IFIP Working Group 10.4
Dependable Computing and Fault Tolerance

72nd Meeting

Longmont, Colorado, USA

June 22-25, 2017


Meeting Host

 Sami Saydjari (Cyber Defense Agency, USA)


Program-at-a-Glance and Contents

Workshop on Dependable News: Framing the Problem


Hari Ramasamy



Session 1

Session 2

Session 3

Session 4

Session 5

Session 6

Research Reports

Business Meeting

List of Attendees

Workshop on Dependable News: Framing the Problem

June 22-25, 2017 (Thursday to Sunday)


Paulo Verissimo
Meeting Start: Introduction to the meeting and workshop


Session 1

8:15 Sami Saydjari, Introduction to the Workshop—Purpose, Goals, Rules


8:30 Elizabeth Skewes (University of Colorado, Boulder, US): The Role of the Reporter in a Post-Factual Age

9:15 Sami Saydjari (Cyber Defense Agency, US): Issues in Counter Deception

Session 2

10:30 Saurabh Bagchi (Purdue University, West Lafayette, Indiana, USA): TATHYA: Towards Context Aware Identification of Check-worthy Claims in Political Discussions

11:15 Roy Maxion (Carnegie-Mellon University, Pittsburg, PA, USA): Unreliable Research: Propagation of Unreliable Results

Session 3

16:00 Mei-Ling McNamara (University of Colorado, Boulder, Colorado, USA): Excavating Facts in a Post-Truth Landscape

16:30 Joseph Zipkin (MIT Lincoln Labs, Boston, MA, USA): Fake Media Research at MIT Lincoln Laboratory

Session 4 - Panel

9:00 Philip Koopman (Carnegie Mellon University, Pittsburgh, PA, US), Mootaz Elnozahy (King Abdullah University, Saudi Arabia), Carl Landwehr (George Washington U., Washington, D.C., US), David Taylor (University of Waterloo, Waterloo, Ontario, CA), Cristina Nita-Rotaru (Northeastern University, Boston, IL, US): Conclusions about nature of problem and solution space

Session 5 – Workshop Wrap Up

11:15 Presentations of Summaries by Session Rapporteurs and Discussion

  Session 1 Report/Summary

  Session 2 Report/Summary

  Session 3 Report/Summary


Research Reports

Homa Alemzadeh (In collaboration with: Kush Varshney, IBM Research), University of Virginia: Dependable AI Systems


Amy Babay, Thomas Tantillo, Trevor Aron, Yair Amir, Johns Hopkins University: Spire: Intrusion-Tolerant SCADA for the Power Grid

Algirdas Avizienis, Vytautas Magnus University, Kaunas, Lithuania :  A Visit to the Jungle of Terminology


Amy Babay (John Hopkins University), Emily Wagner (John Hopkins University; LTN Global Communications), Michael Dinitz (John Hopkins University), Yair Amir (John Hopkins University; LTN Global Communications): Timely, Reliable, and Cost-Effective Internet Transport Service using Dissemination Graphs

Somali Chaterji, PhD (Purdue University) The Fault Tolerant Epigenome & its Data Profile


Miguel Pupo Correia (Universidade de Lisboa) Detecting Unknown Network Attacks With Flows


Zbigniew Kalbarczyk (ECE Illinois) Indirect Cyber Attacks: Case for Targeted Change of Environmental Control to Compromise Large Computing Infrastructure


Dong-Seong Kim (University of Canterbury) Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches


Jay Lala (Raytheon Company) Scientist’s View of Fake News


Ibéria Medeiros (University of Lisboa) Detection of Vulnerabilities broken by Circular Dependencies in Static Analysis

Farid Molazem Tabrizi; Karthik Pattabiraman (University of British Columbia) Formal Security Analysis of Smart Embedded Systems

Evgenia Smirni (College of William and Mary) Powering the Service Responsiveness of Deep Neutral Networks with Queuing Models

Devesh Tiwari (Northeastern University) Useful Fake News

Tomohiro Yoneda; Koutaro Inaba; Masashi Imai (Hirosaki University) A Study on Hardware Trojan Insertion into Asynchronous NoC Router


Business Meeting

IFIP Working Group 10.4 business meeting


List of Attendees

Names and Contact Information