Program

WEDNESDAY June 19th
08:00 – 09:00 Registration
09:00 – 09:30 NETYS Opening Session
09:30 – 10:30 Keynote Talk 1: (Chair: Mohammed Faouzi Atig)
Suresh Jagannathan, Automated Reasoning for Weak Consistency
10:30 – 11:00 Coffee Break
11:00 – 12:15 Session 1: Verification I (Chair: Paul Attie)
12:15 – 14:00 Lunch
14:00 – 15:00 Keynote Talk 2: (Chair: Alexander A. Schwarzmann)
Marc Shapiro, Living on the edge, safely or: Life without consensus
15:00 – 16:00 Session 2: Distribution I (Chair: Michel Raynal)
16:00 – 16:30 Coffee Break
16:30 – 17:30 Session 3: Security 1 (Chair: Ismail Berrada)
17:30 – 17:50 Invited Talk:
Rachid Guerraoui, How to write a bad research paper
THURSDAY June 20th
08:00 – 09:00 Registration
09:00 – 10:00 Keynote talk 3: (Chair: Ahmed Bouajjani)
Parosh Aziz Abdullah, On Program Verification under the Release-Acquire Semantics
10:00 – 10:30 Coffee Break
10:30 – 12:00 Session 4: Concurrency
12:00 – 14:00 Lunch
14:00 – 15:00 Keynote Talk 4
Dariusz Kowalski, On the complexity of fault-tolerant consensus
15:00 – 16:00 Session 5: Distribution II (Chair: Dariusz Kowalski)
16:00 – 16:30 Coffee Break
16:30 – 17:30 Session 6: Verification II
20:00 Gala Dinner
FRIDAY June 21th
09:00 – 10:00 Keynote talk 5: (Chair: Roland Meyer)
Somesh Jha, Towards Semantic Adversarial Examples
10:00 – 10:30 Coffee Break
10:30 – 12:00 Session 7: Distribution III (Chair: Achour Mostefaoui)
12:00 – 14:00 Lunch
14:00 – 15:50 Keynote Talk 6: (Chair: Constantin Enea)
Paul Attie, How to structure your concurrent program and its verification
15:00 – 16:00 Session 8: Security II (Chair : Yahya Benkaouz)
16:00– 16:30 Coffee Break
16:30 – 17:45 Session 9: Networks
17:45 – 18:00 Closing Session

Details:

Session 1: Verification I

  • - Rachid Zennou, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea and Mohammed Erradi. Checking Causal Consistency of Distributed Databases.
  • - Peter Chini, Roland Meyer and Prakash Saivasan. Liveness in Broadcast Networks.
  • - (Short Paper) Achraf Lyazidi and Salma Mouline. Formal Verification of UML State Machine Diagrams using Petri Nets.

Session 2: Distribution I

  • - Chryssis Georgiou, Robert Gustafsson, Andreas Lindhé and Elad Michael Schiller. Self-stabilization overhead: a case study on coded atomic storage
  • - Chryssis Georgiou and Elad Michael Schiller. Self-Stabilizing Snapshot Objects on Top of Asynchronous Fail-Prone Message-Passing Systems

Session 3: Security I

  • - Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri and Mohamed Rida. An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm
  • - Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz and Mohammed Erradi. Efficient Security Policy Management using Suspicious Rules through Access Log Analysis

Session 4: Concurency

  • - Ved Chaudhary, Chirag Juyal, Sandeep Kulkarni, Sweta Kumari and Sathya Peri. Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems
  • - Emmanuel Godard, Damien Imbs, Michel Raynal and Gadi Taubenfeld. Mutex-based Desanonymization of an Anonymous Read/Write Memory
  • - Sathya Peri, Muktikanta Sa and Nandini Singhal. A Pragmatic Non-blocking Concurrent Directed Acyclic Graph

Session 5: Distribution II

  • - Antoine Durand, Emmanuelle Anceaume and Ludinard Romaric. StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers
  • - Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru and Sara Tucci-Piergiovanni. Dissecting Tendermint

Session 6: Verification II

  • - Yu-Fang Chen, Hsiao-Chen Chung, Wen-Chi Hung, Ming-Hsien Tsai, Bow-Yaw Wang and Farn Wang. Synthesize Models for Quantitative Analysis using Automata Learning
  • - Thibaut Balabonski, Pierre Courtieu, Robin Pelle, Lionel Rieg, Sebastien Tixeuil and Xavier Urbain. Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs

Session 7: Distribution III

  • - Samuel Irving, Sui Chen, Lu Peng, Costas Busch, Maurice Herlihy, Faen Zhang and Chris J Michael. CUDA-DTM: Distributed Transactional Memory for GPU Clusters
  • - Carole Delporte-Gallet, Hugues Fauconnier, Yan Jurski, François Laroussinie and Arnaud Sangnier. Towards synthesis of distribued algorithms with SMT solvers
  • - Prasad Jayanti and Anup Joshi. Recoverable Mutual Exclusion with Abortability

Session 8: Security II

  • - Mohamed Amine Rguibi and Moussa Najem. A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks
  • - (Short Paper) Vidal Attias and Quentin Bramas. How to Choose its Parents in the Tangle
  • - (Short Paper) Meryem Cherkaoui Semmouni, Abderrahmane Nitaj and Mostafa Belkasmi. Bitcoin Security with Post Quantum Cryptography

Session 9: Networks

  • - Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic and Willy Zwaenepoel. The Fake News Vaccine
  • - Quentin Bramas, Toshimitsu Masuzawa and Sebastien Tixeuil. Distributed Online Data Aggregation in Dynamic Graphs
  • - (Short Paper) Jabrane Kachaoui and Abdessamad Belangour. A Multi-Criteria Group Decision Making Method for Big Data Storage Selection
Dates

Extended deadlines

March 09, 2019

Abstract submission deadline

March 16, 2019

Paper submission deadline

April 27, 2019

Acceptance notification

May 24, 2019

Camera ready copy due

Proceedings

SpringerLNCS

Revised selected papers will be published as a post-proceedings in Springer's LNCS "Lecture Notes in Computer Science"

Partners & Sponsors

SponsorsNETYS28