logo

Organizing Committee

Jérôme François
Inria Nancy Grand Est, France

Emmanouil Vasilomanolakis
Aalborg University, Denmark

Hsu-Chun Hsiao
National Taiwan University, Taiwan

Mohamed Faten Zhani
École de Technologie Supérieure, Canada


Steering Committee

Carol Fung
Virginia Commonwealth University, USA

Weverton Cordeiro
UFRGS, Brazil


Program Committee

Carol Fung, Virginia Commonwealth University, USA

Chia-Mu Yu, National Chung Hsing University, China

Christian Hammerschmidt, University of Luxembourg, Luxembourg

Cynthia Wagner, Restena Foundation, Luxembourg

Dongyoon Lee, Virginia Tech, USA

Emmanouil Vasilomanolakis, Aalborg University, Denmark

Gerard Wagener, CIRCL, Luxembourg

Jassim Happa, University of Oxford, UK

Jeferson Campos Nobre, UNISINOS, Brazil

Joerg Daubert, TU Darmstadt, Germany

José Jair Santanna, University of Twente, The Netherlands

Luciano Paschoal Gaspary, UFRGS, Brazil

Minho Park, Soongsil University, Korea

Mohamed Faten Zhani, Ecole de Technologie Superieure, Canada

Rafael Esteves, IFRS, Brazil

Ramin Sadre, Université Catholique de Louvain, Belgium

Ricardo Schmidt, University of Passo Fundo, Brazil

Shankar Karuppayah, Universiti Sains Malaysia, Malaysia

Sudipta Chattopadhyay, Singapore University of Technology and Design, Singapore

Thibault Cholez, LORIA / INRIA Nancy - Grand Est, France


Past Editions

DISSECT 2020 Virtual Event

DISSECT 2019 @ Washington, D.C.

DISSECT 2018 @ Taipei, Taiwan

DISSECT 2017 @ Lisbon, Portugal

DISSECT 2016 @ Istanbul, Turkey

DISSECT 2015 @ Ottawa, Canada

 

IEEE/IFIP DISSECT 2019

5TH IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)

Security for the Next Wave of Cyber and Social Networks

Co-located with IEEE/IFIP IM 2019
Washington D.C., USA

 

Keynote I (back to main page)


Weverton Cordeiro
Professor @ UFRGS, Brazil

Securing Networks in the Programmable Data Plane Era

April 8th, 9:30am - 10:30am

 

Abstract: Recent advances in Software Defined Networking (SDN) have expanded our ability to program the network to its data plane. Through domain specific languages like P4, network operators can quickly deploy new protocols on forwarding devices, customize their functionality, and develop innovative services. This flexibility comes however with a cost: network-wide security and correctness properties (e.g., isolation, reachability, etc.) become much harder to ensure, because network behavior is now determined by a combination of the control plane-driven configuration and the data plane program that resides on devices (also called switches). Existing network verification tools, which rely on a fixed, invariant model of the data plane, are inadequate for programmable data planes. In this talk, we will cover techniques we have been developing in the context of the P4Sec project (funded by the National Science Foundation and the Bazilian Education and Research Network) to verify and enforce security properties in data plane networks. Those verification techniques extend existing verification tools by automatically generating a data plane model from a P4 program. We will also cover on verification tools that integrate with our dynamically-generated models to verify network configuration updates issued by an SDN controller. We will also cover research on novel approaches to ensure that network security properties are satisfied by a network configuration that is based on data plane enforcement. We work to develop an in-line monitor, implemented in the data plane itself, that enforces critical security properties, such as isolation and bandwidth limits, even in the presence of a faulty user data plane program or controller.


Biography: Weverton Cordeiro is an Assistant Professor (since 2017) at the Institute of Informatics (INF) of the Federal University of Rio Grande do Sul (UFRGS). He holds a Ph.D. degree from UFRGS (2014).His research is broadly focused in the field of networking. He is currently interested on the following topics: community networks (how to bridge the digital divide, and design low-end devices for networking in the Amazon region); blockchain (secure transaction verification); software defined networking (measurement and monitoring, security); programmable forwarding planes (programmable switch virtualization, data plane monitoring, verification of forwarding plane software); network function virtualization (placement and chaining of virtual functions). He recently began working with machine learning applied to public health (design of smartphone apps for tracking down mosquitoes) and e-commerce (unveiling users behind shared accounts).


 

Date and Location

Washington D.C., USA, April 8th, 2019

Held co-located with IFIP/IEEE Int'l Symposium on Integrated Network Management (IM)

Venue

DISSECT 2019 will take place at Hilton DoubleTree Hotel - Crystal City, which is located in the vibrant Crystal City neighborhood of Arlington, VA. Further information on workshop venue, accommodation, travel, and more is available on the IM 2019 website http://im2019.ieee-im.org/

Important Dates

Dec. 5, 2018 Jan. 5th, 2018 Paper submission Deadline (EXTENDED)

Jan. 25, 2019 Acceptance Notification

Feb. 15, 2019 Camera-Ready Version Due

Apr. 8, 2019 Workshop Day

Paper Submission

Paper submissions must present original, unpublished research or experiences. Papers under review elsewhere must not be submitted to the workshop. All contributions must be submitted in PDF format via JEMS.

The submission and acceptance of contributions will be subject to a rigorous peer review process to ensure originality, timeliness, relevance, and readability.

Paper Format

All papers must be limited to 6 pages in an IEEE 2-column style and will be subject to a peer-review process.

The accepted papers will be submitted for publication in the IEEE Xplore Digital Library. Papers will be withdrawn from IEEE Xplore in case the authors do not present their paper at the workshop.

Distinguished papers will be invited to extend an extended version for a Special Issue of the Int'l Journal on Network Management (IJNM) on Advanced Security Management.

Poster Info

Papers accepted as posters must be limited to 4 pages in an IEEE 2-column style. The accepted posters will also be submitted for publication in the IEEE Xplore Digital Library. Posters will be withdrawn from IEEE Xplore in case the authors do not present them at the workshop.