IC2E/Iotdi 2018 Program
Total Page:16
File Type:pdf, Size:1020Kb
IC2E/IoTDI 2018 Program Room Plaza Int’l Date Time Columbia Columbia Columbia Challenger 40-41 Challenger 38-39 Ballroom G 37 36 34 Level 3 Level 3 Convention Level 3 Level 3 Level 3 Level IC2E Workshop 1 IC2E Workshop 2 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT) (Container) (SocialSens) (IoTSec) Opening remarks Opening remarks 8:30 AM - 8:45 AM 8:30 AM – 8:45 AM Opening: Timothy P Hanratty, Welcome Remarks Keynote 1: “High-Level Keynote: “Container Security” ARL Interoperability in IoT” Salman Baset 8:45 AM – 9:45 AM 8:30 – Damla Turgut, University of IC2E Tutorial 1 8:45 AM - 10:00 AM Keynote: “The Role of 10:00pm Central Florida (Blockchain) Keynote Talk: “Understanding Modeling and Simulation in and Engineering Social IoT Security Research” Signals: A Network- and Data- Prof. David M. Nicol, Driven Perspective” Univeristy of Illinois at Prof. Radu Marculescu, Urbana-Champaign Carnegie Mellon University 9:45 AM – 10:00 AM Q & A Coffee Break IC2E Workshop 1 IC2E Workshop 2 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT: Development (Container) (SocialSens) (IoTSec) Methodologies) Containerizing for Vision Discussions (Session Session I: Attacks and A Metamodel Framework for heterogeneous HPC Chair: Lu Su) Defenses Edge-based Smart applications in the Cloud 10:30 AM - 12 :00 P M 10:30 AM – 10:50 AM Environments Authors: Malik Khan Yuan Gong and Christian Authors: Franco and Anne C. Elster Operating in the New Poellabauer. An Overview of Cicirelli, Giancarlo Fortino, Information Environment: An Vulnerabilities of Voice Antonio Guerrieri, Alessandro Container-based Performance Army Vision of Social Sensing? Controlled Systems Mercuri, Giandomenico Evaluation: A Survey and Authors: Sue Kase and Spezzano and Andrea Vinci Challenges Elizabeth Bowman 10:50 AM – 11:10 AM Authors: Naylor G. Bachiega, Abhinav Mohanty, Islam Micro-intelligence for the IoT: Paulo S. L. Souza, Sarita M. The Future of Deception: Obaidat, Fadi Yilmaz and SE Challenges and Practice in Bruschi and Simone Do R. S. Machine-Generated and Meera Sridhar. Control- LPaaS de Souza Manipulated Images, Video, hijacking Vulnerabilities in IoT Authors:Roberta Calegari, and Audio? Firmware: A Brief Survey Giovanni Ciatto, Stefano Container Memory Allocation Authors: Jonathan Bakdash, Mariani, Enrico Denti Discrepancies: An Char Sample, Monica Rankin, 11:10 AM – 11:30 AM and Andrea Omicini Investigation on Memory Murat Kantarcioglu, Jennifer Daniel Sanchez and Bogdan Utilization Gaps for Holmes, Sue Kase, Erin Copos. Cognitive CoAP-XED: Enabling Relaxed Container-Based Application Zaroukian and Boleslaw Enhancement as an Attack Requests to IoT Sensing Deployments Szymanski Surface Resources Authors: Garrett Lahmann, Authors: Bruno Costa, Paulo Thom McCann and Wes Lloyd. Veracity Enriched Event 11:30 AM – 11:50 AM Pires and Flavia Delicato Extraction Hui Lin. SDN-based In-network Authors: Ning Yu and Graham Honeypot: Preemptively Horwood Disrupt and Mislead Attacks 10:30 – (Globe-IoT: Application IC2E Tutorial 1 in IoT Network 12:00pm Services) (Blockchain) Understanding Multi-stage, Multi-modal, Multimedia 11:50 AM – 12:10 PM SCDIoT: Social Cross-Domain events in Social Media Chen Cao, Le Guan, Peng Liu, IoT enabling Application-to- Authors: Vadim Kagan and Neng Gao, Jingqiang Lin and Application Communications Siva Subrahmanian Ji Xiang. Hey, You, Keep away Authors: Yasir Saleem, Noel from My Device: Remotely Crespi and Pasquale Pace Improving Trustworthiness of Implanting a Virus Expeller to Human Sensing Data via Open Defeat Mirai on IoT Devices Exploiting IoT Data and Smart Data City services for Chronic Authors: Mikkel Kjærgaard, Obstructive Pulmonary Fisayo Caleb Sangogboye, Diseases Risk Factors Anooshmita Das and Jens Monitoring Hjort Schwee Authors: David Sarabia Jacome, Andreu Belsa Design of Scalable IoT Pellicer, Carlos Enrique Palau Platform using Hazard Sensor, Salvador and Manuel Esteve Open and Social Data Domingo Authors: Su-Seong Chai and Dongjun Suh Realizing the full potential of (infra-)structures for inter- agency communication before, during, and after disasters using the example of APAN (All Partners Access Network) Authors: Ly Dinh and Jana Diesner Lunch Buffet (Room: Plaza International Ballroom G) IC2E Workshop 1 IC2E Workshop 3 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT) (Blockchain) (SocialSens) (IoTSec) Keynote 2: “IoT Software Welcome remarks Social Sensing: Technical Session II: Causality, Services Provisioning over Advances, Challenges, and Redaction and Legal Fog-Cloud Systems” (Blockchain: Improving Risks (Session Chair: Sue frameworks Amir Taherkordi Blockchain Technology) Kase) 1:30 PM – 1:50 PM 1:00 PM - 2:00 PM Ioannis Agadakos, Gabriela Supporting Private Data on Ciocarlie, Bogdan Copos, (Globe-IoT: Interoperability) Hyperledger Fabric with Analysis of Driver Behavior in Tancrede Lepoint, Ulf Secure Multiparty Times of Crisis Lindqvist and Michael Flow-based programing Computation. Authors: Manda Winlaw, Locasto. Butterfly Effect: interoperability solution for Authors: Fabrice Alycia Perkins and Allaa R. Causality from Chaos in the IoT Platform Applications Benhamouda, Shai Halevi and Hilal IoT AuthorsAndreu Belsa Tzipora Halevi. Pellicer, David Sarabia Privacy preserving, crowd 1:50 PM – 2:10 PM Jácome, Carlos Enrique Palau Thwarting Unwanted sourced crime Hawkes Soteris Demetriou, Nathaniel Salvador and Manuel Esteve Blockchain Content Insertion. processes D. Kaufman, Jonah Baim, Domingo Authors: Roman Matzutt, Authors: George Mohler Adam J. Goldsher and Carl A. Martin Henze, Jan Henrik Gunter. Toward an Extensible Tuesday, April 2018 17, April Tuesday, Towards a Resource Slice Ziegeldorf, Jens Hiller and Detecting Label Errors in Framework for Redaction Interoperability Hub for IoT Klaus Wehrle. Crowd-Sourced Smartphone Authors: Hong-Linh Truong Sensor Data 2:10 PM – 2:30 PM 1:30 – IC2E Tutorial 2 Authors: Xiao Bo, Christian Sudip Vhaduri and Christian 3:00pm A Methodology for (FECBench) Poellabauer, Megan K. Poellabauer. Implicit Integrating Internet of Things O’brien, Chaithanya Krishna Authentication in Wearables Platforms Mummidisetty and Arun Using Multiple Biometrics Authors: Claudio Jayaraman Savaglio, Giancarlo Fortino, 2:30 PM – 2:50 PM Wilma Russo and Raffaele Leadership of Data Andrew Weyl and George Gravina Annotation Teams Williamson. A Multinational Authors: Ian Mcculloh, James Legal Examination of Burck, Josef Behling, Michael Individual Security Risks Burks and Jonathon Parker Related to the Internet of Things Panel #1: Physics of Information Propagation (Moderator: Tarek Abdelzaher) 2:00 PM - 3:00 PM Vadim Kagan, Sentimetrix Ivan Garibay, University of Central Florida George Mohler, Indiana University Purdue University Indianapolis Mark Orr, Virginia Tech Coffee Break (Challenger Foyer) IC2E Workshop 1 IC2E Workshop 3 IoTDI Workshop 1 IoTDI Workshop 2 (Globe-IoT: Networking) (Blockchain: Applications) (SocialSens) (IoTSec) Time-scheduled Network BlockCIS---A Blockchain-based Social Sensing: Leveraging 3:30 PM – 3:50 PM Evaluation based on Cyber Insurance System. Digital Social Trace Data Giovani Gracioli, Murray Interference Authors: Tancrède Lepoint, (Session Chair: Jana Diesner) Dunne and Sebastian Authors: Tim van der Lee, Karim Eldefrawy and Gabriela 3:30 PM - 4:30 PM Fischmeister. A Comparison of Antonio Liotta and Georgios Ciocarlie. Data Streaming Frameworks Exarchakos Effects of Social Media for Anomaly Detection in A Cloud Data Movement Involvement, Context, and Embedded Systems DYNAMO: Distributed leisure Policy Architecture Based on Data-Type on Opinion Yacht-carried sensor-Network Smart Contracts and the Formation 3:50 PM – 4:00 PM for Atmosphere and Marine Ethereum Blockchain Authors: Derrik Asher, Justine Safa Boudabous, Stephan data crOwdsourcing Authors: Stephen Kirkman Caylor and Alexis Neigel Clémençon, OnsJelassi and applications and Richard Newman. Mariona Caros Roca. A secure Authors: Raffaele Montella, 5 Steps to Make Art Museums IoT architecture for streaming Sokol Kosta and Ian Foster Double-Blind Consent-Driven Tweet Influentially data analysis and anomaly Data Sharing on Blockchain. Authors: Marco Furini, detection Practical criteria for Authors: Kumar Bhaskaran, Federica Mandreoli, Riccardo scheduling CPU-bound jobs in Peter Ilfrich, Praveen Martoglia and Manuela 4:10 PM – 4:30 PM mobile devices at the edge Jayachandran, Apurva Kumar, Montangero Ebelechukwu Nwafor, Andre Authors: Matías Hirsch, Dain Liffman, Fabian Lim, Campbell and Gedare Bloom. Cristian Mateos and Alejandro Karthik Nandakumar, Identification of Landscape Anomaly-based Intrusion Zunino Zhengquan Qin, Venkatraman Preferences by using Social Detection of IoT Device Sensor 3:30 – IC2E Tutorial 2 Ramakrishna, Chun Hui Suen, Media Analysis Data using Provenance 5:00pm (FECBench) Ernie Teo and Christian Authors: Ankit Rai, Barbara Graphs Vecchiola. Minsker, Jana Diesner, Karrie Karahalios and Yicheng Sun 4:30 PM – 4:50 PM Hamed Haddadi, Vassilis Public Health and Social Christophides, Renata Cruz Media: Language Analysis of Teixeira, Kenjiro Cho, Shigeya Vaccine Conversations Suzuki and Adrian Perri g . Authors: Marco Furini and SIOTOME: An Edge-ISP Gabriele Menegoni Collaborative Architecture for IoT Security Panel #2: Internet of Social and Physical Things: 4:50 PM – 5:00 PM Applications and Challenges Concluding Remarks (Moderator: Jana Diesner) 4:30 PM - 5:30 PM Tancrede Le Point, SRI International Ning Yu, LEIDOS Klara Nahrstedt, University of Illiniois at Urbana Champaign Chenyang Lu, Washingon University