Thursday, December 15, 2016
Emanuele D'Osualdo, Post-doctoral Researcher, TU Kaiserslautern, GermanyAutomatic Analysis of Message Passing Concurrency
Abstract: In this talk I will give an overview of my current research. The focus is on automatic analysis for message passing base...
Monday, December 12, 2016
Fernando Pedone, Professor, Università della Svizzera Italiana, Lugano, SwitzerlandScaling State Machine Replication
Abstract: State machine replication (SMR) is a well-established approach to developing highly available services. In essence, the ...
Friday, December 2, 2016
Avinash Sudhodanan, Junior researcher, Fondazione Bruno Kessler, ItalyAttack Patterns for Black-Box Security Testing of Multi-Party Web Applications
Abstract: The advent of Software-as-a-Service (SaaS) has led to the development of Multi-Party Web Applications (MPWAs). MPWAs rel...
Wednesday, November 30, 2016
Daniel Larraz, PhD Researcher, Universitat Politècnica de Catalunya (UPC), SpainScalable Program Analysis using Max-SMT
Abstract: Recent developments on SMT solvers have become crucial to make program analysis techniques effective in practice. Despit...
Tuesday, November 29, 2016
Antonio Nappa, Research Scientist, StealthSec Inc., EspañaRevProbe: Detecting Silent Reverse Proxies in Malicious Server Infrastructures
Abstract: Web service operators set up reverse proxies to interpose the com- munication between clients and origin servers for loa...
Friday, October 21, 2016
Francesco Zappa Nardelli, Research Scientist, INRIA Paris, FranceProgramming Languages and Concurrency: Still Tricky
Abstract: We will review the possible approaches to defining memory models for programming languages, and will describe the C11 me...
Thursday, October 20, 2016
Narseo Vallina-Rodriguez, Assistant Research Professor and Research Scientist, IMDEA Networks, Spain and International Computer Science Institute (ICSI), USAThe ICSI Haystack: A Tool to Illuminate the Mobile Ecosystem
Abstract: As a society we have come to rely upon our mobile phones for myriad daily tasks. It is striking how little insight we, a...
Thursday, October 13, 2016
Matthieu Perrin, Post-doctoral Researcher, Technion - Israel Institute of Technology, IsraelSpecification of shared objects in wait-free distributed systems
Abstract: In large scale distributed systems, strong consistency criteria like sequential consistency and linearizability are ofte...
Tuesday, October 11, 2016
Valter Balegas, PhD Student, Universidade Nova de Lisboa, PortugalIPA: Invariant-Preserving Applications for Weakly-consistent Replicated Databases
Abstract: Storage systems based on Weak Consistency provide better availability and lower latency than systems that use Strong Con...
Friday, October 7, 2016
Jesús Díaz Vico, Research Scientist, BEEVA, SpainAnonymization and De-anonymization: With Great Power Comes Great Responsibility... or not?
Abstract: As every aspect of our lives gets more dependent on technology and the Internet, it is becoming more necessary to protec...
Tuesday, September 27, 2016
Mooly Sagiv, Professor, Tel Aviv University, IsraelIvy: Safety Verification by Interactive Generalization
Abstract: Despite several decades of research, the problem of formal verification of infinite-state systems has resisted effective...
Monday, September 19, 2016
Yuri Meshman, PhD Student, Technion - Israel Institute of Technology, IsraelPattern-based Synthesis of Synchronization for the C++ Memory Model
Abstract: The C++ relaxed memory model is very challenging. The crucial task of writing correct and efficient low-level concurrent...
Monday, September 12, 2016
Svetlana Jakšić, PhD Student, University of Novi Sad, SerbiaTypes for Privacy and Memory Control
Abstract: Type systems are a widely used techniques for programming languages analysis. They are used to avoid undesired behaviour...
Wednesday, September 7, 2016
Michael Pradel, Research Group Leader, TU Darmstadt, GermanyScalable Program Analyses for JavaScript-based Web Applications
Abstract: JavaScript not only makes it easy to write concise code in short time, but also to introduce programming errors, many of...
Tuesday, September 6, 2016
Antonio Faonio, Post-doctoral Researcher, Aarhus University, DenmarkFully Leakage-Resilient Signatures with Graceful Degradation
Abstract: We construct new leakage-resilient signature schemes. Our schemes remain unforgeable against an adversary leaking arbitr...
Thursday, September 1, 2016
Wouter Lueks, PhD Student, Nijmegen, NetherlandsDistributed encryption and applications
Abstract: Governments increasingly store and process huge quantities of data to combat crime, fraud, and terrorism with the aim of...
Tuesday, July 19, 2016
Peter Stuckey, Professor, The University of Melbourne, AustraliaOptimization Modelling for Software Developers, or How to convert procedural code to constraints!
Abstract: Software developers are an ideal channel for the distribution of discrete optimization (DO) technology. Unfortunately, i...
Tuesday, July 5, 2016
Toby Murray, Lecturer, The University of Melbourne, AustraliaBuilding Highly-Secure Systems at Reasonable Cost -- Branching Out with Formal Verification
Abstract: The past decade has witnessed a sea change in the perception of formal software verification. For instance, the microker...
Wednesday, June 1, 2016
Jens Grossklags, Assistant Research Professor, University of Pennsylvania, USAGiven Enough Eyeballs, All Bugs Are Shallow? An Empirical Study of the Wooyun and HackerOne Web Vulnerability Discovery Ecosystems
Abstract: In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulne...
Friday, May 27, 2016
Alessio Gambi, Post-doctoral Researcher, Saarland University, GermanyO!Snap: Cost-Efficient Testing in the Cloud
Abstract: Porting a software testing execution environment to a cloud-based infrastructure can lead to significant test speedup an...
Tuesday, May 24, 2016
Patrick Cousot, Full Professor, New York UniversityThe hierarchy of analytic semantics of weakly consistent parallelism
Abstract: Most definitions of weak consistency models (WCM) in the literature are specific to one style of semantics description (...
Wednesday, May 18, 2016
Christopher Meiklejohn, PhD Student, KU Leuven, BelgiumLasp: A Language For Distributed, Declarative, Edge Computation
Abstract: Consistency is hard and coordination is expensive. As we move into the world of connected ‘Internet of Things&rsqu...
Friday, May 6, 2016
Aishwarya Thiruvengadam, PhD Student, University of Maryland, USA10-round Feistel is indifferentiable from an ideal cipher
Abstract: We revisit the question of constructing an ideal cipher from a random oracle. Coron et al.~(Journal of Cryptology, 2014)...
Tuesday, April 26, 2016
Reinhard Wilhelm, Professor, Saarland University, GermanyToward Compact Abstract Domains for Pipelines
Abstract: Hard real-time systems require programs to react on time. Static timing analysis derives timing guarantees by analyzing ...
Tuesday, March 29, 2016
Hugo Krawczyk, Research Scientist, IBM T. J. Watson Research Center, USAProtecting our Protectors: Armoring Passwords Against Server Compromise (Or: How to Protect Your Bitcoin Wallet Online)
Abstract: The amount and value of information we store in computers, servers or the collective cloud keeps growing while the ways ...
Thursday, March 17, 2016
Reynald Affeldt, Senior Research Scientist, National Institute of Advanced Industrial Science and Technology, JapanFormalization of Error-correcting Codes: from Hamming to Modern Coding Theory
Abstract: By adding redundancy to transmitted data, error-correcting codes(ECCs) make it possible to communicate reliably over noi...
Tuesday, February 16, 2016
Adam Morrison, Post-doctoral Researcher, Technion - Israel Institute of Technology, IsraelLimitations of Highly-Available Eventually-Consistent Data Stores
Abstract: Modern replicated data stores aim to provide high availability, by immediately responding to client requests, often by i...
Monday, February 8, 2016
Fernando Pérez González, Full Professor, University of Vigo, SpainAdversarial Signal Processing
Abstract: Signal Processing has successfully become an instrumental discipline in addressing the challenges posed by the digital w...
Thursday, January 14, 2016
Jacques-Henri Jourdan, PhD Student, INRIAVerasco: A Formally Verified C Static Analyzer
Abstract: This talk will present the design and soundness proof of Verasco, a formally verified static analyzer for most of the IS...
Tuesday, January 12, 2016
Pablo Picazo-Sanchez, PhD Student, U Carlos IIISecure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Networks
Abstract: Security and privacy issues in medical Wireless Body Area Networks (WBANs) constitute a major unsolved concern because o...