Thursday, December 19, 2019
Nazareno Aguirre, Associate Research Professor, Universidad Nacional de Río IV, ArgentinaTight Bounds and Applications in Generalized Symbolic Execution and Test Input Generation
Abstract: It is well known that various scalability issues affect automated formal verification, and thus some approaches need to ...
Tuesday, December 10, 2019
Antonio Nappa, Professor, Corelight Inc, USAZKSENSE: a Privacy-Preserving Mechanism for Bot Detection in Mobile Devices
Abstract: CAPTCHA systems have been widely deployed to identify and block fraudulent bot traffic. However, current solutions, such...
Wednesday, November 27, 2019
Roberto Bagnara, Research Professor, University of Parma, ItalyMISRA C and its key role for the compliance to industrial safety standards
Abstract: Embedded software plays a steadily increasing role in all industrial sectors, and in several such sectors software is re...
Monday, November 25, 2019
Jan Tretmans, Associate Research Professor, Radboud University, NetherlandsGoodbye ioco, hello uioco
Abstract: Model-based testing (MBT) is a systematic way of black-box testing of a system under test (SUT) with respect to behaviou...
Friday, November 22, 2019
Giovanni Denaro, Associate Research Professor, University of Milano-Bicocca, ItalyAutomatic Test Generation for Programs with Complex Structured Inputs
Abstract: Despite the recent improvements in automatic test case generation, test case generators do not yet handle well programs ...
Monday, November 18, 2019
Ignacio Luengo, Professor, Universidad Complutense de Madrid, SpainPost-quantum Cryptography with polynomials
Abstract: Post-quantum cryptography is public-key cryptography resistant to future quantum computers. In this talk we will talk ab...
Monday, November 4, 2019
Veronica Dahl, Research Professor, Simon Fraser University, CanadaAI for Social Responsibility: Embedding principled guidelines into AI systems
Abstract: In this position talk we briefly retrace the historic and evolutionary context that led to AI’s results not necess...
Wednesday, October 16, 2019
Bernardo David, Associate Research Professor, IT University of Copenhagen, DenmarkEfficient Privacy Preserving Computation meets Blockchains
Abstract: Multiparty Computation (MPC) protocols allow a set of mutually distrustful parties to compute a program without revealin...
Tuesday, October 15, 2019
Yu-yang Lin, PhD Student, Queen Mary, London UniversityA Bounded Model Checking Technique for Higher-Order Programs
Abstract: We present a Bounded Model Checking technique for higher-order programs based on defunctionalization and points-to analy...
Monday, October 14, 2019
Alejandro Ranchal-Pedrosa, PhD Student, University of Sydney, AustraliaPlatypus: Offchain Protocols without Synchrony
Abstract: Offchain protocols aim at bypassing the scalability and privacy limitations of classic blockchains by allowing a subset ...
Wednesday, October 2, 2019
Christian Roldán, PhD Student, University of Buenos Aires, ArgentinaAbout semantics of replicated data stores
Abstract: Replicated data stores provide highly available, low-latency access to data at the expense of consistency, i.e., observe...
Tuesday, September 10, 2019
Gregory Chockler, Research Professor, Royal Holloway, University of London, United KingdomAtomic Transaction Commit for Modern Data Stores
Abstract: Transaction commit protocols play a pivotal role in supporting scalability and availability guarantees of today’s ...
Wednesday, September 4, 2019
Yotam Feldman, PhD Student, Tel Aviv University, IsraelInferring Inductive Invariants from Phase Structures
Abstract: Infinite-state systems such as distributed protocols are challenging to verify using interactive theorem provers or auto...
Tuesday, September 3, 2019
Yotam Feldman, PhD Student, Tel Aviv University, IsraelOrder out of Chaos: Proving Linearizability Using Local Views
Abstract: Proving the linearizability of highly concurrent data structures, such as those using optimistic concurrency control, is...
Tuesday, July 2, 2019
Antonio Nappa, Researcher, Brave SoftwareTrusted Hardware: The Good, The Bad, The Ugly
Abstract: Trusted hardware is one of the most complex and desired components of modern computers. For example, almost all mobile p...
Wednesday, June 12, 2019
Mooly Sagiv, Research Professor, Tel Aviv University, IsraelDeductive verification of distributed protocols in first-order logic
Abstract: Distributed protocols such as Paxos play an important role in many computer systems. Therefore, a bug in a distributed p...
Tuesday, April 30, 2019
František Farka, PhD Student, Heriot-Watt University, United KingdomProof-Relevant Resolution: The Foundations of Constructive Automation
Abstract: In this talk, we introduce proof-relevant resolution, a framework for constructive proof automation. The intended applic...
Friday, April 26, 2019
Ignacio Cascudo, Assistant Research Professor, Aalborg University, DenmarkSome developments in secure multiparty computation for binary circuits
Abstract: Secure multiparty computation studies deals with privacy-preserving computation, where several parties, some of them hol...
Thursday, April 25, 2019
Klaus von Gleissenthall, Post-doctoral Researcher, UC San DiegoPretend Synchrony: Synchronous Verification of Asynchronous Distributed Programs
Abstract: In this talk, I will present pretend synchrony, a new approach to verifying distributed systems, based on the observatio...
Wednesday, April 24, 2019
Marco Guarnieri, Post-doctoral Researcher, IMDEA Software InstitutePrincipled detection of speculative information flows
Abstract: Modern CPUs employ speculative execution to avoid expensive pipeline stalls by predicting the outcome of branching (and ...
Tuesday, April 23, 2019
Joao Marques Silva, Research Professor, Universidade de LisboaLogic-Enabled Explanations for Machine Learning Models
Abstract: The practical successes of Machine Learning (ML) in different settings motivates the ability of computing small explanat...
Monday, April 15, 2019
Alessandra Gorla, Assistant Research Professor, IMDEA Software InstituteUsing Natural Language Processing to Improve Reliability and Trustworthiness of Software Systems
Abstract: Many artifacts that software developers produce are written in natural language: code comments, commit messages, text in...
Wednesday, April 10, 2019
Maria Schett, PhD Student, University College London, United KingdomBlockchain Superoptimizer
Abstract: Etherum smart contracts written in higher level programming languages like Solidity or Viper are compiled to bytecode, w...
Wednesday, April 10, 2019
Kenji Maillard, PhD Student, INRIA Paris, FranceDesigning Dijkstra Monads
Abstract: Verifying a program consist of proving that a given program meets its specification. Various frameworks have been studie...
Monday, April 8, 2019
Marko Vukolić, Researcher, IBM Research - ZurichHyperledger Fabric: a Distributed Operating System for Permissioned Blockchains
Abstract: Fabric is a modular and extensible open-source system for deploying and operating permissioned blockchains and one of th...
Friday, April 5, 2019
Ingo Mueller, Post-doctoral Researcher, ETH Zurich, SwitzerlandThe State of the Art of Data Analytics Systems and What is Wrong about it
Abstract: Few technological advances have affected as many aspects of science, economy, and society in general as the ability to c...
Thursday, April 4, 2019
Joseph Izraelevitz, Post-doctoral Researcher, UC San DiegoPractical and Formal Infrastructure for Nonvolatile Memory
Abstract: For decades, programmers have interacted with persistent storage via a well-defined block-based API, namely, that of the...
Tuesday, March 26, 2019
Andreas Pavlogiannis, Post-doctoral Researcher, EPFL, SwitzerlandAlgorithmic Advances in Automated Program Analysis
Abstract: Modern-day software is increasingly complex and software engineering is commonly accepted as a challenging, error-prone ...
Friday, March 22, 2019
Paolo Giarrusso, Post-doctoral Researcher, EPFL, SwitzerlandTowards Semantic Type Soundness for Dependent Object Types and Scala with Logical Relations in Iris
Abstract: The metatheory of the Scala core type system (DOT), first established recently, is still hard to extend, like other syst...
Thursday, March 21, 2019
Rahul Chatterjee, PhD Student, Cornell University, New York, USAEmpiricism-Informed Secure System Design: From Improving Passwords to Helping Domestic Violence Victims
Abstract: Security often fails in practice due to a lack of understanding of the nuances in real-world systems. For example, users...
Tuesday, March 19, 2019
Martin A.T. Handley, PhD Student, University of Nottingham, United KingdomLiquidate your assets: reasoning about resource usage in Liquid Haskell
Abstract: Liquid Haskell is an extension to the type system of Haskell that supports formal reasoning about program correctness by...
Thursday, March 14, 2019
Eduardo Bezerra, Software Engineer, Amazon MadridStrong Consistency at Scale
Abstract: Today’s online services must meet strict availability and performance requirements. State machine replication, one of th...
Monday, January 21, 2019
Michael D. Adams, Software Engineer, University of Utah, USAAdvances in Parsing
Abstract: Parsing is sometimes thought of as a solved problem. However, recent advances show that there is still much to be discov...
Friday, January 18, 2019
Miguel Á. Carreira-Perpiñán, Professor, University of California at Merced, USAA new way to train decision trees: tree alternating optimization (TAO)
Abstract: Decision trees with hard decision nodes stand apart from other machine learning models in their interpretability, fast i...
Friday, January 11, 2019
Julian Thomé, Junior researcher, places.SLAutomated Security Code Analysis Made Easy
Abstract: Security auditing, i.e., the examination of the source code for the purpose of detecting vulnerabilities, helps to detec...