Sebastian Faust

Thursday, December 17, 2015

Sebastian Faust, Assistant Professor, Ruhr-University of Bochum, Germany

Leakage Resilient Masking Schemes

Abstract: Masking schemes are widely used in practice to defeat side-channel attacks, which exploit the power consumption of devic...


Günes Acar

Friday, October 30, 2015

Günes Acar, PhD Student, KU Leuven, Belgium

Advanced Web Tracking Mechanisms

Abstract: In this talk, we give an overview of three recent studies on advanced web tracking mechanisms, namely browser fingerprin...


Elena Pagnin

Tuesday, September 29, 2015

Elena Pagnin, PhD Student, Chalmers University of Technology, Göteborg, Sweden

Attacks against Privacy-Preserving Biometric Authentication systems

Abstract: In biometric authentication protocols, a user is authenticated or granted access to a service if her fresh biometric tra...


Abstract: The cardinality operator is indispensable when specifying and reasoning about parameterized concurrent/distributed syste...


Joost-Pieter Katoen

Wednesday, September 2, 2015

Joost-Pieter Katoen, Full Professor, RWTH Aachen, Germany

Understanding and Analyzing Probabilistic Programs

Abstract: We present two semantic views of probabilistic programs and their relationship. An operational interpretation as well as...


Sriram Sankaranarayanan

Tuesday, September 1, 2015

Sriram Sankaranarayanan, Professor, University of Colorado Boulder, USA

Invariants on expected values in probabilistic programs

Abstract: In this talk, we will describe progress on computing invariants involving expected values of program variables in probab...


Abstract: I’ll present the first stages of an investigation into how simple we can get away with making the foundations of m...


Abstract: Automated unit test generation tools can produce tests that are superior to manually written ones in terms of code cover...


Sina Shamshiri

Friday, July 10, 2015

Sina Shamshiri, PhD Student, University of Sheffield, United Kingdom

Random or Genetic Algorithm Search for Object-Oriented Test Suite Generation?

Abstract: Achieving high structural coverage is an important aim in software testing. Several search-based techniques have proved ...


Radu Iosif

Tuesday, July 7, 2015

Radu Iosif, CNRS Researcher (CR1), Distributed and Complex Systems Group, VERIMAG/CNRS, Grenoble, France

Decidable Horn Systems with Difference Constraints Arithmetic

Abstract: In this, we tackle the problem of the existence of solutions for recursive systems of Horn clauses with second-order var...


Cheng Li

Friday, June 26, 2015

Cheng Li, PhD Student, Max Planck Institute for Software Systems, Germany

Automating the Choice of Consistency Levels in Replicated Systems

Abstract: Online services often use replication for improving the performance of user-facing services. However, using replication ...


Alberto Goffi and Andrea Mattavelli

Friday, June 19, 2015

Alberto Goffi and Andrea Mattavelli, PhD Students, Università della Svizzera Italiana, Lugano, Switzerland

Exploiting Intrinsic Redundancy to Automatically Generate Test Oracles

Abstract: Software is sometimes redundant, in the sense that some operations are designed to behave like others but their executio...


Luis Maria Ferrer Fioriti

Wednesday, June 17, 2015

Luis Maria Ferrer Fioriti, PhD Student, Saarland University, Germany

Probabilistic termination

Abstract: We propose a framework to prove almost sure termination for probabilistic programs with real valued variables. It is bas...


Andreas Zeller

Wednesday, June 10, 2015

Andreas Zeller, Full Professor, Saarland University, Germany

Mining Sandboxes

Abstract: Modern test generation techniques allow to generate as many executions as needed; combined with dynamic analysis, they a...


Jose Manuel Fernandez de Labastida

Wednesday, May 13, 2015

Jose Manuel Fernandez de Labastida, Head of Scientific Management Department, European Research Council

Funding opportunities in the European Research Council

Abstract: Set up by the European Union in 2007, the European Research Council (ERC) is implementing its second work program in H20...


Abstract: The progress in microelectronics has enabled the miniaturization of processing elements, radio transceivers, and sensing...


Ben Livshits

Thursday, March 12, 2015

Ben Livshits, Research Scientist, Microsoft Research

PrePose: Security and Privacy for Gesture-Based Programming

Abstract: With the rise of sensors such as the Microsoft Kinect, Leap Motion, and hand motion sensors in phones (i.e., Samsung Gal...


Beta Ziliani

Friday, March 6, 2015

Beta Ziliani, PhD Student, Max Planck Institute for Software Systems, Saarbruecken, Germany

A Predictable Unification Algorithm for Coq Featuring Universe Polymorphism and Overloading

Abstract: Unification is a core component of every proof assistant or programming language featuring dependent types. In many case...


Abstract: M-Goup focus is in empirical software engineering in software and data intensive systems and services. It is a research ...


Abstract: A great deal of effort has been spent on both trying to specify software requirements and on ensuring that software actu...


Juan P. Galeotti

Monday, January 12, 2015

Juan P. Galeotti, Post-doctoral Researcher, Saarland University, Germany

Automated test generation for classes with environment dependencies

Abstract: Automated test generation for object-oriented software typically consists of producing sequences of calls aiming at high...