Miguel Calejo & Robert Kowalski

Wednesday, December 19, 2018

Miguel Calejo & Robert Kowalski, , LogicalContracts & Imperial College London

Logic and Smart Contracts

Abstract: Based on a condensed version of the RuleML 2018’s tutorial, the talk will recap the relationship between logic and...


Siddharth Krishna

Friday, December 14, 2018

Siddharth Krishna, PhD Student, New York University

Verifying Concurrent Search Structure Templates

Abstract: Concurrent separation logics have had great success reasoning about concurrent data structures. This success stems from ...


Michele Orru

Tuesday, November 27, 2018

Michele Orru, PhD Student, École Normale Supérieure, Paris, France

Aggregate Cash Systems: a Cryptographic Investigation of Mimblewimble

Abstract: On August 2nd, 2016 “Tom Elvis Jedusor” posted an .onion link to a text file on IRC, titled MIMBLEWIMBLE and dated July ...


Erik Derr

Wednesday, November 7, 2018

Erik Derr, Post-doctoral Researcher, places.SnT

The Dangers of Code Reuse in (Android) Apps

Abstract: Code-reuse is a double-edged sword. The ease in development often comes at the (hidden) cost of bugs or even security an...


Jesus M. Gonzalez-Barahona & Ahmed Zerouali

Tuesday, October 2, 2018

Jesus M. Gonzalez-Barahona & Ahmed Zerouali, Professor, Universidad Rey Juan Carlos, Spain & Bitergia, Spain

Technical lag for software deployments

Abstract: When software is deployed, there is always a conflict between deploying what “seems to work”, and what &ldqu...


Radu Iosif

Monday, September 24, 2018

Radu Iosif, Researcher, CNRS, France

The Impact of Alternation

Abstract: Alternating automata have been widely used to model and verify systems that handle data from finite domains, such as com...


Steven Goldfeder

Monday, July 30, 2018

Steven Goldfeder, PhD Student, Princeton University, USA

Arbitrum: Scalable Smart Contracts

Abstract: We present Arbitrum, a cryptocurrency system that supports smart contracts without the limitations of scalability and pr...


Abstract: The use of TLS is rapidly spreading among malware families, since it makes possible for them to evade most used content-...


Gerardo Schneider

Monday, July 9, 2018

Gerardo Schneider, Research Professor, University of Gothenburg, Sweden

Runtime Verification of Hyperproperties for Deterministic Programs

Abstract: In this talk I will present some results concerning the runtime monitoring of safety hyperproperties for deterministic p...


Nuno Machado

Tuesday, July 3, 2018

Nuno Machado, Post-doctoral Researcher, INESC TEC & University of Minho, Portugal

Practical Log-based Analysis for Distributed Systems

Abstract: Developers typically rely on log data to reason about the runtime behavior of distributed systems. Unfortunately, the in...


Nikita Zyuzin

Friday, June 29, 2018

Nikita Zyuzin, Research Professor, Saarland University, Germany

Verified Checking of Finite-Precision Error Bounds using Affine Arithmetic

Abstract: Finite-precision representation and approximation of continuous and infinite real numbers causes unavoidable rounding to...


Daniel Hedin

Tuesday, June 19, 2018

Daniel Hedin, Senior Lecturer, Mälardalen University, Sweden

JSFlow: past, present and future

Abstract: Almost eight years ago we started working on JSFlow - an information flow aware interpreter for JavaScript written in Ja...


Thomas Dullien

Thursday, June 7, 2018

Thomas Dullien, Security Researcher, Google Project Zero

Weird Machines, Exploitability, and Provable Unexploitability

Abstract: In spite of being central to everything that is going on in IT security, the concept of “exploit” is surpris...


Abstract: Indexed Grammars (IG) are a formalism which generate Indexed Languages (IL) and can be recognized by nested stack automa...


Georg Fuchsbauer

Thursday, May 24, 2018

Georg Fuchsbauer, Associate Research Professor, INRIA

Subversion-resistant zero knowledge

Abstract: Zero-knowledge proofs allow a prover to convince a verifier of the validity of a statement without revealing anything el...


Abstract: In this talk, we present the design and implementation of a tool to construct faithful models of the latency, throughput...


Itsaka Rakotonirina

Friday, May 11, 2018

Itsaka Rakotonirina, PhD Student, INRIA Nancy-Grand Est., France

The DEEPSEC Prover

Abstract: Automated verification has become an essential part in the security evaluation of cryptographic protocols. Recently, the...


Maleknaz Nayebi

Wednesday, April 25, 2018

Maleknaz Nayebi, Research Professor, University of Toronto

Analytical Release Management for Mobile Apps

Abstract: Developing software products and maintaining software versions for adding or modifying functionality and quality to soft...


Eduardo Soria-Vazquez

Monday, April 23, 2018

Eduardo Soria-Vazquez, PhD Student, University of Bristol, United Kingdom

Large-Scale Secure Multi-Party Computation

Abstract: Secure multi-party computation (MPC) protocols allow a group of n parties to compute some function on the parties’...


Antonio Nappa

Thursday, April 19, 2018

Antonio Nappa, Researcher, Minsait, Indra

Inside Spectre and Meltdown vulnerabilities

Abstract: In this presentation we analyze the (in)famous microarchitectureal side-channel attacks known as Spectre and Meltdown. W...


Jesús López González

Thursday, April 12, 2018

Jesús López González, PhD Student, Universidad Rey Juan Carlos & Habla Computing S.L., Spain

Optic algebras: beyond immutable data structures

Abstract: Optics provide rich abstractions and composition patterns to access and manipulate immutable data structures. However, t...


Niki Vazou

Monday, April 2, 2018

Niki Vazou, Post-doctoral Researcher, University of Maryland, USA

Liquid Haskell: Usable Language-Based Program Verification

Abstract: Formal verification has been gaining the attention and resources of both the academic and the industrial world since it ...


Jean Paul Degabriele

Friday, March 23, 2018

Jean Paul Degabriele, Post-doctoral Researcher, TU Darmstadt, Germany

The Synergy Between Theory and Practice in Cryptography

Abstract: In this talk I will try give a flavour of my line of research by surveying some of my works. It will touch upon topics s...


Sebastien Bardin and  Richard Bonichon

Wednesday, March 21, 2018

Sebastien Bardin and Richard Bonichon, Researcher, Commissariat à l'Energie Atomique (CEA), France

Formal methods: from source-level safety to binary-level security

Abstract: Several major classes of security analysis have to be performed on raw executable files, such as vulnerability analysis ...


Carla Ràfols

Tuesday, March 20, 2018

Carla Ràfols, Post-doctoral Researcher, Universitat Pompeu Fabra, Barcelona, Spain

Efficient Zero-Knowledge Proofs or on how to use the juiciest piece of a freshly hunted SNARK

Abstract: Succint Non-Interactive Arguments of Knowledge, or SNARKS, have received a lot of attention recently because of their ap...


Sergio Mover

Thursday, March 15, 2018

Sergio Mover, Post-doctoral Researcher, University of Colorado Boulder, USA

Abstractions and models to design safe Event-Driven Cyber-Physical Systems

Abstract: In a cyber-physical system digital computations (e.g., a hardware component or a program) interact with the physical env...


Samer Hassan

Wednesday, March 14, 2018

Samer Hassan, Associate Research Professor, Berkman Klein Center at Harvard University & Universidad Complutense de Madrid

Decentralized Blockchain-based Organizations for Bootstrapping the Collaborative Economy

Abstract: Today’s Collaborative Economy has three challenges: It relies on centralized hubs, that in order to monetize use t...


Antonio Bianchi

Tuesday, March 13, 2018

Antonio Bianchi, PhD Student, University of California, Santa Barbara

Identifying and Mitigating Trust Violations in the Mobile Ecosystem

Abstract: Mobile devices are now the most common way users handle digital information and interact with online services. Different...


Marco Guarnieri

Monday, March 12, 2018

Marco Guarnieri, Post-doctoral Researcher, ETH Zurich, Switzerland

Formal foundations for access and inference control in databases

Abstract: Databases often store and manage sensitive data. Regulating the access to databases is, therefore, essential. To this en...


Abstract: The success of software engineering projects is in a large part dependent on social and organization aspects of the deve...


Abstract: In the era of Big Data, datacenter and cloud architectures decouple compute and storage resources from each other for be...


Deepak Padmanabhan

Wednesday, February 21, 2018

Deepak Padmanabhan, Lecturer, Queen's University Belfast, United Kingdom

Multi-view Data Analytics

Abstract: Conventional unsupervised data analytics techniques have largely focused on processing datasets of single-type data, e.g...


Abstract: In this talk we will present the adaptive cuckoo filter (ACF), a data structure for approximate set membership that exte...


Manuel Bravo

Tuesday, January 30, 2018

Manuel Bravo, PhD Student, University of Lisboa, Portugal

Towards a Distributed Metadata Service for Causal Consistency

Abstract: The problem of ensuring consistency in applications that manage replicated data is one of the main challenges of distrib...


Miguel Á. Carreira-Perpiñán

Friday, January 12, 2018

Miguel Á. Carreira-Perpiñán, Professor, University of California at Merced, USA

Model compression as constrained optimization, with application to neural nets

Abstract: Deep neural nets have become in recent years a widespread practical technology, with impressive performance in computer ...