Invited Talks

Darko Stefanovic

Friday, December 12, 2014

Darko Stefanovic, Associate Professor, University of New Mexico, USA

Playing robotics with DNA

Abstract: Can we build molecular-scale devices that are justly called robots? A macroscopic robot has a large source of determinis...


Roberto Giacobazzi

Tuesday, December 9, 2014

Roberto Giacobazzi, Faculty (visiting), IMDEA Software Institute

Obscuring code - Unveiling and Veiling Information in Programs

Abstract: The talk concerns the design of code protecting transformations for white-box cryptography in a MATE (Man-At-The-End) at...


Abstract: Doodle (www.doodle.com) is the worldwide leader when it comes to online consensus-based scheduling. The service reaches ...


Dimitrios Vytiniotis

Friday, October 17, 2014

Dimitrios Vytiniotis, Researcher, Microsoft Research, Cambridge, United Kingdom

Ziria: wireless programming for hardware dummies

Abstract: Software-defined radio (SDR) brings the flexibility of software to the domain of wireless protocol design, promising bot...


Amir Ben-Amram

Thursday, October 2, 2014

Amir Ben-Amram, Professor, Tel Aviv-Yaffo Academic College

What is decidable in growth-rate analysis of programs?

Abstract: Growth-rate analysis is the problem of finding, for a program in a suitable programming language, how fast the computed ...


Hongseok Yang

Tuesday, September 16, 2014

Hongseok Yang, Professor, University of Oxford, United Kingdom

How to find a good program abstraction automatically?

Abstract: Recent years have seen the development of successful commercial programming tools based on static analysis technologies,...


Jan Midtgaard

Thursday, September 11, 2014

Jan Midtgaard, Post-doctoral Researcher, Aarhus University, Denmark

QuickChecking Static Analysis Properties

Abstract: A static analysis can check programs for potential errors. A natural question that arises is therefore: who checks the c...


Mihir Bellare

Wednesday, July 30, 2014

Mihir Bellare, Professor, UC San Diego

Caught between Theory and Practice

Abstract: This talk explores the culture and motivations of the cryptographic research community. I examine the tension between th...


Somesh Jha

Monday, July 21, 2014

Somesh Jha, Professor, University of Wisconsin, USA

Retrofitting Legacy Code for Security

Abstract: Writing a complex but secure program is a near-impossible task for a conventional operating system. If an attacker compr...


Jim Kapinski

Tuesday, July 15, 2014

Jim Kapinski, Senior Research Engineer, Toyota Technical Center, Los Angeles, USA

Simulation-Guided Analysis for Industrial Embedded Control Designs

Abstract: Model-based development (MBD) is a popular technique for performing embedded control system design for cyber-physical sy...


Deepak Kapur

Monday, July 14, 2014

Deepak Kapur, Research Professor, University of New Mexico, USA

A Quantifier-Elimination Heuristic for Octagonal Constraints

Abstract: Octagonal constraints expressing weakly relational numerical properties of the form (l ≤ ± x ± y ≤ h) have been found us...


Abstract: In this talk Colin will give a brief introduction to Clojure, a JVM-based programming language from the Lisp family, as ...


June Andronick

Monday, June 23, 2014

June Andronick, Senior Research Engineer, NICTA, Australia

Formal proof of security for million-lines-of-code systems

Abstract: Our vision to verify the security of large and complex systems is to: (i) design the system as a componentised, kernel-b...


June Andronick

Wednesday, June 18, 2014

June Andronick, Senior Research Engineer, NICTA, Australia

Trustworthy Systems at NICTA

Abstract: In this talk, I will give an overview of the various current activities within NICTA’s Trustworthy Systems team. B...


Alessandra Gorla

Monday, April 28, 2014

Alessandra Gorla, Post-doctoral Researcher, Saarland University, Germany

Improving the reliability of software systems using their intrinsic redundancy

Abstract: Software is often redundant, in the sense that some operations are designed to behave like others but their executions d...


Giordano Tamburrelli

Friday, March 21, 2014

Giordano Tamburrelli, PhD Student, Università della Svizzera Italiana, Lugano, Switzerland

Models at run-time: open challenges and existing solutions

Abstract: Research on model-driven engineering has mainly focused on the use of models during software development. This work has ...


Hazem Torfah

Wednesday, March 12, 2014

Hazem Torfah, PhD Student, Saarland University, Germany

Counting Models of Linear-time Temporal Logic

Abstract: We investigate the model counting problem for safety speci- fications expressed in linear-time temporal logic (LTL). Mode...


Domenico Bianculli

Tuesday, March 11, 2014

Domenico Bianculli, Researcher, Università della Svizzera Italiana, Lugano, Switzerland

A Journey through Specification and Verification Techniques for Open-World Software

Abstract: Open-world software systems are built by composing heterogeneous, third-party components, whose behavior and interaction...


Abstract: Software surrounds us and drives our lives: most modern systems heavily rely on software. Managing the complexity of the...


Chris Parnin

Monday, February 24, 2014

Chris Parnin, PhD Student, Georgia Institute of Technology, USA

Programmer, Interrupted

Abstract: Despite its vast capacity and associative powers, the human brain does not deal well with interruptions. Particularly in...


Abstract: Formal verification of concurrent and reactive systems is necessary for many modern critical applications. The Timed Con...


Giovanni Bernardi

Tuesday, January 14, 2014

Giovanni Bernardi, Research Fellow, Trinity College, Dublin, Ireland

Using higher-order contracts to model session types

Abstract: Session types are used to describe and structure interactions between independent processes in distributed systems. High...


Abstract: In this talk we explore the suitability of Bayesian Inference techniques, specifically Markov Chain Monte Carlo methods,...