Spectrogram Scaling by Liqun Shan, Xingli Zhang, Md Imran Hossen, Xiali Hei (University of Louisiana at Lafayette)
  • SOUNDBOOST: Effective RCA and Attack Detection for UAV via Acoustic Side-Channel by Haoran Wang, Zheng Yang (Georgia Institute of Technology); Sangdon Park (Pohang University of Science and Technology); Yibin Yang (Georgia Institute of Technology); Seulbae Kim (Pohang University of Science and Technology); Willian Lunardi, Martin Andreoni (Technology Innovation Institute); Taesoo Kim, Wenke Lee (Georgia Institute of Technology)
  • "I will always be by your side": A Side-channel Aided PWM-based Holistic Attack Recovery for Unmanned Aerial Vehicles by Muneeba Asif, Jean C Tonday Rodriguez, Mohammad Kumail Kazmi, Mohammad Ashiqur Rahman, Kemal Akkaya (Florida International University)
RS5: Blockchains and Federated Learning, at Aula Magna (Centro Congressi), 16:00 - 17:30, June 24

Session Chair: Sara Bouchenak (Institut National des Sciences Appliquées (INSA) Lyon, France)

  • PhishingHook: Catching Phishing Ethereum Smart Contracts leveraging EVM Opcodes by Pasquale De Rosa, Simon Queyrut (University of Neuchâtel, Switzerland); Yérom-David Bromberg (University of Rennes, INRIA, France); Pascal Felber, Valerio Schiavoni (University of Neuchâtel, Switzerland)
  • GTV: Generating Tabular Data via Vertical Federated Learning by Zilong Zhao (National University of Singapore); Han Wu (University of Southampton); Aad Van Moorsel (University of Birmingham); Lydia Chen (TU Delft)
  • VerifyVFL: Practical Verifiable Vertical Federated Learning by Junchen Hou, Lan Zhang (University of Science and Technology of China)
RS6: Architecture Evaluation, at Aula B (Centro Congressi), 16:00 - 17:30, June 24

Session Chair: Hiroshi Yamada (Tokyo University of Agriculture and Technology (TUAT), Japan)

  • EasyDRAM: An FPGA-based Infrastructure for Fast and Accurate End-to-End Evaluation of Emerging DRAM Techniques by Oğuzhan Canpolat (TOBB ETÜ and ETH Zurich); Ataberk Olgun (ETH Zurich); David Novo (LIRMM, Univ Montpellier, CNRS); Oguz Ergin (University of Sharjah and TOBB ETÜ); Onur Mutlu (ETH Zurich)
  • Hierarchical Model-Based Approach for Concurrent Testing of Neuromorphic Architecture by Suman Kumar, Abhishek Kumar Mishra, Anup Das, Nagarajan Kandasamy (Drexel University)
  • ConfBench: A Tool for Easy Evaluation of Confidential Virtual Machines by Andrea De Murtas (Sapienza University of Rome, Italy and University of Neuchâtel, Switzerland); Daniele Cono D'Elia, Giuseppe Antonio Di Luna (Sapienza University of Rome, Italy); Pascal Felber (University of Neuchatel, Switzerland); Leonardo Querzoni (Sapienza University of Rome, Italy); Valerio Schiavoni (University of Neuchâtel, Switzerland)
RS7: IoT and Smart Homes, at Catalana (Royal), 16:00 - 17:30, June 24

Session Chair: Kenji Kono (Keio University, Japan)

  • On Security Vulnerabilities in Transportation IoT Devices by Jason Yih (College of Computer, Mathematical, and Natural Sciences; University of Maryland, College Park, MD); Katerina Goseva-Popstojanova (Lane Department of Computer Science and Electrical Engineering; West Virginia University, Morgantown, WV); Michel Cukier (Department of Mechanical Engineering, University of Maryland, College Park, MD)
  • Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV Ecosystem by Christian Böttger (Institute for Internet Security, Westphalian University of Applied Sciences); Henry Hosseini (University of Münster; Institute for Internet Security, Westphalian University of Applied Sciences); Christine Utz (Radboud University); Nurullah Demir (Institute for Internet Security, Westphalian University of Applied Sciences); Jan Hörnemann (AWARE7 GmbH); Christian Wressnegger (Karlsruhe Institute of Technology); Thomas Hupperich (University of Münster); Norbert Pohlmann (Institute for Internet Security, Westphalian University of Applied Sciences); Matteo Große-Kampmann (Rhine-Waal University of Applied Sciences); Tobias Urban (Institute for Internet Security, Westphalian University of Applied Sciences)
Industry 1: Security in Cyber-Physical and Industrial Systems, at Aragonese (Royal), 14:00 - 15:30, June 24

Session Chair: George Violettas, SYSGO GmbH, Germany

  • Quantitative Security Metrics: Assessment of Cyberattack Scenarios for Cyber-Physical Systems by Mike Da Silva (De Vinci Higher Education, De Vinci Research Center, Paris, France), Nga Nguyen (De Vinci Higher Education, De Vinci Research Center, Paris, France)
  • Regulating Prosumer Device Security: a Key Priority in Power Grid Protection by Luigi Coppolino (University of Naples Parthenope), Roberto Nardone (University of Naples Parthenope), Alfredo Petruolo (University of Naples Parthenope), Luigi Romano (University of Naples Parthenope)
  • Runtime Verification of Program Organization Units in Safe Programmable Logic Controller Systems by Hisham Unniyankal (University of Genova), Davide Ancona (University of Genova), Angelo Ferrando (University of Modena and Reggio Emilia), Fabio Parodi (Technoleader Srl), Alessandro Alessi (Technoleader Srl), Federico Bottino (COBO SpA)
  • Assessing the Transferability of Adversarial Patches in Real-World Systems: Implications for Adversarial Testing of Image Recognition Security by Stephan Kleber (Mercedes-Benz Tech Innovation GmbH), Tim Palm (Ulm University), Jeremias Eppler (Mercedes-Benz Tech Innovation GmbH), Dennis Eisermann (Ulm University), Frank Kargl (Ulm University)
Industry 2: Hardware Endurance and Interference, at Aragonese (Royal), 16:00 - 17:30, June 24

Session Chair: Jan Micha Borrmann, ExpectedIT GmbH, Germany

  • Observe and Regulate Memory Interference on MPSoC: a Practical Approach by Andrea Bastoni (TUM), Alexander Zuepke (TUM), Marco Solieri (Minerva Systems)
  • Hardware Telemetry at Scale: A Case Study on SSDs Endurance Monitoring in Datacenters by Olusiji Medaiyese (Meta Platforms Inc.), Fred Lin (Meta Platforms Inc.), Harish Dixit (Meta Platforms Inc.), Richa Mishra (Meta Platforms Inc.), Andrea Baglioni (Meta Platforms Inc.), Leandro Silva (Meta Platforms Inc.), Mike Elkin (Meta Platforms Inc.), Andrei Ilyashenko (Meta Platforms Inc.), Gor Safaryan (Meta Platforms Inc.), Dhankaran Singh Ajravat (Meta Platforms Inc.), Xun Jiao (Meta Platforms Inc.), Vineet Parekh (Meta Platforms Inc.)
  • On the Feasibility of Exploiting the USB Power Line for Side-Channel Attacks against Samsung Smartphone Models by Leonardo da Costa (Samsung Research and Development Institute Brazil), Witor Oliveira (Samsung Research and Development Institute Brazil), Caio Peres (Samsung Research and Development Institute Brazil), Rene de Mello (Samsung Research and Development Institute Brazil), Jonghun Song (Samsung Electronics), Seokwon Jeong (Samsung Electronics), Hyungchul Jung (Samsung Electronics)
  • Towards Robust Autonomous Landing Systems: Iterative Solutions and Key Lessons Learned by Sebastian Schroder (Macquarie University), Yao Deng (Macquarie University), Alice James (Macquarie University), Avishkar Seth (Macquarie University), Kye Morton (Skyy Network), Subhas Mukhopadhyay (Macquarie University), Richard Han (Macquarie University), Xi Zheng (Macquarie University)
Posters, at Aula A (Centro Congressi), 14:00 - 15:30, June 24

Session Chair: Nuno Laranjeiro, University of Coimbra, Portugal

  • DeepICS: Deep Causal Relationship Modeling for Multi-Source Log-Based Anomaly Detection in Industrial Control Systems by Seong-Su Yoon, Ieck-Chae Euom and Dong-hyuk Shin (System Security Research Center, Chonnam National University)
  • Real-Time GOOSE Attack Detection in IEC 61850 Substations Using SDN-Based Traffic Inspection by Seunghyun Yoon (Korea Institute of Energy Technology (KENTECH)), Ryangsoo Kim (Electronics and Telecommunications Research Institute (ETRI)), Hark Yoo (Electronics and Telecommunications Research Institute (ETRI)), Hyuk Lim (Korea Institute of Energy Technology (KENTECH))
  • Intrusion Detection System with Domain-incremental Continual Learning by Hyejin Kim (Korea Institute of Energy Technology (KENTECH)), Seunghyun Yoon (Korea Institute of Energy Technology (KENTECH)), Dan Dongseong Kim (The University of Queensland), Jin-Hee Cho (Virginia Tech), Terrence J. Moore (DEVCOM Army Research Lab), Frederica F. Nelson (DEVCOM Army Research Lab), Hyuk Lim (Korea Institute of Energy Technology (KENTECH))
  • Looking for Anomalies in Cross-Chain Bridges by André Augusto (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa), Rafael Belchior (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa), Jonas Pfannschmidt (Blockdaemon), André Vasconcelos (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa), Miguel Correia (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa)
  • Adaptive Identity Management: Unified Personalization and Privacy Protection for Web Apps by Min-Chieh Wu, Yu-Sung Wu (National Yang Ming Chiao Tung University)
  • Security Vulnerability Risk Growth Model based on CVSS 4.0 by Sora Okada, Masaya Shimakawa, Takashi Minohara (Dept. of Comp. Sci. Takushoku University)
  • Study of Appropriate Information Combination in Image-based Obfuscated Malware Detection by Tetsuro Takahashi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki (Shizuoka University)
  • Detecting Scrapers on E-commerce Websites Using a Reduced Feature Set by Umberto Fontana (Amadeus IT Group and Telecom SudParis France), Elisa Chiapponi (Amadeus IT Group, France), Claudio Costanza (Amadeus IT Group, France), Vincent Rigal (Amadeus IT Group, France), Olivier Thonnard (Amadeus IT Group, France), Martynas Buozis (Amadeus IT Group, France), Herve Debar (Telecom SudParis)
  • Jailbreaking Generative AI: Empowering Novices to Conduct Phishing Attacks by Rina Mishra, Gaurav Varshney, Shreya Singh (IIT Jammu)
  • PhishingHook by Pasquale De Rosa (University of Neuchâtel), Simon Queyrut (University of Neuchâtel), Yérom-David Bromberg (Univ Rennes, Inria, CNRS, IRISA), Pascal Felber (University of Neuchâtel), Valerio Schiavoni (University of Neuchâtel)
  • Learnable Encryption with a Diffusion Property by Ijaz Ahmad (Department of Electrical and Computer Engineering, Korea University), Joongheon Kim (Department of Electrical and Computer Engineering, Korea University), Seokjoo Shin (Chosun University)
  • TOSense: We Read, You Click by Xinzhang Chen, Hassan Ali, Arash Shaghaghi, Salil S. Kanhere, Sanjay Jha (UNSW Sydney)
  • Agree to Disagree: Revisiting the Comparison of (Multi-) Paxos and Raft by Lewis Tseng (UMass Lowell)
  • Designing Scalable, Secure Systems for Atomic-Scale Physical AI: Enabling Open Science and Collaborative Data Management and Analytics by Lewis Tseng (UMass Lowell), Yu-Tsun Shao (USC)
Disrupt 1: Trust and Assurance in LLM and ML-Enabled Systems, at Aula A (Centro Congressi), 16:00 - 17:30, June 24

Session Chair: Marco Vieira, University of North Carolina at Charlotte, USA

  • Assessing the Validity of LLM-Driven Hazard Analysis: An Assessor’s Perspective by Michael Kevvay (MIREA - Russian Technical University), Vladislav Gryaznykh (MIREA - Russian Technical University), Oleg Kirovski (SafetyConsult LLC), Anton Korolev (Russian Technical University)
  • Trusted Federated Learning: Towards a Partial Zero-Knowledge Proof Approach by Yannis Formery (COSYS-ERENA, Université Gustave Eiffel), Leo Mendiboure (COSYS-ERENA, Université Gustave Eiffel), Jonathan Villain (COSYS-Leost, Université Gustave Eiffel), Virginie Deniau (COSYS-Leost, Université Gustave Eiffel), Christophe Gransart (COSYS-Leost, Université Gustave Eiffel), Stephane Delbruel (Université de Bordeaux)
  • Rethinking BFT: Leveraging Diverse Software Components with LLMs by João Imperadeiro (INESC TEC), Ana Nunes Alonso (INESC TEC & University of Minho), José Orlando Pereira (U. Minho & INESCTEC)
Poster Spritz Reception at Poster Exhibition Room (Centro Congressi), 17:30 - 18:30, June 24

Come to visit DSN posters while tasting the famous Italian aperitif (Spritz)!

Wednesday, June 25


Jean-Claude Laprie (JCL) Award, at Aula Magna (Centro Congressi), 09:00 - 09:45, June 25

Session Chair: Marco Vieira, University of North Carolina at Charlotte, USA

  • Flikker: saving DRAM refresh power through critical data partitioning by Song Liu, Karthik Pattabiraman, Thomas Moscibroda, and Benjamin G. Zorn. ASPLOS XVI, 2011. https://doi.org/10.1145/1950365.1950391
  • Lightweight Probabilistic Broadcast by Patrick Th. Eugster, Rachid Guerraoui, S. B. Handurukande, Petr Kouznetsov, and Anne-Marie Kermarrec. DSN 2001. https://doi.org/10.1109/DSN.2001.941428
Keynote 2, at Aula Magna (Centro Congressi), 09:45 - 10:30, June 25

Session Chair: Marcello Cinque

  • Provable Guarantees for Data-driven Policy Synthesis: a Formal Verification Perspective by Marta Kwiatkowska (University of Oxford)
RS8: Network Intrusion Detection, at Aula Magna (Centro Congressi), 11:00 - 12:30, June 25

Session Chair: Miguel Correia (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa, Portugal)

  • LAGER: Layer-wise Graph Feature Extractor for Network Intrusion Detection by Ke He (University of Canterbury), Dan Dongseong Kim (The University of Queensland), Muhammad Rizwan Asghar (University of Surrey)
  • IPMES+: Enhancing Incremental TTP Detection with Frequency and Flow Semantics by Hong-Wei Li (Research Center for Information Technology Innovation, Academia Sinica), Ping-Ting Liu, Bo-Wei Lin (National Yang Ming Chiao Tung University), Yennun Huang (Research Center for Information Technology Innovation, Academia Sinica)
  • MalTAG: Encrypted Malware Traffic Detection Framework via Graph Based Flow Interaction Mining by Renjie Li, Zhou Zhou, Hao Miao, Fengyuan Shi (University of Chinese Academy of Sciences China, Institute of Information Engineering), Qingyun Liu (Institute of Information Engineering, Chinese Academy of Sciences)
RS9: Cyber-Physical Systems, at Aula B (Centro Congressi), 11:00 - 12:30, June 25

Session Chair: Pascal Felber (University of Neuchatel, Switzerland)

  • ICSTRACKER: Backtracking Intrusions in Modern Industrial Control Systems by Md Raihan Ahmed, Jainta Paul, Levi Taiji Li, Luis Garcia, Mu Zhang (University of Utah)
  • MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers by Mert D. Pesé, Bulut Gozubuyuk (Clemson University), Eric Andrechek (University of Michigan), Habeeb Olufowobi (University of Texas at Arlington), Mohammad Hamad (Technical University of Munich), Kang G. Shin (University of Michigan)
  • ZCOVER: Uncovering Z-Wave Controller Vulnerabilities Through Systematic Security Analysis of Application Layer Implementation by Nkuba Kayembe Carlos, Jimin Kang, Seunghoon Woo, Heejo Lee (Korea University)
RS10: Network Measurement, at Aula Magna (Centro Congressi), 14:00 - 15:30, June 25

Session Chair: Haining Wang (Virginia Tech, USA)

  • PTC: Prefix Tuning CodeT5 for High-Quality Secure Network Measurement Script Generation by Yuanda Wang, Xinhui Han (Peking University)
  • Decoding DNS Centralization: Measuring and Identifying NS Domains Across Hosting Providers by Qihang Peng, Mingming Zhang, Deliang Chang, Jia Zhang, Baojun Liu, Haixin Duan (Tsinghua University; Zhongguancun Laboratory; QI-ANXIN Technology Research Institute)
  • Towards Continuous Integrity Attestation and Its Challenges in Practice: A Case Study of Keylime by Margie Ruffin, Chenkai Wang (University of Illinois Urbana-Champaign), Gheorghe Almasi, Abdulhamid Adebayo, Hubertus Franke (IBM Research), Gang Wang (University of Illinois Urbana-Champaign)
RS11: Autonomous Systems, at Aula A (Centro Congressi), 14:00 - 15:30, June 25

Session Chair: Xugui Zhou (Louisiana State University, USA)

  • RAVAGE: Robotic Autonomous Vehicles’ Attack Generation Engine by Pritam Dash, Karthik Pattabiraman (University of British Columbia)
  • Safety Interventions against Adversarial Patches in an Open-Source Driver Assistance System by Cheng Chen (Louisiana State University), Grant Xiao (University of Virginia), Daehyun Lee, Lishan Yang (George Mason University), Evgenia Smirni (William & Mary), Homa Alemzadeh (University of Virginia), Xugui Zhou (Louisiana State University)
  • Multi-version Machine Learning and Rejuvenation for Resilient Perception in Safety-critical Systems by Qiang Wen (University of Tsukuba), Júlio Mendonça (University of Luxembourg), Fumio Machida (University of Tsukuba), Marcus Völp (University of Luxembourg)
RS12: Network Traffic Security, at Aula Magna (Centro Congressi), 16:00 - 17:30, June 25

Session Chair: Patrick Lee (The Chinese University of Hong Kong, Hong Kong)

  • Secure access to network data for mobile network traffic analysis applications by Djob Mvondo, Yérom-David Bromberg (Univ Rennes, CNRS, INRIA, IRISA)
  • Securing In-Network Traffic Control Systems with P4Auth by Ranjitha K, Medha Rachel Panna, Stavan Nilesh Christian, Karuturi Havya Sree, Sri Hari Malla, Dheekshitha Bheemanath (Indian Institute of Technology Hyderabad), Rinku Shah (Indraprastha Institute of Information Technology Delhi), Praveen Tammana (Indian Institute of Technology Hyderabad)
  • QUIC-Aware Load Balancing: Attacks and Mitigations by Liliana Kistenmacher, Anum Talpur, Mathias Fischer (Universität Hamburg)
RS13: Hardware Security, at Aula A (Centro Congressi), 16:00 - 17:30, June 25

Session Chair: Dan Kim (The University of Queensland, Australia)

  • GREAT: Global Representation and Edge-Attention for Hardware Trojan Detection by Zhengyi Li (Xiangtan University), Wei Cheng (National University of Defense Technology), Huanrong Tang (Xiangtan University), Yaohua Wang (National University of Defense Technology)
  • MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution by Moein Ghaniyoun (The Ohio State University), Kristin Barber (Google), Yinqian Zhang (Southern University of Science and Technology), Radu Teodorescu (The Ohio State University)
  • Revisiting Main Memory-Based Covert and Side Channel Attacks in the Context of Processing-in-Memory by Nisa Bostanci, Konstantinos Kanellopoulos, Ataberk Olgun, Giray Yaglikci, Ismail Emir Yuksel, Nika Mansouri Ghiasi (ETH Zurich); Zülal Bingöl (Bilkent University); Mohammad Sadrosadati, Onur Mutlu (ETH Zurich)
Disrupt 2: Security and Resilience in Emerging Computing Paradigms, at Aula A (Centro Congressi), 11:00 - 12:30, June 25

Session Chair: Andrea Bondavalli (Università degli Studi di Firenze, Italy)

  • Enhancing Accuracy in Approximate Byzantine Agreement with Bayesian Inference by Roy Shadmon, Owen Arden (UC Santa Cruz)
  • UniPHY: Unified Physical Layer Security for LPWANs by Stephane Delbruel (LaBRI - Univ. of Bordeaux, France), Léo Mendiboure, Yannis Formery (Univ. Gustave Eiffel), Joachim Bruneau-Queyreix, Laurent Réveillère (LaBRI - Univ. of Bordeaux)
  • Digital Cluster Circuits for Reliable Datacenters by Davide Rovelli, Patrick Eugster (Università della Svizzera Italiana (USI))
  • Replicating Human Immune System via Harmonic Radar: A Framework and Preliminary Results in Thwarting Cyber-physical Attacks by Nathanaël Denis, Roberto Di Pietro (King Abdullah University of Science and Technology)
Doctoral 1: Autonomous drones and vehicles, at Aula B (Centro Congressi), 14:00 - 15:30, June 25

Session Chair: Sonia Ben Mokhtar, Centre national de la recherche scientifique (CNRS), France

  • AI Agent-based Adaptive Task Offloading for Autonomous Drones in Dynamic Environments by Qingyang Zhang, Fumio Machida (University of Tsukuba)
  • Effect of Human-Selected Hard Examples to Improve Accuracy of Semantic Segmentation by Yuriko Ueda, Marin Wada, Miho Adachi, Ryusuke Miyamoto (Meiji University)
  • Leaving No Blind Spots: Toward Automotive Cybersecurity by Francesco Marchiori, Mauro Conti (University of Padova)
  • Keynote: From Draft to DSN: How to Get Your Paper In by Valerio Schiavoni (Université de Neuchâtel, Switzerland)
Doctoral 2: Cybersecurity and Fault-tolerance, at Aula B (Centro Congressi), 16:00 - 17:30, June 25

Session Chair: Sonia Ben Mokhtar, Centre national de la recherche scientifique (CNRS), France

  • On Predictive Modeling of Multi-Bit Upsets for Emulated Fault Injection by Trishna Rajkumar, Johnny Öberg (KTH Royal Institute of Technology)
  • Towards Provenance for Cybersecurity in Cloud-Native Production Infrastructure by Paul Robert Balthazar Houssel, Sylvie Laniepce (Orange Innovation), Olivier Levillain (Institut Polytechnique de Paris)
  • Strategies to Describe and Timely Detect Attacks by Tommaso Puccetti (Department of Mathematics and Informatics, University of Florence)
  • Enhanced Cybersecurity Monitoring in Multi-Plant Flexible Manufacturing Environments by Antonio Iannaccone, Roberto Nardone (University of Naples "Parthenope")
  • SCAMDETECT: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts by Pasquale De Rosa, Pascal Felber, Valerio Schiavoni (University of Neuchâtel)
Industry 3: Reliability and Safety in Complex Systems, at Aragonese (Royal), 14:00 - 15:30, June 25

Session Chair: Luca Porzio, Micron Technology, Italy

  • Keynote: Increasing memory density, complexity and reliability: sustainable trend at reasonable cost? by Mauro Luigi Sali, Senior Director Micron Technology, Italy
  • Beyond Component Failures: Safety Challenges in Complex Maritime Control Systems by Odd Ivar Haugen, Aleks Karlsen, Steven Mearns Cargill, Jan van Tiggelen (DNV)
  • Integrating Testing with Runtime Verification for Mission-Critical Distributed Control Systems by Davide Ancona, Stefano Avola, Angelo Ferrando, Pierpaolo Baglietto, Maurice ter Beek, Giancarlo Camera, Andrea Parodi, Matteo Pinasco (Various Institutions in Italy and CNR)
  • Large-Scale AI Infra Reliability: Challenges, Strategies, and Llama 3 Training Experience by Xun Jiao, Abhinav Pandey, Karthik Pattabiraman, Fred Lin (Meta Platforms Inc and University of British Columbia)
Industry 4: Anomaly and Fault Detection, at Aragonese (Royal), 16:00 - 17:30, June 25

Session Chair: George Violettas, SYSGO GmbH, Germany

  • Anomaly Detection in Energy Performance Certificates: From Oblivious to Enlightened by Nawel Benarba (INSA Lyon), Mathieu Chevalier (INSA Lyon), Sara Bouchenak (INSA Lyon), Olivier Jung (Kardino), Benjamin Bertin (INSA Lyon)
  • When Features Gets Exploited: Functional Abuse and the Future of Industrial Fraud Prevention by Elisa Chiapponi, Umberto Fontana, Elyssa Boulilla, Claudio Costanza, Vincent Rigal, Olivier Thonnard (Amadeus IT Group and Télécom SudParis)
  • Energy-Efficient Anomaly Detection in Autonomous Vehicles Using RSNNs by Daeho Kim, Eun-Kyu Lee (Incheon National University), Ji-Woo Lee (Korea Automotive Technology Institute)
  • Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice by Larry Huynh, Jake Hesford, Daniel Cheng, Alan Wan (University of Western Australia), Seungho Kim, Hyoungshick Kim (Sungkyunkwan University), Jin Hong (University of Western Australia)
  • Cordial: Cross-row Failure Prediction Method Based on Bank-level Error Locality for HBMs by Wenwei Gu, Jiazhen Gu, Renyi Zhong, Wenyu Zhang, Ming Li (Huawei Hong Kong Research Center), Michael R. Lyu (The Chinese University of Hong Kong)
WDMD 1: Keynote Session 1, at Catalana (Royal), 09:00 - 10:30, June 25

Session Chair: Chengqiang Huang (Huawei Technologies Co., Ltd.)

  • AI for Intelligent Maintenance by Enrico Zio (Politecnico di Milano, Italy)
  • When Spatio-Temporal Data Meet Large Language Models by Yuxuan Liang (Hong Kong University of Science and Technology, Guangzhou)
  • Advancing Decentralized AI: Scalable, Adaptive, and Client-Centric Learning Systems by Ahmed M. A. Sayed (Queen Mary University of London, UK)
WDMD 2: Keynote Session 2, at Catalana (Royal), 11:00 - 12:30, June 25

Session Chair: Chengqiang Huang (Huawei Technologies Co., Ltd.)

  • Reliability challenges and opportunities for AI infra: from industry perspective by Zheng Yang (Huawei Technologies Co., Ltd.)
  • Characterizing Modern GPU Resilience and Impact in HPC Systems: A Case Study of A100 GPUs by Shengkun Cui (University of Illinois Urbana-Champaign, United States), Archit Patke (University of Illinois Urbana-Champaign, United States), Ziheng Chen (University of Illinois Urbana-Champaign, United States), Aditya Ranjan (University of Illinois Urbana-Champaign, United States), Hung Nguyen (University of Illinois Urbana-Champaign, United States), Phuong Cao (University of Illinois Urbana-Champaign, United States), Brett Bode (University of Illinois Urbana-Champaign, United States), Gregory Bauer (University of Illinois Urbana-Champaign, United States), Saurabh Jha (IBM Research, United States), Chandra Narayanaswam (IBM Research, United States), Daby Sow (IBM Research, United States), Catello Di Martino (Nokia Bell Labs, Brazil), Zbigniew T. Kalbarczyk (University of Illinois Urbana-Champaign, United States), Ravishankar K. Iyer (University of Illinois Urbana-Champaign, United States)
  • Panel: How LLM Change the Nature of Reliability Engineering
WDMD 3: Long Presentation Session, at Catalana (Royal), 14:00 - 15:30, June 25

Session Chair: Yuchu Fang (Huawei Technologies Co., Ltd.)

  • Recent Advances in Agentic AI by Yunpu Ma (Ludwig Maximilian University of Munich, Germany)
  • Reinforcement learning for multi-agent with asynchronous missing information fusion method by Jiashan Gao (Beihang University, China)
  • Cultural Reliability of LLMs: Can AI Truly Reflect Global Perspectives? by Yong Cao (University of Tübingen, Germany)
  • Generating Structured Outputs with Language Models: Evaluation and Studies by Saibo Geng (École Polytechnique Fédérale de Lausanne, Switzerland)
  • Understanding and Modeling Human Label Variation in LLM by Beiduo Chen (Ludwig Maximilian University of Munich, Germany)
  • Q&A Slot
  • Posters during coffee-break
WDMD 4: Short Presentation Session, at Catalana (Royal), 16:00 - 17:30, June 25

Session Chair: Zhaojun Hao (Huawei Technologies Co., Ltd.)

  • Optimal energy-efficient scheduling of flexible manufacturing systems based on Petri net simulation and mathematical programming by Mei Chen (Politecnico di Milano, Italy)
  • A knowledge-inspired physics-informed neural network for hydraulic transient simulation of liquid pipelines by Jian Du (China University of Petroleum, China)
  • A human reliability analysis method based on STPA-IDAC and BN-SLIM for driver take-over in Level 3 automated driving by Wenyi Liao (Northwestern Polytechnical University, China)
  • Interpretable wavelet packet kernel-constrained convolutional neural network for bearing fault diagnosis by Sinan Li (Xi'an Jiaotong University, China)
  • Towards uncertainty-aware remaining useful life prediction by Weijun Xu (Politecnico di Milano, Italy)
  • Multimodal explainable few-shot learning for trustworthy PHM operations in the smart manufacturing process by Wujin Deng (Politecnico di Milano, Italy)
  • Research on PHM method based on deep learning technology by Zhiqiang Xu (Politecnico di Milano, Italy)
  • Predictive Maintenance Decision Making for Critical Equipment in Industrial system Based on Remaining Useful Life Estimation by Zongyao Wang (Beijing Jiaotong University, China)
  • Q&A Slot
  • Discussion of Challenging Questions

Thursday, June 26


Award: Rising Star and William Carter, at Aula Magna (Centro Congressi), 09:00 - 09:45, June 26

Session Chair: Domenico Cotroneo, Università degli Studi di Napoli Federico II

  • Rising Star: Baris Kasikci (University of Washington, USA)
  • William Carter: “Enabling Efficient and Scalable DRAM Read Disturbance Mitigation via New Experimental Insights into Modern DRAM Chips” by Abdullah Giray Yağlıkçı (ETH Zurich, Switzerland)
Keynote 3, at Aula Magna (Centro Congressi), 09:45 - 10:30, June 26

Session Chair: Marcello Cinque

  • Unifying Communication, Computation, and Storage from the Cloud to the Microcontroller by Angelo Corsaro, Ph.D., CEO, CTO, and Co-Founder of ZettaScale Technology
RS14: Software Vulnerabilities, at Aula Magna (Centro Congressi), 11:00 - 12:30, June 26

Session Chair: Regina Moraes (Universidade Estadual de Campinas (UNICAMP), Brazil)

  • What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software by Jialiang Dong, Xinzhang Chen (The University of New South Wales); Willy Susilo (University of Wollongong); Nan Sun (The University of New South Wales); Arash Shaghaghi (The University of New South Wales (UNSW Sydney)); Siqi Ma (The University of New South Wales)
  • An Analysis of Malicious Packages in Open-Source Software in the Wild by Xiaoyan Zhou (Beijing JiaoTong University); Ying Zhang, Wenjia Niu, Jiqiang Liu (Beijing Jiaotong University); Haining Wang (Virginia Tech); Qiang Li (Beijing Jiaotong University)
  • Automatically Generating Rules of Malicious Software Packages via Large Language Model by XiangRui Zhang, XueJie Du, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li (Beijing Jiaotong University)
RS15: Web and Application Security, at Aula A (Centro Congressi), 11:00 - 12:30, June 26

Session Chair: Angelos Stavrou (Virginia Tech, USA)

  • Less is More: Boosting Coverage of Web Crawling through Adversarial Multi-Armed Bandit by Lorenzo Cazzaro, Stefano Calzavara, Maksim Kovalkov (Università Ca' Foscari Venezia); Aleksei Stafeev, Giancarlo Pellegrino (CISPA Helmholtz Center for Information Security)
  • A Closer Look At Modern Evasive Phishing Emails by Elyssa Boulila (Amadeus), Marc Dacier (KAUST), Siva Prem Vengadessa Peroumal, Nicolas Veys (Amadeus); Simone Aonzo (EURECOM)
  • SemiAF: Semi-Supervised App Fingerprinting on Unknown Traffic via Graph Neural Network by Xiaodong Lei, Yongjun Wang, Lin Liu, Junjie Huang, Jiangyong Shi, Luming Yang (National University of Defense and Technology)
RS16: Fault Tolerance, at Aula B (Centro Congressi), 11:00 - 12:30, June 26

Session Chair: Fumio Machida (University of Tsukuba, Japan)

  • ReMlX: Resilience for ML Ensembles using XAI at Inference against Faulty Training Data by Abraham Chan, Arpan Gujarati, Karthik Pattabiraman, Sathish Gopalakrishnan (The University of British Columbia)
  • ParaVerser: Harnessing Heterogeneous Parallelism for Affordable Fault Detection in Data Centers by Minli Julie Liao (University of Cambridge); Sam Ainsworth (University of Edinburgh); Lev Mukhanov (Queen Mary University London); Adrian Barredo (Barcelona Supercomputing Center); Markos Kynigos (The University of Manchester); Timothy Jones (University of Cambridge)
  • ReCraft: Self-Contained Split, Merge, and Membership Change of Raft Protocol by Kezhi Xiong (Northeastern University); Soonwon Moon (Inha University); Joshua Kang, Bryant Curto (Northeastern University); Jieung Kim (Yonsei University); Ji-Yong Shin (Northeastern University)
RS17: Binary Analysis, at Aula Magna (Centro Congressi), 14:00 - 15:30, June 26

Session Chair: Jin Hong (The University of Western Australia, Australia)

  • BASSET: Enhancing Binary Code Clone Searching through Multi-Level Hybrid Semantic Indexing by Yong Zhao (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Ang Xia (State Grid Corporation of China Information and Communication Branch); Jie Yin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China); Zhi Wang (Zhongguancun Laboratory, Beijing, China); Yaqin Cao, Xiangyi Zeng, Yuling Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China)
  • A Human Study of Automatically Generated Decompiler Annotations by Yuwei Yang, Skyler Grandel (Vanderbilt University); Jeremy Lacomis, Edward Schwartz, Bogdan Vasilescu, Claire Le Goues (Carnegie Mellon University); Kevin Leach (Vanderbilt University)
  • Detecting Code Vulnerabilities using LLMs by Larry Huynh, Yinghao Zhang, Djimon Jayasundera (The University of Western Australia); Woojin Jeon, Hyoungshick Kim (Sungkyunkwan University); Tingting Bi, Jin B. Hong (The University of Western Australia)
RS18: Containers and Microservices, at Aula A (Centro Congressi), 14:00 - 15:30, June 26

Session Chair: Sibin Mohan (The George Washington University, USA)

  • Zero-Interference Containers: A Framework to Orchestrate Mixed-Criticality Applications by Daniele Ottaviano (Technical University of Munich); Marco Barletta, Francesco Boccola (University of Naples Federico II, Italy)
  • KubeFence: Security Hardening of the Kubernetes Attack Surface by Carmine Cesarano, Roberto Natella (University of Naples Federico II)
  • 5G-STREAM: 5G Service Mesh Tailored for Reliable, Efficient and Authorized Microservices in the Cloud by Tolga Atalay, Alireza Famili, Sudip Maitra (Virginia Tech); Dragoslav Stojadinovic (Kryptowire LLC); Angelos Stavrou, Haining Wang (Virginia Tech)
RS19: Attack Modeling, at Aula B (Centro Congressi), 14:00 - 15:30, June 26

Session Chair: Clay Stevens (Iowa State University, USA)

  • Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks by Nikhilesh Singh (Technische Universität Darmstadt); Chester Rebeiro (IIT Madras)
  • Attack-Defense Trees with Offensive and Defensive Attributes by Danut-Valentin Copae, Reza Soltani, Milan Lopuhaä-Zwakenberg (University of Twente)
  • Towards More Dependable Specifications: An Empirical Study Exploring the Synergy of Traditional and LLM-Based Repair Approaches by Md Rashedul Hasan (University of Nebraska-Lincoln); Mohannad Alhanahnah (Chalmers University of Technology/Gothenburg University); Clay Stevens (Iowa State University); Hamid Bagheri (University of Nebraska-Lincoln)
Industry 5: Security and Privacy in Emerging Technologies, at Aragonese (Royal), 11:00 - 12:30, June 26

Session Chair: Luca Porzio, Micron Technology, Italy

  • To Protect the LLM Agent Against the Prompt Injection Attack with Polymorphic Prompt by Zhilong Wang (The Pennsylvania State University), Neha Nagaraja (Northern Arizona University), Lan Zhang (Northern Arizona University), Peng Liu (The Pennsylvania State University), Pawan Patil (University of Southern California), Hayretdin Bahsi (Northern Arizona University)
  • Security-by-Design at the Telco Edge with OSS: Challenges and Lessons Learned by Carmine Cesarano (Università degli Studi di Napoli Federico II), Alessio Foggia (Università degli Studi di Napoli Federico II), Gianluca Roscigno (System Management S.p.A), Luca Andreani (DigitalPlatforms S.p.A), Roberto Natella (Università degli Studi di Napoli Federico II)
  • Bridging the Safety Gap: A C-ITS Solution for Protecting Vulnerable Road Users with DSRC/C-V2X by Mario Fiorentino (SOUTH ENGINEERING SRL), Michele Caggiano (SOUTH ENGINEERING SRL), Alessandro Magliacane (SOUTH ENGINEERING SRL), Angelo Coppola (Federico II University of Naples Dept. of Civil, Building and Environmental Engineering), Andrea Marchetta (Federico II University of Naples Dept. of Civil, Building and Environmental Engineering)
  • An Open-source Implementation and Security Analysis of Triad’s TEE Trusted Time Protocol by Matthieu Bettinger (LIRIS - INSA Lyon), Sonia Ben Mokhtar (LIRIS CNRS), Anthony Simonet-Boulogne (iExec Blockchain Tech)
  • LLMPrism: Black-box Performance Diagnosis for Production LLM Training Platforms by Zhihan Jiang (The Chinese University of Hong Kong), Rui Ren (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Guangba Yu (The Chinese University of Hong Kong), Yulun Wu (The Chinese University of Hong Kong), Wenwei Gu (The Chinese University of Hong Kong), Yichen Li (The Chinese University of Hong Kong), Yujie Huang (The Chinese University of Hong Kong), Cong Feng (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Zengyin Yang (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Yongqiang Yang (Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd), Michael R. Lyu (The Chinese University of Hong Kong)
Industry 6: System Management and Reliability, at Aragonese (Royal), 14:00 - 15:30, June 26

Session Chair: Jan Micha Borrmann, ExpectedIT GmbH, Germany

  • DDR5 DRAM Faults in the Field by Majed Valad Beigi (Advanced Micro Devices, Inc), Yi Cao (Google), Grace Tsai (Google), Sudhanva Gurumurthi (Advanced Micro Devices, Inc), Vilas Sridharan (Advanced Micro Devices, Inc)
  • KubeChecker: Detecting Configuration Bugs in Container Orchestration by Yilin Sun (Fudan University), Dian Lv (Fudan University), Cheng Cui (Huawei Cloud Computing Technology Co., Ltd), Hui Xu (Fudan University)
  • IAM Role Diet: A Scalable Approach to Detecting RBAC Data Inefficiencies by Roberto Moratore (ING Bank), Eduardo Barbaro (ING Bank & TU Delft), Yury Zhauniarovich (TU Delft)
  • Be My Guest: Welcoming Interoperability into IBC-Incompatible Blockchains by Michał Nazarewicz, Dhruv D. Jain (Inclusive Layer), Miguel Matos (IST Lisbon & INESC-ID), Blas Rodriguez (Inclusive Layer)
FORCE 1: Toward Reliable and Scalable Quantum-Classical Integration, at Catalana (Royal), 09:00 - 10:30, June 26

Session Chair: Edoardo Giusto, University of Naples, Federico II

  • Keynote: Quantum computing and applications at DOE’s SQMS Quantum Research Center by Silvia Zorzetti (SQMS - Fermilab)
  • Assessing the Elephant in the Room in Scheduling for Current Hybrid HPC-QC Clusters by Paolo Viviani (LINKS Foundation), Roberto Rocco (E4 Computer Engineering), Matteo Barbieri (E4 Computer Engineering), Gabriella Bettonte (E4 Computer Engineering), Elisabetta Boella (E4 Computer Engineering), Marco Cipollini (Politecnico di Torino), Jonathan Frassineti (CINECA), Fulvio Ganz (E4 Computer Engineering), Sara Marzella (CINECA), Daniele Ottaviani (CINECA), Simone Rizzo (E4 Computer Engineering), Alberto Scionti (LINKS Foundation), Chiara Vercellino (LINKS Foundation - Politecnico di Torino), Giacomo Vitali (LINKS Foundation - Politecnico di Torino), Olivier Terzo (LINKS Foundation), Bartolomeo Montrucchio (Politecnico di Torino), Daniele Gregori (E4 Computer Engineering)
  • A Typology of Quantum-Classical Faults by Edoardo Giusto (University of Naples, Federico II), Santiago Núñez-Corrales (UIUC), Alessandro Cilardo (University of Naples Federico II), Nicola Mazzocca (University of Naples Federico II), Travis Humble (Oak Ridge National Laboratory)
  • Near-term Application Engineering Challenges in Emerging Superconducting Qudit Processors by Davide Venturelli (SQMS, NASA QuAIL & USRA), Erik Gustafson (SQMS, NASA QuAIL & USRA), Doga Kurkcuoglu (SQMS, Fermilab), Silvia Zorzetti (SQMS, Fermilab)
FORCE 2: Quantum-Enhanced Applications: Learning, Security, and Optimization in Practice, at Catalana (Royal), 11:00 - 12:30, June 26

Session Chair: Edoardo Giusto, University of Naples, Federico II

  • Keynote: Security Challenges in Hybrid Classical-Quantum Computing Systems by Jakub Szefer (Northwestern University)
  • ATTAQ: Adversarial Robustness of Quantum Machine Learning by Francesco Marchiori, Mauro Conti (University of Padova)
  • Supply Chain Malware Detection via Classical and Quantum Kernel Methods in Embedded Systems by Sthefanie Passo, Vishal Kothavade, Jeff Prevost (The University of Texas at San Antonio)
  • AI-Augmented Parameter Initialization for QAOA by Jai Nana, Xinpeng Li, Ning Xie, Shusen Pu, Yifan Yu, Qiang Guan, Xiaotian Han, Shuai Xu, Vipin Chaudhary (Case Western Reserve University, Florida International University, University of West Florida, University of Washington, Kent State University)
  • Quantum Circuit Optimization for Protein Structure Prediction by Xinpeng Li, Vinooth Rao Kulkarni, Jai Nana, Shusen Pu, Ning Xie, Qiang Guan, Ruihao Li, Shulei Zhang, Shuai Xu, Daniel Blankenberg, Vipin Chaudhary (Case Western Reserve University, University of West Florida, Florida International University, Kent State University, Cleveland Clinic)
S2AIM 1, at Catalana (Royal), 14:00 - 15:30, June 26

Session Chair: Davide De Vita (University of Naples Federico II, Italy)

  • Keynote: Advancing Secure & Safe IoT and Edge Computing Platforms: Lessons from LoLiPoP IoT and SuzECK projects by George Violettas (SysGO GmbH)
  • Leveraging Time-Frequency Features For Contact Classification And Regression With A Piezoelectric Tactile Skin For Robotic Fingertips by Nicole Alati, Davide Bargellini, Alex Pasquali, Gianluca Palli, Roberto Meattini (Alma Mater University of Bologna, Italy), Yahya Abbass, Maurizio Valle (University of Genova, Italy)
  • Ransomware Threats in Manufacturing Industry: Patterns based on Dark Web Telegram Groups by Luis de Marcos, Adrián Dominguez Díaz, Carlos Cilleruelo, Daniel Rodriguez (University of Alcalá, Spain)
  • Human-AI interaction implementation in consolidate digital environments through a collaborative and multidisciplinary design approach by Michele Zannoni, Virginia Vignali (Alma Mater University of Bologna, Italy)
S2AIM 2, at Catalana (Royal), 16:00 - 17:30, June 26

Session Chair: Virginia Vignali (Alma Mater University of Bologna, Italy)

  • Orchestration of Sustainable Mixed-Criticality Systems over Heterogenous Edge Nodes by Francesco Boccola, Marcello Cinque, Luigi De Simone, Davide De Vita, Nike Di Giacomo (University of Naples Federico II, Italy)
  • Robot Situation and Task Awareness using Large Language Models and Ontologies by Victor Molina, Oriol Ruiz-Celada, Raul Suarez, Jan Rosell, Isiah Zaplana (Universitat Politècnica de Catalunya - BarcelonaTech, Spain)
  • Experimental Evaluation Of A User-Centered Unilateral Telemanipulation System For Training And Control In Robotic Industrial Scenarios by Mattia Tafuri, Davide Chiaravalli, Mona Saber Gharamaleki, Claudio Melchiorri, Gianluca Palli, Roberto Meattini (Alma Mater University of Bologna, Italy)

Day 1 Floorplan
June 23
June 24
June 25
June 26