Accepted Papers

A Dual Digraph Approach for Leaderless Atomic Broadcast

Marius Poke and Colin W. Glass

A Generic Construction for All Parameters in Minimum Storage Regenerating Codes

Liuqing Ye, Dan Feng, Yuchong Hu and Xueliang Wei

A More Consistent Understanding of Consistency

Subhajit Sidhanta, Ricardo Dias and Rodrigo Rodrigues

Anonymous and Confidential File Sharing over Untrusted Clouds

Stefan Contiu, Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber and Laurent Réveillère

Architecture and prototype implementation for process-aware intrusion detection in electrical grids

Robert Flosbach, Justyna Chromik and Anne Remke

Attack-resistant Spanning Tree Construction in Route-Restricted Overlay Networks

Martin Byrenheid, Stefanie Roos and Thorsten Strufe

BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage

Bernardo Ferreira, Bernardo Portela, Tiago Oliveira, Guilherme Borges, Henrique Domingos and João Leitão

Blockchain-based Metadata Protection for Archival Systems

Arnaud L'Hutereau, Dorian Burihabwa, Pascal Felber, Hugues Mercier and Valerio Schiavoni

Bloxy: Providing Transparent and Generic BFT-Based Ordering Services for Blockchains

Signe Rüsch, Rüdiger Kapitza and Kai Bleeke

Challenges and Opportunities for Efficient Serverless Computing at the Edge

Phani K. Gadepalli, Gregor Peach, Ludmila Cherkasova, Rob Aitken, Gabriel Parmer

Combining Learning and Model-Based Reasoning to Reduce Uncertainties in Cloud Security and Compliance Auditing

Uttam Thakore, Rohit Ranchal, Yi-Hsiu Wei, and Harigovind Ramasamy

d’Artagnan: a Trusted NoSQL Database on Untrusted Clouds

Rogério Pontes, Francisco Maia, Nuno Machado and Ricardo Vilaça

DBFT: A Byzantine Fault Tolerant Protocol with Graceful Performance Degradation

Jingjing Zhang, Yingyao Rong, Jiannong Cao, Chunming Rong, Jing Bian and Weigang Wu

Deterministic Fuzzy Checkpoints

Michael Eischer, Markus Büttner and Tobias Distler

Emergent Overlays for Adaptive MANET Broadcast

Raziel Carvajal Gomez, Yérom-David Bromberg, Yehia Elkhatib, Laurent Réveillère and Etienne Rivière

ESCAPe: Elastic Caching For Big Data Systems

Thanasis Priovolos, Stathis Maroulis and Vana Kalogeraki

Exploring Declustered Software RAID for Enhanced Reliability and Recovery Performance in Storage Systems

Zhi Qiao, Song Fu, Hsing-Bung Chen and Bradley Settlemyer

Fault Tolerant High Performance Solver for Linear Equation Systems

Marcello Artioli, Daniela Loreti and Anna Ciampolini

Fulva: Efficient Live Migration for In-memory Key-Value Stores with Zero Downtime

Jiewen Hai, Cheng Wang and Heming Cui

Fuzzing IPC with Knowledge Inference

Kun Yang, Hanqing Zhao, Chao Zhang, Jianwei Zhuge and Haixin Duan

Gyro: A Modular Scale-Out Layer for Single-Server DBMSs

Habib Saissi, Marco Serafini and Neeraj Suri

Improved Fast Rerouting Using Postprocessing

Klaus-Tycho Förster, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid and Gilles Tredan

Lightweight Dynamic Redundancy Control for Server-based Storage

Takayuki Fukatani, Hieu Hanh Le and Haruo Yokota

Making Speculative BFT Resilient with Trusted Monotonic Counters

Lachlan Gunn, Jian Liu, Bruno Vavala and N Asokan

Merkle Search Trees: Efficient State-Based CRDTs in Open Networks

Alex Auvolat and François Taïani

Multilevel Checkpoint/Restart for Large Computational Jobs on Distributed Computing Resources

Masoud Gholami Estahbanati and Florian Schintke

P3LS: Plausible Deniability for Practical Privacy-Preserving Live Streaming

Jérémie Decouchant, Antoine Boutet, Jiangshan Yu and Paulo Esteves-Veríssimo

Preacher: Network Policy Checker for Adversarial Environments

Kashyap Thimmaraju, Liron Schiff and Stefan Schmid

Resilient Wide-Area Byzantine Consensus Using Adaptive Weighted Replication

Christian Berger, Hans P. Reiser, João Sousa and Alysson Bessani

Revisiting Broadcast Algorithms for Wireless Edge Networks

André Rosa, Pedro Ákos Costa and João Leitão

Scalability and resilience in practice: current trends and opportunities

Mark Little and Julien Ponge

Supply Chain Malware Targets SGX: Take Care of What You Sign (Practical Experience Report)

Andrei Mogage, Rafael Pires, Vlad Crăciun, Pascal Felber and Emanuel Onica

THUNDERSTORM: a tool to evaluate dynamic network topologies on distributed systems

Luca Liechti, Paulo Gouveia, João Neves, Peter Kropf, Miguel Matos and Valerio Schiavoni

Toward an in-kernel high performance key-value store implementation

Kahina Lazri, Antoine Blin, Julien Sopena, and Gilles Muller

Trusted Computing meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric

Marcus Brandenburger, Christian Cachin, Rüdiger Kapitza and Alessandro Sorniotti