Dr. Eric Eide (University of Utah)

Artifact evaluation is now a widespread feature of conferences in many areas of computer science. Many conference communities now have substantial experience with artifact evaluation, and it is time to step back and reflect. What has been accomplished, what is working, what is not, and what are possible next steps to be taken? In this talk I will discuss the practice of artifact evaluation and look forward to ways in which current practices might evolve to be more effective and/or valuable.

Speaker's biography

Dr. Eric Eide is a Research Associate Professor and a Co-director of the Flux Research Group in the School of Computing at the University of Utah in Salt Lake City, Utah, USA. His research focuses on the engineering of trustworthy systems software: this includes activities toward improving the correctness, testing, resilience, and security of systems software, as well as activities toward improving the rigor of experimental computer science. He co-chaired the Artifact Evaluation Committees for the PLDI 2014, PLDI 2015, and OSDI 2020 conferences, and he is the current and inaugural chair of the Artifact Evaluation Board for the Journal of Systems Research. As a Principal Investigator of the SEARCCH project, he is working to establish a novel web portal to improve the discoverability and reuse of experiment artifacts related to cybersecurity.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 42 [1] => 55 ) ) ) [post__not_in] => Array ( [0] => 8410 ) )

Packet-Level Open-World App Fingerprinting on Wireless Traffic

Jianfeng Li (The Hong Kong Polytechnic University), Shuohan Wu (The Hong Kong Polytechnic University), Hao Zhou (The Hong Kong Polytechnic University), Xiapu Luo (The Hong Kong Polytechnic University), Ting Wang (Penn State), Yangyang Liu (The Hong Kong Polytechnic University), Xiaobo Ma (Xi'an Jiaotong University)

Read More

NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus

Ren Zhang (Nervos), Dingwei Zhang (Nervos), Quake Wang (Nervos), Shichen Wu (School of Cyber Science and Technology, Shandong University), Jan Xie (Nervos), Bart Preneel (imec-COSIC, KU Leuven)

Read More

Fuzzing Configurations of Program Options

Zenong Zhang (University of Texas at Dallas), George Klees (University of Maryland), Eric Wang (Poolesville High School), Michael Hicks (University of Maryland), Shiyi Wei (University of Texas at Dallas)

Read More

Chhoyhopper: A Moving Target Defense with IPv6

A S M Rizvi (University of Southern California/Information Sciences Institute) and John Heidemann (University of Southern California/Information Sciences Institute)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)