Dr. Eric Eide (University of Utah)

Artifact evaluation is now a widespread feature of conferences in many areas of computer science. Many conference communities now have substantial experience with artifact evaluation, and it is time to step back and reflect. What has been accomplished, what is working, what is not, and what are possible next steps to be taken? In this talk I will discuss the practice of artifact evaluation and look forward to ways in which current practices might evolve to be more effective and/or valuable.

Speaker's biography

Dr. Eric Eide is a Research Associate Professor and a Co-director of the Flux Research Group in the School of Computing at the University of Utah in Salt Lake City, Utah, USA. His research focuses on the engineering of trustworthy systems software: this includes activities toward improving the correctness, testing, resilience, and security of systems software, as well as activities toward improving the rigor of experimental computer science. He co-chaired the Artifact Evaluation Committees for the PLDI 2014, PLDI 2015, and OSDI 2020 conferences, and he is the current and inaugural chair of the Artifact Evaluation Board for the Journal of Systems Research. As a Principal Investigator of the SEARCCH project, he is working to establish a novel web portal to improve the discoverability and reuse of experiment artifacts related to cybersecurity.

View More Papers

Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial...

Wei Jia (School of Cyber Science and Engineering, Huazhong University of Science and Technology), Zhaojun Lu (School of Cyber Science and Engineering, Huazhong University of Science and Technology), Haichun Zhang (Huazhong University of Science and Technology), Zhenglin Liu (Huazhong University of Science and Technology), Jie Wang (Shenzhen Kaiyuan Internet Security Co., Ltd), Gang Qu (University…

Read More

Forensic Analysis of Configuration-based Attacks

Muhammad Adil Inam (University of Illinois at Urbana-Champaign), Wajih Ul Hassan (University of Illinois at Urbana-Champaign), Ali Ahad (University of Virginia), Adam Bates (University of Illinois at Urbana-Champaign), Rashid Tahir (University of Prince Mugrin), Tianyin Xu (University of Illinois at Urbana-Champaign), Fareed Zaffar (LUMS)

Read More

Phishing awareness and education – When to best remind?

Benjamin Maximilian Berens (SECUSO, Karlsruhe Institute of Technology), Katerina Dimitrova, Mattia Mossano (SECUSO, Karlsruhe Institute of Technology), Melanie Volkamer (SECUSO, Karlsruhe Institute of Technology)

Read More

ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions...

Azadeh Tabiban (CIISE, Concordia University, Montreal, QC, Canada), Heyang Zhao (CIISE, Concordia University, Montreal, QC, Canada), Yosr Jarraya (Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada), Makan Pourzandi (Ericsson Security Research, Ericsson Canada, Montreal, QC, Canada), Mengyuan Zhang (Department of Computing, The Hong Kong Polytechnic University, China), Lingyu Wang (CIISE, Concordia University, Montreal, QC, Canada)

Read More