Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/netys/public_html/wp-content/plugins/better-wp-security/core/class-itsec-lib.php on line 927
Program | NETYS 2022


08:00 – 09:00 Registration
09:00 – 09:30 NETYS Opening Session
09:30 – 10:30 Keynote Talk 1: (Chair: Mohammed Faouzi Atig)
Suresh Jagannathan, Automated Reasoning for Weak Consistency
10:30 – 11:00 Coffee Break
11:00 – 12:15 Session 1: Verification I (Chair: Paul Attie)
12:15 – 14:00 Lunch
14:00 – 15:00 Keynote Talk 2: (Chair: Alexander A. Schwarzmann)
Marc Shapiro, Living on the edge, safely or: Life without consensus
15:00 – 16:00 Session 2: Distribution I (Chair: Michel Raynal)
16:00 – 16:30 Coffee Break
16:30 – 17:30 Session 3: Security 1 (Chair: Ismail Berrada)
17:30 – 17:50 Invited Talk:
Rachid Guerraoui, How to write a bad research paper
THURSDAY June 20th
08:00 – 09:00 Registration
09:00 – 10:00 Keynote talk 3: (Chair: Ahmed Bouajjani)
Parosh Aziz Abdullah, On Program Verification under the Release-Acquire Semantics
10:00 – 10:30 Coffee Break
10:30 – 12:00 Session 4: Concurrency (Chair: Mohamed Faouzi Atig)
12:00 – 14:00 Lunch
14:00 – 15:00 Keynote Talk 4 (Chair:Cezara Dragoi)
Dariusz Kowalski, On the complexity of fault-tolerant consensus
15:00 – 16:00 Session 5: Distribution II (Chair: Dariusz Kowalski)
16:00 – 16:30 Coffee Break
16:30 – 17:30 Session 6: Verification II (Chair: Youssef Iraki)
20:00 Gala Dinner
FRIDAY June 21th
09:00 – 10:00 Keynote talk 5: (Chair: Roland Meyer)
Somesh Jha, Towards Semantic Adversarial Examples
10:00 – 10:30 Coffee Break
10:30 – 12:00 Session 7: Distribution III (Chair: Achour Mostefaoui)
12:00 – 14:00 Lunch
14:00 – 15:50 Keynote Talk 6: (Chair: Constantin Enea)
Paul Attie, How to structure your concurrent program and its verification
15:00 – 16:00 Session 8: Security II (Chair : Yahya Benkaouz)
16:00– 16:30 Coffee Break
16:30 – 17:45 Session 9: Networks (Chair : Abdellah Boulouz)
17:45 – 18:00 Closing Session


Session 1: Verification I

  • – Rachid Zennou, Ranadeep Biswas, Ahmed Bouajjani, Constantin Enea and Mohammed Erradi. Checking Causal Consistency of Distributed Databases.
  • – Peter Chini, Roland Meyer and Prakash Saivasan. Liveness in Broadcast Networks.
  • – (Short Paper) Achraf Lyazidi and Salma Mouline. Formal Verification of UML State Machine Diagrams using Petri Nets.

Session 2: Distribution I

  • – Chryssis Georgiou, Robert Gustafsson, Andreas Lindhé and Elad Michael Schiller. Self-stabilization overhead: a case study on coded atomic storage
  • – Chryssis Georgiou and Elad Michael Schiller. Self-Stabilizing Snapshot Objects on Top of Asynchronous Fail-Prone Message-Passing Systems

Session 3: Security I

  • – Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri and Mohamed Rida. An Efficient network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-Adaptive Heuristic Search Algorithm
  • – Maryem Ait El Hadj, Ahmed Khoumsi, Yahya Benkaouz and Mohammed Erradi. Efficient Security Policy Management using Suspicious Rules through Access Log Analysis

Session 4: Concurency

  • – Ved Chaudhary, Chirag Juyal, Sandeep Kulkarni, Sweta Kumari and Sathya Peri. Achieving Starvation-Freedom in Multi-Version Transactional Memory Systems
  • – Emmanuel Godard, Damien Imbs, Michel Raynal and Gadi Taubenfeld. Mutex-based Desanonymization of an Anonymous Read/Write Memory
  • – Sathya Peri, Muktikanta Sa and Nandini Singhal. A Pragmatic Non-blocking Concurrent Directed Acyclic Graph

Session 5: Distribution II

  • – Antoine Durand, Emmanuelle Anceaume and Ludinard Romaric. StakeCube: Combining Sharding and Proof-of-Stake to build Fork-free Secure Permissionless Distributed Ledgers
  • – Yackolley Amoussou-Guenou, Antonella Del Pozzo, Maria Potop-Butucaru and Sara Tucci-Piergiovanni. Dissecting Tendermint

Session 6: Verification II

  • – Yu-Fang Chen, Hsiao-Chen Chung, Wen-Chi Hung, Ming-Hsien Tsai, Bow-Yaw Wang and Farn Wang. Synthesize Models for Quantitative Analysis using Automata Learning
  • – Thibaut Balabonski, Pierre Courtieu, Robin Pelle, Lionel Rieg, Sebastien Tixeuil and Xavier Urbain. Continuous vs. Discrete Asynchronous Moves: a Certified Approach for Mobile Robots on Graphs

Session 7: Distribution III

  • – Samuel Irving, Sui Chen, Lu Peng, Costas Busch, Maurice Herlihy, Faen Zhang and Chris J Michael. CUDA-DTM: Distributed Transactional Memory for GPU Clusters
  • – Carole Delporte-Gallet, Hugues Fauconnier, Yan Jurski, François Laroussinie and Arnaud Sangnier. Towards synthesis of distribued algorithms with SMT solvers
  • – Prasad Jayanti and Anup Joshi. Recoverable Mutual Exclusion with Abortability

Session 8: Security II

  • – Mohamed Amine Rguibi and Moussa Najem. A Vaccination Game for Mitigation Active Worms Propagation in P2P Networks
  • (Short Paper) Vidal Attias and Quentin Bramas. How to Choose its Parents in the Tangle
  • – (Short Paper) Meryem Cherkaoui Semmouni, Abderrahmane Nitaj and Mostafa Belkasmi. Bitcoin Security with Post Quantum Cryptography

Session 9: Networks

  • – Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic and Willy Zwaenepoel. The Fake News Vaccine
  • – Quentin Bramas, Toshimitsu Masuzawa and Sebastien Tixeuil. Distributed Online Data Aggregation in Dynamic Graphs
  • (Short Paper) Jabrane Kachaoui and Abdessamad Belangour. A Multi-Criteria Group Decision Making Method for Big Data Storage Selection

All deadlines are at 23:59 AoE

March 5th, 2022, March 19th, 2022

Abstract submission deadline

March 12th, 2022, March 26th, 2022

Paper submission deadline

May 4th, 2022, May 7th, 2022

Accept/Reject notification

May 10th, 2022, May 14th, 2022

Camera ready copy due

May 17th-19th, 2022



Revised selected papers will be published as a post-proceedings in Springer's LNCS "Lecture Notes in Computer Science"

Partners & Sponsors