Invited Talks

Emanuele D'Osualdo

Thursday, December 15, 2016

Emanuele D'Osualdo, Post-doctoral Researcher, TU Kaiserslautern, Germany

Automatic Analysis of Message Passing Concurrency

Abstract: In this talk I will give an overview of my current research. The focus is on automatic analysis for message passing base...


Fernando Pedone

Monday, December 12, 2016

Fernando Pedone, Professor, Università della Svizzera Italiana, Lugano, Switzerland

Scaling State Machine Replication

Abstract: State machine replication (SMR) is a well-established approach to developing highly available services. In essence, the ...


Avinash Sudhodanan

Friday, December 2, 2016

Avinash Sudhodanan, Junior researcher, Fondazione Bruno Kessler, Italy

Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications

Abstract: The advent of Software-as-a-Service (SaaS) has led to the development of Multi-Party Web Applications (MPWAs). MPWAs rel...


Daniel Larraz

Wednesday, November 30, 2016

Daniel Larraz, PhD Researcher, Universitat Politècnica de Catalunya (UPC), Spain

Scalable Program Analysis using Max-SMT

Abstract: Recent developments on SMT solvers have become crucial to make program analysis techniques effective in practice. Despit...


Abstract: Web service operators set up reverse proxies to interpose the com- munication between clients and origin servers for loa...


Francesco Zappa Nardelli

Friday, October 21, 2016

Francesco Zappa Nardelli, Research Scientist, INRIA Paris, France

Programming Languages and Concurrency: Still Tricky

Abstract: We will review the possible approaches to defining memory models for programming languages, and will describe the C11 me...


Narseo Vallina-Rodriguez

Thursday, October 20, 2016

Narseo Vallina-Rodriguez, Assistant Research Professor and Research Scientist, IMDEA Networks, Spain and International Computer Science Institute (ICSI), USA

The ICSI Haystack: A Tool to Illuminate the Mobile Ecosystem

Abstract: As a society we have come to rely upon our mobile phones for myriad daily tasks. It is striking how little insight we, a...


Matthieu Perrin

Thursday, October 13, 2016

Matthieu Perrin, Post-doctoral Researcher, Technion - Israel Institute of Technology, Israel

Specification of shared objects in wait-free distributed systems

Abstract: In large scale distributed systems, strong consistency criteria like sequential consistency and linearizability are ofte...


Abstract: Storage systems based on Weak Consistency provide better availability and lower latency than systems that use Strong Con...


Abstract: As every aspect of our lives gets more dependent on technology and the Internet, it is becoming more necessary to protec...


Mooly Sagiv

Tuesday, September 27, 2016

Mooly Sagiv, Professor, Tel Aviv University, Israel

Ivy: Safety Verification by Interactive Generalization

Abstract: Despite several decades of research, the problem of formal verification of infinite-state systems has resisted effective...


Yuri Meshman

Monday, September 19, 2016

Yuri Meshman, PhD Student, Technion - Israel Institute of Technology, Israel

Pattern-based Synthesis of Synchronization for the C++ Memory Model

Abstract: The C++ relaxed memory model is very challenging. The crucial task of writing correct and efficient low-level concurrent...


Svetlana Jakšić

Monday, September 12, 2016

Svetlana Jakšić, PhD Student, University of Novi Sad, Serbia

Types for Privacy and Memory Control

Abstract: Type systems are a widely used techniques for programming languages analysis. They are used to avoid undesired behaviour...


Michael Pradel

Wednesday, September 7, 2016

Michael Pradel, Research Group Leader, TU Darmstadt, Germany

Scalable Program Analyses for JavaScript-based Web Applications

Abstract: JavaScript not only makes it easy to write concise code in short time, but also to introduce programming errors, many of...


Antonio Faonio

Tuesday, September 6, 2016

Antonio Faonio, Post-doctoral Researcher, Aarhus University, Denmark

Fully Leakage-Resilient Signatures with Graceful Degradation

Abstract: We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitr...


Wouter Lueks

Thursday, September 1, 2016

Wouter Lueks, PhD Student, Nijmegen, Netherlands

Distributed encryption and applications

Abstract: Governments increasingly store and process huge quantities of data to combat crime, fraud, and terrorism with the aim of...


Abstract: Software developers are an ideal channel for the distribution of discrete optimization (DO) technology. Unfortunately, i...


Abstract: The past decade has witnessed a sea change in the perception of formal software verification. For instance, the microker...


Abstract: In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulne...


Alessio Gambi

Friday, May 27, 2016

Alessio Gambi, Post-doctoral Researcher, Saarland University, Germany

O!Snap: Cost-Efficient Testing in the Cloud

Abstract: Porting a software testing execution environment to a cloud-based infrastructure can lead to significant test speedup an...


Abstract: Most definitions of weak consistency models (WCM) in the literature are specific to one style of semantics description (...


Christopher Meiklejohn

Wednesday, May 18, 2016

Christopher Meiklejohn, PhD Student, KU Leuven, Belgium

Lasp: A Language For Distributed, Declarative, Edge Computation

Abstract: Consistency is hard and coordination is expensive. As we move into the world of connected ‘Internet of Things&rsqu...


Aishwarya Thiruvengadam

Friday, May 6, 2016

Aishwarya Thiruvengadam, PhD Student, University of Maryland, USA

10-round Feistel is indifferentiable from an ideal cipher

Abstract: We revisit the question of constructing an ideal cipher from a random oracle. Coron et al.~(Journal of Cryptology, 2014)...


Reinhard Wilhelm

Tuesday, April 26, 2016

Reinhard Wilhelm, Professor, Saarland University, Germany

Toward Compact Abstract Domains for Pipelines

Abstract: Hard real-time systems require programs to react on time. Static timing analysis derives timing guarantees by analyzing ...


Abstract: The amount and value of information we store in computers, servers or the collective cloud keeps growing while the ways ...


Reynald Affeldt

Thursday, March 17, 2016

Reynald Affeldt, Senior Research Scientist, National Institute of Advanced Industrial Science and Technology, Japan

Formalization of Error-correcting Codes: from Hamming to Modern Coding Theory

Abstract: By adding redundancy to transmitted data, error-correcting codes(ECCs) make it possible to communicate reliably over noi...


Adam Morrison

Tuesday, February 16, 2016

Adam Morrison, Post-doctoral Researcher, Technion - Israel Institute of Technology, Israel

Limitations of Highly-Available Eventually-Consistent Data Stores

Abstract: Modern replicated data stores aim to provide high availability, by immediately responding to client requests, often by i...


Fernando Pérez González

Monday, February 8, 2016

Fernando Pérez González, Full Professor, University of Vigo, Spain

Adversarial Signal Processing

Abstract: Signal Processing has successfully become an instrumental discipline in addressing the challenges posed by the digital w...


Abstract: This talk will present the design and soundness proof of Verasco, a formally verified static analyzer for most of the IS...


Abstract: Security and privacy issues in medical Wireless Body Area Networks (WBANs) constitute a major unsolved concern because o...