Dr. Eric Eide (University of Utah)

Artifact evaluation is now a widespread feature of conferences in many areas of computer science. Many conference communities now have substantial experience with artifact evaluation, and it is time to step back and reflect. What has been accomplished, what is working, what is not, and what are possible next steps to be taken? In this talk I will discuss the practice of artifact evaluation and look forward to ways in which current practices might evolve to be more effective and/or valuable.

Speaker's biography

Dr. Eric Eide is a Research Associate Professor and a Co-director of the Flux Research Group in the School of Computing at the University of Utah in Salt Lake City, Utah, USA. His research focuses on the engineering of trustworthy systems software: this includes activities toward improving the correctness, testing, resilience, and security of systems software, as well as activities toward improving the rigor of experimental computer science. He co-chaired the Artifact Evaluation Committees for the PLDI 2014, PLDI 2015, and OSDI 2020 conferences, and he is the current and inaugural chair of the Artifact Evaluation Board for the Journal of Systems Research. As a Principal Investigator of the SEARCCH project, he is working to establish a novel web portal to improve the discoverability and reuse of experiment artifacts related to cybersecurity.

View More Papers

Interpretable Federated Transformer Log Learning for Cloud Threat Forensics

Gonzalo De La Torre Parra (University of the Incarnate Word, TX, USA), Luis Selvera (Secure AI and Autonomy Lab, The University of Texas at San Antonio, TX, USA), Joseph Khoury (The Cyber Center For Security and Analytics, University of Texas at San Antonio, TX, USA), Hector Irizarry (Raytheon, USA), Elias Bou-Harb (The Cyber Center For…

Read More

Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial...

Wei Jia (School of Cyber Science and Engineering, Huazhong University of Science and Technology), Zhaojun Lu (School of Cyber Science and Engineering, Huazhong University of Science and Technology), Haichun Zhang (Huazhong University of Science and Technology), Zhenglin Liu (Huazhong University of Science and Technology), Jie Wang (Shenzhen Kaiyuan Internet Security Co., Ltd), Gang Qu (University…

Read More

Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks

Chongzhou Fang (University of California, Davis), Han Wang (University of California, Davis), Najmeh Nazari (University of California, Davis), Behnam Omidi (George Mason University), Avesta Sasan (University of California, Davis), Khaled N. Khasawneh (George Mason University), Setareh Rafatirad (University of California, Davis), Houman Homayoun (University of California, Davis)

Read More

Fuzzing: A Tale of Two Cultures

Andreas Zeller (CISPA Helmholtz Center for Information Security)

Read More