Accepted Papers

TitleAuthors
Argus: A Fully Transparent Incentive System for Anti-Piracy CampaignsXian Zhang, Xiaobing Guo, Zixuan Zeng, Wenyan Liu, Zhongxin Guo, Yang Chen, Shuo Chen, Qiufeng Yin, Mao Yang and Lidong Zhou
What Distributed Systems Say: A Study of Seven Spark Application LogsSina Gholamian and Paul A. S. Ward
Muesli+: Practical Geographically Scalable and Highly Available ServicesPaulo Coelho and Fernando Pedone
Node-level indicators of soft faults in wireless sensor networksDominik Widhalm, Karl M. Goeschka and Wolfgang Kastner
Building oblivious search from the ground upRogério Pontes, Manual Barbosa, Bernardo Portela and Ricardo Vilaça
Parameterized Distributed Synthesis of Fault-Tolerance Using Counter AbstractionHadi Moloodi, Fathiyeh Faghih and Borzoo Bonakdarpour
The design, architecture and performance of the Tendermint Blockchain NetworkDaniel Cason, Enrique Fynn, Nenad Milosevic, Zarko Milosevic, Ethan Buchman and Fernando Pedone
Automated Intelligent Healing in Cloud-Scale Data CentersRui Li, Zhinan Cheng, Patrick P. C. Lee, Pinghui Wang, Yi Qiang, Lin Lan, Cheng He, Jinlong Lu, Mian Wang and Xinquan Ding
Threat Adaptive Byzantine Fault Tolerant State-Machine ReplicationDouglas Simões Silva, Rafal Graczyk, Jérémie Decouchant, Marcus Völp and Paulo Esteves-Verissimo
A Secure Access and Accountability Framework for Provisioning Services in Named Data NetworksNazatul Haque Sultan, Vijay Varadharajan, Chandan Kumar, Seyit Camtepe and Surya Nepal
Sliding Window CRDT SketchesDolev Adas and Roy Friedman
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse FlowsSimon Scherrer, Che-Yu Wu, Yu-Hsi Chiang, Benjamin Rothenberger, Daniele Asoni, Arish Sateesan, Jo Vliegen, Nele Mentens, Hsu-Chun Hsiao and Adrian Perrig
Characterizing the Impact of Network Delay on Bitcoin MiningTong Cao, Jérémie Decouchant, Jiangshan Yu and Paulo Verissimo
Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEsChrysoula Stathakopoulou, Signe Rüsch, Marcus Brandenburger and Marko Vukolic
2PPS – Publish/Subscribe with Provable PrivacySarah Abdelwahab Gaballah, Christoph Coijanovic, Thorsten Strufe and Max Mühlhäuser
Enabling Low-Redundancy Proactive Fault Tolerance for Stream Machine Learning via Erasure CodingZhinan Cheng, Lu Tang, Qun Huang and Patrick P. C. Lee
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial TrajectoryTong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Li Gang and Qi Alfred Chen
FIFO and Atomic broadcast algorithms with bounded message size for dynamic systemsColette Johnen, Luciana Arantes and Pierre Sens
WAFFLE: Watermarking in Federated LearningBuse Gul Atli Tekgul, Yuxi Xia, Samuel Marchal and N. Asokan
How to Trust Strangers: Composition of Byzantine Quorum SystemsOrestis Alpos, Christian Cachin and Luca Zanolini
Making Reads in BFT State Machine Replication Fast, Linearizable, and LiveChristian Berger, Hans P. Reiser and Alysson Bessani
A Comprehensive Measurement-based Investigation of DNS HijackingRebekah Houser, Shuai Hao, Zhou Li, Daiping Liu, Chase Cotton and Haining Wang
DragonFly: Drone-Assisted High-Rise Monitoring for Fire SafetyFangqi Liu, Tzu-Yi Fan, Casey Grant, Cheng-Hsin Hsu and Nalini Venkatasubramanian
Vassago: Efficient and Authenticated Provenance Query on Multiple BlockchainsRui Han, Jiang Xiao, Xiaohai Dai, Shijie Zhang, Yi Sun, Baochun Li and Hai Jin
BROFY: Towards Essential Integrity Protection for MicroservicesArdhi Putra Pratama Hartono and Christof Fetzer
Active replication for latency-sensitive stream processing in Apache FlinkGuillaume Rosinosky, Florian Schmidt, Oleh Bodunov, Christof Fetzer, André Martin and Etienne Rivière
Detecting Malicious Gradients from Asynchronous Distributed SGD on Variational AutoencoderZhipin Gu and Yuexiang Yang
Chaos Duck: a Tool for Automatic IoT Software Fault-Tolerance AnalysisIgor Zavalyshyn, Thomas Given-Wilson, Axel Legay, Ramin Sadre and Etienne Riviere
Scrooge Attack: Undervolting ARM Processors for ProfitChristian Göttel, Konstantinos Parasyris, Pascal Felber, Marcelo Pasin, Valerio Schiavoni and Osman Unsal
Failure Recovery from Persistent Memory in Paxos-based State Machine ReplicationJan Kończak and Paweł T. Wojciechowski
MinervaFS: A User-Space File System for Generalised DeduplicationLars Nielsen, Dorian Burihabwa, Valerio Schiavoni, Daniel E Lucani and Pascal Felber