Invited Talks

Abstract: Internet-wide scanning techniques and services, like Zmap, Shodan, NMap, Masscan, etc. are heavily used for malicious ac...


Borzoo Bonakdarpour

Tuesday, October 31, 2017

Borzoo Bonakdarpour, Assistant Research Professor, McMaster University, Canada

Automated Fine-Tuning of Probabilistic Self-Stabilizing Algorithms

Abstract: Although randomized algorithms have widely been used in distributed computing as a means to tackle impossibility results...


Vasilios Mavroudis

Thursday, September 28, 2017

Vasilios Mavroudis, PhD Student, University College London, United Kingdom

Cryptographic Hardware from Untrusted Components

Abstract: The current consensus within the security industry is that high-assurance systems cannot tolerate the presence of compro...


Danil Annenkov

Tuesday, September 26, 2017

Danil Annenkov, PhD Student, DIKU University of Copenhagen, Denmark

Reasoning Techniques for the Module System Formalisation in Coq

Abstract: In this talk we present a number of techniques that allow for formal reasoning with nested and mutually inductive struct...


Veelasha Moonsamy

Friday, September 15, 2017

Veelasha Moonsamy, Post-doctoral Researcher, Radboud University, Netherlands

Side-channel attacks on mobile devices and future research directions

Abstract: Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditio...


Gregory Chockler

Tuesday, September 12, 2017

Gregory Chockler, Professor, Royal Holloway, University of London, United Kingdom

The Space Complexity of Reliable Storage Services

Abstract: Although reliable distributed and cloud storage systems have attracted significant attention over the past decade, until...


Filippo Bonchi

Monday, September 11, 2017

Filippo Bonchi, Research Scientist, École Normale Supérieure de Lyon, France

Full Abstraction for Signal Flow Graphs

Abstract: Signal Flow Graphs (SFGs) were introduced in the 1940s by Shannon as a formal circuit model of a class of simple analog ...


Monir Azraoui

Wednesday, September 6, 2017

Monir Azraoui, Post-doctoral Researcher, EURECOM, France

Secure Operations in the Cloud

Abstract: Cloud computing is perceived as the “holy grail” to cope with the handling of tremendous amounts of data col...


William Suski

Thursday, July 27, 2017

William Suski, Science Director, Office of Naval Research Global, USA

ONR Global Basic Research Funding Opportunities

Abstract: Dr. William Suski from the US Navy’s Office of Naval Research Global (ONRG) will be presenting a description of hi...


Ana Sokolova

Monday, July 17, 2017

Ana Sokolova, Associate Professor, University of Salzburg, Austria

Concurrent Data Structures: Semantics and Relaxations

Abstract: The semantics of concurrent data structures is usually given by a sequential specification and a consistency condition. ...


Christian Hammer

Monday, June 26, 2017

Christian Hammer, Full Professor, University of Potsdam, Germany

WebPol: Fine-grained Information Flow Policies for Web Browsers

Abstract: In the standard browser programming model, third-party scripts included in an application execute with the same privileg...


Grigory Fedyukovich

Friday, June 23, 2017

Grigory Fedyukovich, Post-doctoral Researcher, University of Washington, USA

Synchronizing Constraint Horn Clauses

Abstract: The goal of unbounded program verification is to discover an inductive invariant that over-approximates all reachable pr...


Julian Dolby

Friday, June 23, 2017

Julian Dolby, Research Staff Member, IBM T. J. Watson Research Center, USA

WALA Everywhere

Abstract: The Watson Libraries for Analysis (WALA) started life as analysis for Java bytecode, but soon grew to include JavaScript...


Abstract: Blockchain technology has become of great interest for major multinationals, creating a need to close the gap between th...


Ilya Sergey

Tuesday, June 13, 2017

Ilya Sergey, Lecturer, University College London, United Kingdom

Programming and Proving with Distributed Protocols

Abstract: Distributed systems play a crucial role in modern infrastructure, but are notoriously difficult to implement correctly. ...


Romain Gay

Wednesday, April 19, 2017

Romain Gay, PhD Student, École Normale Supérieure, Paris, France

Improved Dual System ABE in Prime-Order Groups via Predicate Encodings

Abstract: We present a modular framework for the design of efficient adaptively secure attribute-based encryption (ABE) schemes fo...


Abstract: In this talk I will present my research in developing local reasoning techniques in both concurrent and sequential setti...


Abstract: Website fingerprinting attacks aim to uncover which webpage a user is visiting by monitoring the incoming and outgoing p...


Andreas Rossberg

Friday, March 24, 2017

Andreas Rossberg, Software Engineer, Google

Bringing the Web up to Speed with WebAssembly

Abstract: The maturation of the Web platform has given rise to sophisticated and demanding Web applications such as interactive 3D...


Sebastian Mödersheim

Thursday, March 23, 2017

Sebastian Mödersheim, Associate Professor, Technical University of Denmark

Alpha-Beta-Privacy -- Defining Privacy is Supposed to be Easy

Abstract: So far, formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on th...


Alberto Lopez

Wednesday, March 15, 2017

Alberto Lopez, General Secretary, Escuela Universitaria de Diseño, Innovación y Tecnología

Software research activities in Design at ESNE

Abstract: Research activities in design, often end up in complex software development tasks. Security related with User eXperience...


Daniel Riofrio

Friday, March 10, 2017

Daniel Riofrio, Post-doctoral Researcher, University of New Mexico, USA

The Presidential Elections in Ecuador during the digital era

Abstract: In his talk, Daniel will go over the motivations that lead to this research, the protocol he has been following to measu...


Ignacio Fabregas

Thursday, March 9, 2017

Ignacio Fabregas, Post-doctoral Researcher, Universidad Complutense de Madrid, Spain

Logics for Process Semantics

Abstract: In the setting of the modal logic that characterizes modal refinement over modal transition systems, Boudol and Larsen s...


Abstract: Starting from a research paper of 2001, we show how OpenPGP encryption of emails is fundamentally broken. We show how an...


Rupak Majumdar

Friday, February 24, 2017

Rupak Majumdar, Scientific Director, Max Planck Institute for Software Systems, Germany

Hitting families of schedules

Abstract: We consider the following basic task in the testing of concurrent systems. The input to the task is a partial order of e...


Hongseok Yang

Monday, February 13, 2017

Hongseok Yang, Professor, University of Oxford, United Kingdom

Probabilistic Programming

Abstract: Probabilistic programming refers to the idea of using standard programming constructs for specifying probabilistic model...


Abstract: CPU caches introduce variations into the execution time of programs that can be exploited by adversaries to recover priv...


Miguel Á. Carreira-Perpiñán

Wednesday, January 11, 2017

Miguel Á. Carreira-Perpiñán, Professor, University of California at Merced, USA

Learning binary hash functions for information retrieval applications

Abstract: Searching for the most similar images to a query image in a large database is a high-dimensional nearest-neighbour probl...