Tuesday, November 21, 2017
Giulia De Santis, PhD Student, INRIA Nancy-Grand Est., FranceClassifying Internet-wide scanners using Gaussian Mixture and Hidden Markov Models
Abstract: Internet-wide scanning techniques and services, like Zmap, Shodan, NMap, Masscan, etc. are heavily used for malicious ac...
Tuesday, October 31, 2017
Borzoo Bonakdarpour, Assistant Research Professor, McMaster University, CanadaAutomated Fine-Tuning of Probabilistic Self-Stabilizing Algorithms
Abstract: Although randomized algorithms have widely been used in distributed computing as a means to tackle impossibility results...
Thursday, September 28, 2017
Vasilios Mavroudis, PhD Student, University College London, United KingdomCryptographic Hardware from Untrusted Components
Abstract: The current consensus within the security industry is that high-assurance systems cannot tolerate the presence of compro...
Tuesday, September 26, 2017
Danil Annenkov, PhD Student, DIKU University of Copenhagen, DenmarkReasoning Techniques for the Module System Formalisation in Coq
Abstract: In this talk we present a number of techniques that allow for formal reasoning with nested and mutually inductive struct...
Friday, September 15, 2017
Veelasha Moonsamy, Post-doctoral Researcher, Radboud University, NetherlandsSide-channel attacks on mobile devices and future research directions
Abstract: Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditio...
Tuesday, September 12, 2017
Gregory Chockler, Professor, Royal Holloway, University of London, United KingdomThe Space Complexity of Reliable Storage Services
Abstract: Although reliable distributed and cloud storage systems have attracted significant attention over the past decade, until...
Monday, September 11, 2017
Filippo Bonchi, Research Scientist, École Normale Supérieure de Lyon, FranceFull Abstraction for Signal Flow Graphs
Abstract: Signal Flow Graphs (SFGs) were introduced in the 1940s by Shannon as a formal circuit model of a class of simple analog ...
Wednesday, September 6, 2017
Monir Azraoui, Post-doctoral Researcher, EURECOM, FranceSecure Operations in the Cloud
Abstract: Cloud computing is perceived as the “holy grail” to cope with the handling of tremendous amounts of data col...
Thursday, July 27, 2017
William Suski, Science Director, Office of Naval Research Global, USAONR Global Basic Research Funding Opportunities
Abstract: Dr. William Suski from the US Navy’s Office of Naval Research Global (ONRG) will be presenting a description of hi...
Monday, July 17, 2017
Ana Sokolova, Associate Professor, University of Salzburg, AustriaConcurrent Data Structures: Semantics and Relaxations
Abstract: The semantics of concurrent data structures is usually given by a sequential specification and a consistency condition. ...
Monday, June 26, 2017
Christian Hammer, Full Professor, University of Potsdam, GermanyWebPol: Fine-grained Information Flow Policies for Web Browsers
Abstract: In the standard browser programming model, third-party scripts included in an application execute with the same privileg...
Friday, June 23, 2017
Grigory Fedyukovich, Post-doctoral Researcher, University of Washington, USASynchronizing Constraint Horn Clauses
Abstract: The goal of unbounded program verification is to discover an inductive invariant that over-approximates all reachable pr...
Friday, June 23, 2017
Julian Dolby, Research Staff Member, IBM T. J. Watson Research Center, USAWALA Everywhere
Abstract: The Watson Libraries for Analysis (WALA) started life as analysis for Java bytecode, but soon grew to include JavaScript...
Thursday, June 15, 2017
Daniel Benarroch, Lead Cryptographer, QED-it, IsraelComputing on Private Data with Zero-Knowledge Proofs and the Blockchain
Abstract: Blockchain technology has become of great interest for major multinationals, creating a need to close the gap between th...
Tuesday, June 13, 2017
Ilya Sergey, Lecturer, University College London, United KingdomProgramming and Proving with Distributed Protocols
Abstract: Distributed systems play a crucial role in modern infrastructure, but are notoriously difficult to implement correctly. ...
Wednesday, April 19, 2017
Romain Gay, PhD Student, École Normale Supérieure, Paris, FranceImproved Dual System ABE in Prime-Order Groups via Predicate Encodings
Abstract: We present a modular framework for the design of efficient adaptively secure attribute-based encryption (ABE) schemes fo...
Thursday, March 30, 2017
Azalea Raad, PhD Student, Imperial College, LondonLocal Reasoning for Concurrency, Distribution and Web Programming
Abstract: In this talk I will present my research in developing local reasoning techniques in both concurrent and sequential setti...
Wednesday, March 29, 2017
Rebekah Overdorf, PhD Student, Drexel University, USAHow Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services
Abstract: Website fingerprinting attacks aim to uncover which webpage a user is visiting by monitoring the incoming and outgoing p...
Friday, March 24, 2017
Andreas Rossberg, Software Engineer, GoogleBringing the Web up to Speed with WebAssembly
Abstract: The maturation of the Web platform has given rise to sophisticated and demanding Web applications such as interactive 3D...
Thursday, March 23, 2017
Sebastian Mödersheim, Associate Professor, Technical University of DenmarkAlpha-Beta-Privacy -- Defining Privacy is Supposed to be Easy
Abstract: So far, formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on th...
Wednesday, March 15, 2017
Alberto Lopez, General Secretary, Escuela Universitaria de Diseño, Innovación y TecnologíaSoftware research activities in Design at ESNE
Abstract: Research activities in design, often end up in complex software development tasks. Security related with User eXperience...
Friday, March 10, 2017
Daniel Riofrio, Post-doctoral Researcher, University of New Mexico, USAThe Presidential Elections in Ecuador during the digital era
Abstract: In his talk, Daniel will go over the motivations that lead to this research, the protocol he has been following to measu...
Thursday, March 9, 2017
Ignacio Fabregas, Post-doctoral Researcher, Universidad Complutense de Madrid, SpainLogics for Process Semantics
Abstract: In the setting of the modal logic that characterizes modal refinement over modal transition systems, Boudol and Larsen s...
Friday, March 3, 2017
Alfredo Pironti, Researcher, IOActive15 Years of Broken Encrypted Emails... and We're Still Doing It Wrong
Abstract: Starting from a research paper of 2001, we show how OpenPGP encryption of emails is fundamentally broken. We show how an...
Friday, February 24, 2017
Rupak Majumdar, Scientific Director, Max Planck Institute for Software Systems, GermanyHitting families of schedules
Abstract: We consider the following basic task in the testing of concurrent systems. The input to the task is a partial order of e...
Monday, February 13, 2017
Hongseok Yang, Professor, University of Oxford, United KingdomProbabilistic Programming
Abstract: Probabilistic programming refers to the idea of using standard programming constructs for specifying probabilistic model...
Tuesday, February 7, 2017
Goran Doychev, Researcher, Independent ResearcherRigorous Analysis of Software Countermeasures against Cache Attacks
Abstract: CPU caches introduce variations into the execution time of programs that can be exploited by adversaries to recover priv...
Wednesday, January 11, 2017
Miguel Á. Carreira-Perpiñán, Professor, University of California at Merced, USALearning binary hash functions for information retrieval applications
Abstract: Searching for the most similar images to a query image in a large database is a high-dimensional nearest-neighbour probl...