Monday, November 16, 2015

08:15 - 09:30Breakfast
09:30 - 09:45Introductions
09:45 - 10:30Session 1 (Chair: Keith Winstein)
Can Censorship Measurements Be Safe(r)?
Ben Jones (Princeton University), Nick Feamster (Princeton University)
A Case for Marrying Censorship Measurements with Circumvention
Aqib Nisar (LUMS), Aqsa Kashaf (LUMS), Zartash Afzal Uzmi (LUMS), Ihsan Ayyub Qazi (LUMS)
10:30 - 11:00Coffee Break
11:00 - 12:00Session 2 (Chair: Nick Feamster)
Web Identity Translator: Behavioral Advertising and Identity Privacy with WIT
Fotios Papaodyssefs (KTH Royal Institute of Technology), Costas Iordanou (Telefonica Research, Universidad Carlos III de Madrid), Jeremy Blackburn (Telefonica Research), Nikolaos Laoutaris (Telefonica Research), Konstantina Papagiannaki (Telefonica Research)
Do You Know Where Your Headers Are? Comparing the Privacy of Network Architectures with Share Count Analysis
David Naylor (Carnegie Mellon University), Peter Steenkiste (Carnegie Mellon University)
Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things
Tianlong Yu (Computer Science Department, Carnegie Mellon University), Vyas Sekar (Electrical and Computer Engineering, Carnegie Mellon University), Srinivasan Seshan (Computer Science Department, Carnegie Mellon University), Yuvraj Agarwal (Institute for Software Research, Carnegie Mellon University), Chenren Xu (School of Electronics Engineering and Computer Science, Peking University)
12:00 - 13:00Lunch
13:00 - 13:45Session 3 (Chair: George Porter)
High Speed Networks Need Proactive Congestion Control
Lavanya Jose (Stanford University), Lisa Yan (Stanford University), Mohammad Alizadeh (MIT CSAIL), George Varghese (Microsoft Research), Nick McKeown (Stanford University), Sachin Katti (Stanford University)
Taking an AXE to L2 Spanning Trees
James McCauley (UC Berkeley / ICSI), Alice Sheng (UC Berkeley), Ethan Jackson (UC Berkeley / VMware), Barath Raghavan (ICSI), Sylvia Ratnasamy (UC Berkeley), Scott Shenker (UC Berkeley / ICSI)
13:45 - 14:30Session 4 (Chair: Nate Foster)
Towards Programmable Packet Scheduling
Anirudh Sivaraman (Massachusetts Institute of Technology), Suvinay Subramanian (Massachusetts Institute of Technology), Anurag Agrawal (Barefoot Networks), Sharad Chole (Cisco), Shang-Tse Chuang (Cisco), Tom Edsall (Cisco), Mohammad Alizadeh (Massachusetts Institute of Technology), Sachin Katti (Stanford University), Nick McKeown (Stanford University), Hari Balakrishnan (Massachusetts Institute of Technology)
Universal Packet Scheduling
Radhika Mittal (UC Berkeley), Rachit Agarwal (UC Berkeley), Sylvia Ratnasamy (UC Berkeley), Scott Shenker (UC Berkeley, ICSI)
14:30 - 15:00Coffee Break
15:00 - 15:45Session 5 (Chair: Kevin Fall)
One Hop for RPKI, One Giant Leap for BGP Security
Avichai Cohen (Hebrew University), Yossi Gilad (Hebrew University), Amir Herzberg (Bar Ilan University), Michael Schapira (Hebrew University)
RiPKI: The Tragic Story of RPKI Deployment in the Web Ecosystem
Matthias Wählisch (Freie Universität Berlin), Robert Schmidt (Freie Universität Berlin), Thomas C. Schmidt (HAW Hamburg), Olaf Maennel (Tallinn U. of Technology), Steve Uhlig (Queen Mary, U. of London), Gareth Tyson (Queen Mary, U. of London)
15:45 - 16:30Session 6 (Chair: Kevin Fall)
Bootstrapping Evolvability for Inter-Domain Routing
Raja R. Sambasivan (Carnegie Mellon University), David Tran-Lam (University of Wisconsin--Madison), Aditya Akella (University of Wisconsin--Madison), Peter Steenkiste (Carnegie Mellon University)
Why didn't my (great!) protocol get adopted?
Mehdi Nikkhah (University of Pennsylvania), Constantine Dovrolis (Georgia Institute of Technology), Roch Guerin (Washington University in St. Louis)
16:30 - 17:30Panel: Three Voices of Industry (Nathan Bronson (Facebook), Jon Peterson (Neustar, Inc), Jeff Mogul (Google))
18:00 - 22:00Reception (Penn Museum)

Tuesday, November 17, 2015

07:45 - 09:00Breakfast
09:00 - 09:45Session 7 (Chair: Phil Levis)
Destroying networks for fun (and profit)
Nick Shelly (Forward Networks / ETH Zurich), Brendan Tschaen (Duke), Klaus-Tycho Foerster (ETH Zurich), Michael Chang (Princeton University), Theophilus Benson (Duke University), Laurent Vanbever (ETH Zurich)
A First Step Towards Leveraging Commodity Trusted Execution Environments for Network Applications
Seongmin Kim (KAIST), Youjung Shin (), Jaehyung Ha (), Taesoo Kim (Georgia Institute of Technology), Dongsu Han (KAIST)
09:45 - 10:30Session 8 (Chair: Mohammed Alizadeh)
Xpander: Unveiling the Secrets of High-Performance Datacenters
Asaf Valadarsky (Hebrew University of Jerusalem), Micheal Dinitz (Johns Hopkins University), Michael Schapira (Hebrew University of Jerusalem)
Micro Load Balancing in Data Centers with DRILL
Soudeh Ghorbani (UIUC), Brighten Godfrey (UIUC), Yashar Ganjali (University of Toronto), Amin Firoozshahian (Hicamp Systems Inc.)
10:30 - 11:00Coffee Break
11:00 - 11:45Session 9 (Chair: Boon Thau Loo)
Time's Forgotten: Using NTP to understand Internet Latency
Ramakrishnan Durairajan (University of Wisconsin - Madison), Sathiya Kumaran Mani (University of Wisconsin - Madison), Joel Sommers (Colgate University), Paul Barford (University of Wisconsin - Madison and comScore, Inc.)
Leveraging the Power of Cloud for Reliable Wide Area Communication
Osama Haq (Tufts University), Fahad R. Dogar (Tufts University)
11:45 - 12:45Lunch
12:45 - 13:45Session 10 (Chair: Te-Yuan Huang)
Re-evaluating Measurement Algorithms in Software
Omid Alipourfard (University of Southern California), Masoud Moshref (University of Southern California), Minlan Yu (University of Southern California)
Enabling a RISC Approach for Software-Defined Monitoring using Universal Streaming
Zaoxing Liu (Johns Hopkins University), Greg Vorsanger (Johns Hopkins University), Vladimir Braverman (Johns Hopkins University), Vyas Sekar (Carnegie Mellon University)
Transparency Instead of Neutrality
Christos Pappas (ETH Zurich), Katerina Argyraki (EPFL), Stefan Bechtold (ETH Zurich), Adrian Perrig (ETH Zurich)
13:45 - 14:15Coffee Break
14:15 - 15:00Session 11 (Chair: Kyle Jamieson)
SpaceHub: a smart relay system for smart home
Meng Meng (Microsoft Research Asia and Xi'an Jiaotong University), Lizhao You (Microsoft Research Asia and The Chinese University of Hong Kong), Kun Tan (Microsoft Research Asia), Jiansong Zhang (Microsoft Research Asia), Wenjie Wang (Xi'an Jiaotong University)
Room-Area Networks
Peter A Iannucci (MIT), Ravi A Netravali (MIT), Ameesh K Goyal (MIT), Hari Balakrishnan (MIT)
15:00 - 15:45Session 12 (Chair: Vyas Sekar)
Differential Provenance: Better Network Diagnostics with Reference Events
Ang Chen (University of Pennsylvania), Yang Wu (University of Pennsylvania), Andreas Haeberlen (University of Pennsylvania), Wenchao Zhou (Georgetown University), Boon Thau Loo (University of Pennsylvania)
Automated Network Repair with Meta Provenance
Yang Wu (University of Pennsylvania), Ang Chen (University of Pennsylvania), Andreas Haeberlen (University of Pennsylvania), Wenchao Zhou (Georgetown University), Boon Thau Loo (University of Pennsylvania)

Anti-Harassment Policy

The open exchange of ideas and the freedom of thought and expression are central to ACM’s aims and goals. These require an environment that recognizes the inherent worth of every person and group, that fosters dignity, understanding, and mutual respect, and that embraces diversity. For these reasons, ACM is dedicated to providing a harassment-free experience for participants at our events and in our programs.

Harassment is unwelcome or hostile behavior, including speech that intimidates, creates discomfort, or interferes with a person's participation or opportunity for participation, in a conference, event or program. Harassment in any form, including but not limited to harassment based on alienage or citizenship, age, color, creed, disability, marital status, military status, national origin, pregnancy, childbirth- and pregnancy-related medical conditions, race, religion, sex, gender, veteran status, sexual orientation or any other status protected by laws in which the conference or program is being held, will not be tolerated. Harassment includes the use of abusive or degrading language, intimidation, stalking, harassing photography or recording, inappropriate physical contact, sexual imagery and unwelcome sexual attention. A response that the participant was “just joking,” or “teasing,” or being “playful,” will not be accepted.

Individuals violating these standards may be sanctioned or excluded from further participation at the discretion of the organizers or responsible committee.

If you believe you have been harassed or notice that someone else is being harassed, or have any other concerns, you are encouraged to report the incident in confidence to either of the conference General Chairs (Jaudelice de Oliveira and Jonathan M. Smith), the SIGCOMM Chair (S. Keshav), or to the SIGCOMM Vice-Chair (Renata Teixeira).