Wednesday, December 19, 2018
Miguel Calejo & Robert Kowalski, , LogicalContracts & Imperial College LondonLogic and Smart Contracts
Abstract: Based on a condensed version of the RuleML 2018’s tutorial, the talk will recap the relationship between logic and...
Friday, December 14, 2018
Siddharth Krishna, PhD Student, New York UniversityVerifying Concurrent Search Structure Templates
Abstract: Concurrent separation logics have had great success reasoning about concurrent data structures. This success stems from ...
Tuesday, November 27, 2018
Michele Orru, PhD Student, École Normale Supérieure, Paris, FranceAggregate Cash Systems: a Cryptographic Investigation of Mimblewimble
Abstract: On August 2nd, 2016 “Tom Elvis Jedusor” posted an .onion link to a text file on IRC, titled MIMBLEWIMBLE and dated July ...
Wednesday, November 7, 2018
Erik Derr, Post-doctoral Researcher, places.SnTThe Dangers of Code Reuse in (Android) Apps
Abstract: Code-reuse is a double-edged sword. The ease in development often comes at the (hidden) cost of bugs or even security an...
Tuesday, October 2, 2018
Jesus M. Gonzalez-Barahona & Ahmed Zerouali, Professor, Universidad Rey Juan Carlos, Spain & Bitergia, SpainTechnical lag for software deployments
Abstract: When software is deployed, there is always a conflict between deploying what “seems to work”, and what &ldqu...
Abstract: Alternating automata have been widely used to model and verify systems that handle data from finite domains, such as com...
Monday, July 30, 2018
Steven Goldfeder, PhD Student, Princeton University, USAArbitrum: Scalable Smart Contracts
Abstract: We present Arbitrum, a cryptocurrency system that supports smart contracts without the limitations of scalability and pr...
Friday, July 27, 2018
Gibran Gómez, Independent Researcher, Independent ResearcherDetecting and Classifying Malicious TLS Network Traffic Using Machine Learning
Abstract: The use of TLS is rapidly spreading among malware families, since it makes possible for them to evade most used content-...
Monday, July 9, 2018
Gerardo Schneider, Research Professor, University of Gothenburg, SwedenRuntime Verification of Hyperproperties for Deterministic Programs
Abstract: In this talk I will present some results concerning the runtime monitoring of safety hyperproperties for deterministic p...
Tuesday, July 3, 2018
Nuno Machado, Post-doctoral Researcher, INESC TEC & University of Minho, PortugalPractical Log-based Analysis for Distributed Systems
Abstract: Developers typically rely on log data to reason about the runtime behavior of distributed systems. Unfortunately, the in...
Friday, June 29, 2018
Nikita Zyuzin, Research Professor, Saarland University, GermanyVerified Checking of Finite-Precision Error Bounds using Affine Arithmetic
Abstract: Finite-precision representation and approximation of continuous and infinite real numbers causes unavoidable rounding to...
Tuesday, June 19, 2018
Daniel Hedin, Senior Lecturer, Mälardalen University, SwedenJSFlow: past, present and future
Abstract: Almost eight years ago we started working on JSFlow - an information flow aware interpreter for JavaScript written in Ja...
Thursday, June 7, 2018
Thomas Dullien, Security Researcher, Google Project ZeroWeird Machines, Exploitability, and Provable Unexploitability
Abstract: In spite of being central to everything that is going on in IT security, the concept of “exploit” is surpris...
Tuesday, May 29, 2018
Marco Campion, PhD Student, University of Verona, ItalyIndexed Grammars Abstractions and Relations with other Formal Languages
Abstract: Indexed Grammars (IG) are a formalism which generate Indexed Languages (IL) and can be recognized by nested stack automa...
Thursday, May 24, 2018
Georg Fuchsbauer, Associate Research Professor, INRIASubversion-resistant zero knowledge
Abstract: Zero-knowledge proofs allow a prover to convince a verifier of the validity of a statement without revealing anything el...
Tuesday, May 22, 2018
Andreas Abel, PhD Student, Saarland University, GermanyCharacterizing Latency, Throughput, and Port Usage of Instructions on Intel Microarchitectures
Abstract: In this talk, we present the design and implementation of a tool to construct faithful models of the latency, throughput...
Friday, May 11, 2018
Itsaka Rakotonirina, PhD Student, INRIA Nancy-Grand Est., FranceThe DEEPSEC Prover
Abstract: Automated verification has become an essential part in the security evaluation of cryptographic protocols. Recently, the...
Wednesday, April 25, 2018
Maleknaz Nayebi, Research Professor, University of TorontoAnalytical Release Management for Mobile Apps
Abstract: Developing software products and maintaining software versions for adding or modifying functionality and quality to soft...
Monday, April 23, 2018
Eduardo Soria-Vazquez, PhD Student, University of Bristol, United KingdomLarge-Scale Secure Multi-Party Computation
Abstract: Secure multi-party computation (MPC) protocols allow a group of n parties to compute some function on the parties’...
Thursday, April 19, 2018
Antonio Nappa, Researcher, Minsait, IndraInside Spectre and Meltdown vulnerabilities
Abstract: In this presentation we analyze the (in)famous microarchitectureal side-channel attacks known as Spectre and Meltdown. W...
Thursday, April 12, 2018
Jesús López González, PhD Student, Universidad Rey Juan Carlos & Habla Computing S.L., SpainOptic algebras: beyond immutable data structures
Abstract: Optics provide rich abstractions and composition patterns to access and manipulate immutable data structures. However, t...
Monday, April 2, 2018
Niki Vazou, Post-doctoral Researcher, University of Maryland, USALiquid Haskell: Usable Language-Based Program Verification
Abstract: Formal verification has been gaining the attention and resources of both the academic and the industrial world since it ...
Friday, March 23, 2018
Jean Paul Degabriele, Post-doctoral Researcher, TU Darmstadt, GermanyThe Synergy Between Theory and Practice in Cryptography
Abstract: In this talk I will try give a flavour of my line of research by surveying some of my works. It will touch upon topics s...
Wednesday, March 21, 2018
Sebastien Bardin and Richard Bonichon, Researcher, Commissariat à l'Energie Atomique (CEA), FranceFormal methods: from source-level safety to binary-level security
Abstract: Several major classes of security analysis have to be performed on raw executable files, such as vulnerability analysis ...
Tuesday, March 20, 2018
Carla Ràfols, Post-doctoral Researcher, Universitat Pompeu Fabra, Barcelona, SpainEfficient Zero-Knowledge Proofs or on how to use the juiciest piece of a freshly hunted SNARK
Abstract: Succint Non-Interactive Arguments of Knowledge, or SNARKS, have received a lot of attention recently because of their ap...
Thursday, March 15, 2018
Sergio Mover, Post-doctoral Researcher, University of Colorado Boulder, USAAbstractions and models to design safe Event-Driven Cyber-Physical Systems
Abstract: In a cyber-physical system digital computations (e.g., a hardware component or a program) interact with the physical env...
Wednesday, March 14, 2018
Samer Hassan, Associate Research Professor, Berkman Klein Center at Harvard University & Universidad Complutense de MadridDecentralized Blockchain-based Organizations for Bootstrapping the Collaborative Economy
Abstract: Today’s Collaborative Economy has three challenges: It relies on centralized hubs, that in order to monetize use t...
Tuesday, March 13, 2018
Antonio Bianchi, PhD Student, University of California, Santa BarbaraIdentifying and Mitigating Trust Violations in the Mobile Ecosystem
Abstract: Mobile devices are now the most common way users handle digital information and interact with online services. Different...
Monday, March 12, 2018
Marco Guarnieri, Post-doctoral Researcher, ETH Zurich, SwitzerlandFormal foundations for access and inference control in databases
Abstract: Databases often store and manage sensitive data. Regulating the access to databases is, therefore, essential. To this en...
Monday, March 5, 2018
Fabio Palomba, Researcher, University of Zurich, SwitzerlandSTATICS: Socio-Technical AnalyTICs for improving the Management of Software Evolution Tasks
Abstract: The success of software engineering projects is in a large part dependent on social and organization aspects of the deve...
Friday, February 23, 2018
Zsolt István, PhD Student, ETH Zurich, SwitzerlandCaribou -- Intelligent Distributed Storage for the Datacenter
Abstract: In the era of Big Data, datacenter and cloud architectures decouple compute and storage resources from each other for be...
Wednesday, February 21, 2018
Deepak Padmanabhan, Lecturer, Queen's University Belfast, United KingdomMulti-view Data Analytics
Abstract: Conventional unsupervised data analytics techniques have largely focused on processing datasets of single-type data, e.g...
Tuesday, February 13, 2018
Pedro Reviriego, Associate Professor, Nebrija University, SpainReducing the False Positive Rate for Correlated Queries with the Adaptive Cuckoo Filter (ACF)
Abstract: In this talk we will present the adaptive cuckoo filter (ACF), a data structure for approximate set membership that exte...
Tuesday, January 30, 2018
Manuel Bravo, PhD Student, University of Lisboa, PortugalTowards a Distributed Metadata Service for Causal Consistency
Abstract: The problem of ensuring consistency in applications that manage replicated data is one of the main challenges of distrib...
Friday, January 12, 2018
Miguel Á. Carreira-Perpiñán, Professor, University of California at Merced, USAModel compression as constrained optimization, with application to neural nets
Abstract: Deep neural nets have become in recent years a widespread practical technology, with impressive performance in computer ...