IFIP Working Group 10.4
Dependable Computing and Fault Tolerance

72nd Meeting

Longmont, Colorado, USA

June 22-25, 2017

 

Meeting Host

 Sami Saydjari (Cyber Defense Agency, USA)

 


Program-at-a-Glance and Contents

Workshop on Dependable News: Framing the Problem

Workshop 
Coordinator

Hari Ramasamy

 

Introduction

Session 1

Session 2

Session 3

Session 4

Session 5

Session 6

Research Reports

Business Meeting

List of Attendees


Workshop on Dependable News: Framing the Problem

June 22-25, 2017 (Thursday to Sunday)

Introduction

Paulo Verissimo
Meeting Start: Introduction to the meeting and workshop

 


Session 1

8:15 Sami Saydjari, Introduction to the Workshop—Purpose, Goals, Rules

 

8:30 Elizabeth Skewes (University of Colorado, Boulder, US): The Role of the Reporter in a Post-Factual Age

9:15 Sami Saydjari (Cyber Defense Agency, US): Issues in Counter Deception


Session 2

10:30 Saurabh Bagchi (Purdue University, West Lafayette, Indiana, USA): TATHYA: Towards Context Aware Identification of Check-worthy Claims in Political Discussions

11:15 Roy Maxion (Carnegie-Mellon University, Pittsburg, PA, USA): Unreliable Research: Propagation of Unreliable Results


Session 3

16:00 Mei-Ling McNamara (University of Colorado, Boulder, Colorado, USA): Excavating Facts in a Post-Truth Landscape

16:30 Joseph Zipkin (MIT Lincoln Labs, Boston, MA, USA): Fake Media Research at MIT Lincoln Laboratory


Session 4 - Panel

9:00 Philip Koopman (Carnegie Mellon University, Pittsburgh, PA, US), Mootaz Elnozahy (King Abdullah University, Saudi Arabia), Carl Landwehr (George Washington U., Washington, D.C., US), David Taylor (University of Waterloo, Waterloo, Ontario, CA), Cristina Nita-Rotaru (Northeastern University, Boston, IL, US): Conclusions about nature of problem and solution space


Session 5 – Workshop Wrap Up

11:15 Presentations of Summaries by Session Rapporteurs and Discussion

  Session 1 Report/Summary

  Session 2 Report/Summary

  Session 3 Report/Summary

 

Research Reports

Homa Alemzadeh (In collaboration with: Kush Varshney, IBM Research), University of Virginia: Dependable AI Systems

 

Amy Babay, Thomas Tantillo, Trevor Aron, Yair Amir, Johns Hopkins University: Spire: Intrusion-Tolerant SCADA for the Power Grid

Algirdas Avizienis, Vytautas Magnus University, Kaunas, Lithuania :  A Visit to the Jungle of Terminology

 

Amy Babay (John Hopkins University), Emily Wagner (John Hopkins University; LTN Global Communications), Michael Dinitz (John Hopkins University), Yair Amir (John Hopkins University; LTN Global Communications): Timely, Reliable, and Cost-Effective Internet Transport Service using Dissemination Graphs

Somali Chaterji, PhD (Purdue University) The Fault Tolerant Epigenome & its Data Profile

 

Miguel Pupo Correia (Universidade de Lisboa) Detecting Unknown Network Attacks With Flows

 

Zbigniew Kalbarczyk (ECE Illinois) Indirect Cyber Attacks: Case for Targeted Change of Environmental Control to Compromise Large Computing Infrastructure

 

Dong-Seong Kim (University of Canterbury) Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches

 

Jay Lala (Raytheon Company) Scientist’s View of Fake News

 

Ibéria Medeiros (University of Lisboa) Detection of Vulnerabilities broken by Circular Dependencies in Static Analysis

Farid Molazem Tabrizi; Karthik Pattabiraman (University of British Columbia) Formal Security Analysis of Smart Embedded Systems

Evgenia Smirni (College of William and Mary) Powering the Service Responsiveness of Deep Neutral Networks with Queuing Models

Devesh Tiwari (Northeastern University) Useful Fake News

Tomohiro Yoneda; Koutaro Inaba; Masashi Imai (Hirosaki University) A Study on Hardware Trojan Insertion into Asynchronous NoC Router

 

Business Meeting

IFIP Working Group 10.4 business meeting

             

List of Attendees

Names and Contact Information