• Alberto Compagno

    Cisco Systems, FR

    Talk title: Hybrid Information-Centric Networking: ICN inside the Internet Protocol

    Abstract: In this talk, we present Hybrid-ICN (hICN), a fully-fledged ICN integration inside IP (rather that over/ under/ in place of) that does not trade off any ICN architectural principles. By reusing existing packet formats, hICN brings innovation inside the IP stack, requiring minimal software upgrades and guaranteeing transparent interconnection with existing IP networks.

  • Ankit Gangwal


    Talk title: Software Defined Networks: An Overview

    Abstract: Software Defined Network (SDN) is an emerging networking paradigm that has gained enormous attention from the industry as well as the research community. SDN facilitates flexible network management. Hence, it is being widely adopted for wired, wireless, and mobile networks. Apart from the conventional networking issues, SDN introduces/suffers from new security and privacy issues. This talk aims to provide a comprehensive overview of SDN: from architecture to implementation as well as the research directions in this area of networking.

  • Muhammad Hassan Khan


    Talk title: Vulnerability in Dynamic Adaptive Streaming over Information Centric Networking

    Abstract: The dramatic growth in video demand has motivated content providers (e.g., Netflix and YouTube) to evolve towards Dynamic Adaptive Streaming over HTTP (DASH). The rapid growth of multimedia content presents content providers the problem of rapidly expanding the available bandwidth. Considering the effectiveness of emerging networking paradigms, e.g., Information Centric Networking (ICN), DASH has been recently introduced to ICN as a way of effectively delivering multimedia content over ICN. Although ICN provides implicit features including efficient content distribution and reduced bandwidth requirements, these features cause adaptive multimedia streaming to be more challenging by presenting new security risks.
    In my talk, I will discuss the possible abuse of two fundamental ICN characteristics: in-network caching and interest aggregation. Using these features adversary is able to exploit the adaptive behavior of the DASH streaming control system to degrade the perceived QoE (Quality of Experience) of a benign user. In particular, the talk describes a specific attack that shows the vulnerability in ICN-based multimedia streaming, which forces DASH clients to oscillate with the high frequency and amplitude between various video resolutions.

  • Taeho Lee

    ETH Zurich, CH

    Talk title: Towards an Accountable and Private Internet

    Abstract: Today’s Internet fails to provide either source accountability or privacy; packets cannot be attributed to their source, and communications on the Internet cannot be kept private. Furthermore, even if the Internet can be modified to support the two properties, simultaneously providing both is difficult because they are conflicting. Hence, most future Internet architecture (FIA) proposals have focused on one property at the expense of the other.

  • Enrico Mercadante

    Cisco Systems, IT

    Talk title: TBA

    Abstract: Cybersecurity and Networks are a key foundation of Digital Transformation. Networks that are programmable and that can learn and adapt are fundamental to change the security paradigm in new IOT scenario. In Italy, Cisco has launched an investment program to accelerate Digital Transformation, and part of the key pillars are Skills, Research & Innovation and Cybersecurity. In this talk, we will touch both, the open innovation model that we are using with companies in Italy and the programs dedicated to developers who will program on top of the future networks. Finally, we will discuss the key initiatives on Cybersecurity in Italy in terms of research and the initiatives devoted increase of basic security and networking skills in the country.

  • Chris Pappas

    ETH Zurich, CH

    Talk title: Bootstrapping Transparency for Internet Communication

    Abstract: The simplicity of the Internet architecture comes at the cost of transparency for Internet communication: (i) Receivers cannot explicitly state desired traffic policies for incoming traffic. (ii) Network addresses cannot be trusted enabling attackers to spoof traffic. (iii) The network exposes no information about how traffic is treated and forwarded in the network.
    In our work, we tackle the problem of enhancing transparency for Internet communication. In the first part of the talk, we describe how transparency can help with flooding attacks. Specifically, we design, analyze, and implement two architectures, FAIR and TRIS, that enable receivers to construct verifiable evidence of misbehavior at the Autonomous System (AS) level and the host level correspondingly. Next, we take a closer look at replay attacks, which undermine the accountability guarantees of FAIR and TRIS. To this end, we devise and implement a highly-efficient protocol that can drop replayed packets even at today’s multi-Gbps forwarding rates.
    In the second part of the talk, we argue that increased transparency can help to escape the conundrum of network neutrality. We start by showing that neutrality definitions are problematic and even undesirable. Then, we outline a transparency framework and identify which subproblems have been solved and which remain open.