11:00-11:20 | Opening |
11:20-12:00 | Technical Lecture - Martin Prudek, Miroslav Hanák: Turris:Sentinel - scalable collecting network (big) data in practice |
12:00-12:50 (2x 25) | Session 1 - Network traffic processing & Datasets. Chair: Jan Luxemburk |
Tomáš Beneš, Tomáš Čejka and Hana Kubatová: The next step of P4 FPGA architectures: External Memories | |
Dominik Soukup, Karel Hynek and Tomáš Čejka: QoD: Ideas about Evaluating Quality of Datasets | |
12:50-14:00 | Lunch |
14:00-15:00 | Keynote 1 - SYSGO: Security in internet of (safety-critical) things |
15:00-15:15 | Coffee break |
15:15-16:30 (3x 25) | Session 2 - Design and test it all. Chair: Hana Kubátová |
Paolo Bernardi and Stefano Littardi: A fast computation method for Burn-In related Stress Metrics | |
Jitka Kocnová: EA-based Optimization of Digital Circuits | |
Tomáš Martinec: Testing of safety-critical software | |
16:30-16:45 | Coffee break |
16:45-17:45 | Keynote 2 - Martin Husák: Graph-Based Models in Prediction and Projection of Cyber Attacks |
17:45-18:35 (2x 25) | Session 3 - Network traffic detection and classification. Chair: Tomáš Beneš |
Karel Hynek, Tomáš Čejka and Dmitrii Vekshin: DoH detection: Discovering hidden DNS | |
Matej Hulák and Tomáš Čejka: Classification of Network Traffic using Traffic Features |
11:00-11:10 | Reopening |
11:10-12:00 (2x 25) | Session 4 - To approximate or not to approximate? Chair: Petr Fišer |
Salvatore Barone, Mario Barbareschi, Marcello Traiola, Alberto Bosio, Ian O'Connor and Said Hamdioui: Automatic Generation of Application-level Approximate Variants | |
Marcello Traiola, Jorge Echavarria, Alberto Bosio, Jürgen Teich and Ian O'Connor: Design Space Exploration of an Approximation-Based Fully Reliable TMR Alternative | |
12:00-13:00 | Lunch |
13:00-14:00 | Keynote 3 - Alberto Bosio: Approximate Computing: Test and Reliability issues and opportunities |
14:00-15:00 (3x 20) | Poster session 1 - Chair: Tomáš Kolárik |
Juan Suzano Da Fonseca and Alberto Bosio: HW accelerators for Deep Learning based on FPGA | |
Jan Onderka: Deadline Verification Using Model Checking | |
Vojtěch Nevřela: Programmable Generator of Synchronous Pulse Sequences | |
15:00-15:15 | Coffee break |
15:15-15:55 (2x 20) | Poster session 2 - Chair: Jan Bělohoubek |
Jan Luxemburk and Karel Hynek: Detection of HTTPS brute-force attacks in high-speed computer networks | |
Tomáš Balihar and Martin Novotný: Influence of Synthesis Parameters on Vulnerability to Side-Channel Attacks | |
15:55-16:30 | Coffee break |
16:30-17:00 | Student contest results |
17:00-17:20 | Closing |
11:00-11:20 | Opening |
11:20-12:00 | Technical Lecture - Martin Prudek, Miroslav Hanák: Turris:Sentinel - scalable collecting network (big) data in practice |
12:00-12:50 (2x 25) | Session 1 - Network traffic processing & Datasets. Chair: Jan Luxemburk |
Tomáš Beneš, Tomáš Čejka and Hana Kubatová: The next step of P4 FPGA architectures: External Memories | |
Dominik Soukup, Karel Hynek and Tomáš Čejka: QoD: Ideas about Evaluating Quality of Datasets | |
12:50-14:00 | Lunch |
14:00-15:00 | Keynote 1 - SYSGO: Security in internet of (safety-critical) things |
15:00-15:15 | Coffee break |
15:15-16:30 (3x 25) | Session 2 - Design and test it all. Chair: Hana Kubátová |
Paolo Bernardi and Stefano Littardi: A fast computation method for Burn-In related Stress Metrics | |
Jitka Kocnová: EA-based Optimization of Digital Circuits | |
Tomáš Martinec: Testing of safety-critical software | |
16:30-16:45 | Coffee break |
16:45-17:45 | Keynote 2 - Martin Husák: Graph-Based Models in Prediction and Projection of Cyber Attacks |
17:45-18:35 (2x 25) | Session 3 - Network traffic detection and classification. Chair: Tomáš Beneš |
Karel Hynek, Tomáš Čejka and Dmitrii Vekshin: DoH detection: Discovering hidden DNS | |
Matej Hulák and Tomáš Čejka: Classification of Network Traffic using Traffic Features |
11:00-11:10 | Reopening |
11:10-12:00 (2x 25) | Session 4 - To approximate or not to approximate? Chair: Petr Fišer |
Salvatore Barone, Mario Barbareschi, Marcello Traiola, Alberto Bosio, Ian O'Connor and Said Hamdioui: Automatic Generation of Application-level Approximate Variants | |
Marcello Traiola, Jorge Echavarria, Alberto Bosio, Jürgen Teich and Ian O'Connor: Design Space Exploration of an Approximation-Based Fully Reliable TMR Alternative | |
12:00-13:00 | Lunch |
13:00-14:00 | Keynote 3 - Alberto Bosio: Approximate Computing: Test and Reliability issues and opportunities |
14:00-15:00 (3x 20) | Poster session 1 - Chair: Tomáš Kolárik |
Juan Suzano Da Fonseca and Alberto Bosio: HW accelerators for Deep Learning based on FPGA | |
Jan Onderka: Deadline Verification Using Model Checking | |
Vojtěch Nevřela: Programmable Generator of Synchronous Pulse Sequences | |
15:00-15:15 | Coffee break |
15:15-15:55 (2x 20) | Poster session 2 - Chair: Jan Bělohoubek |
Jan Luxemburk and Karel Hynek: Detection of HTTPS brute-force attacks in high-speed computer networks | |
Tomáš Balihar and Martin Novotný: Influence of Synthesis Parameters on Vulnerability to Side-Channel Attacks | |
15:55-16:30 | Coffee break |
16:30-17:00 | Student contest results |
17:00-17:20 | Closing |