Tuesday, December 15, 2020
Juan Lastra Díaz, Ad-honorem Researcher, National University of Distance Education, SpainReproducibility practices and initiative encouraged by Information Systems
Abstract: Reproducibility crisis in science, including computational sciences, is a serious, well-known, and well-documented probl...
Wednesday, December 2, 2020
Lydia Garms, Post-doctoral Researcher, Royal Holloway, University of London, United KingdomGroup Signatures with Selective Linkability and Extensions
Abstract: Group signatures allow user data to be collected while preserving the user’s privacy but still ensuring it origina...
Tuesday, November 17, 2020
Antonio Nappa, Chief Technology Officer, BitCorp Intelligence Creative Labs, ItalyOne ray to rule them all: Inducing soft-errors by gamma-ray emissions at ground level
Abstract: What do Apple, the FBI and a Belgian politician have in common? In 2003, in Belgium there was an electronic election and...
Tuesday, November 10, 2020
Pedro Cabalar, Associate Professor, University of A Coruña, SpainAnswer Set Programming and its Temporal Extension
Abstract: In this talk, I will make an introduction to the paradigm of Answer Set Programming (ASP) and its extension for temporal...
Wednesday, October 14, 2020
Eduardo Soria Vázquez, Post-doctoral Researcher, Aarhus University, DenmarkSecure and Verifiable Computation (over rings)
Abstract: This talk is scoped for both cryptographers and non-cryptographers. I will start by introducing two of the most active r...
Tuesday, July 7, 2020
Antonio Nappa, Post-doctoral Researcher, Corelight Inc, USAScrambleSuit: A Tool for Testing Malware Analysis Sandboxes using PoW-based Side Channels Mechanism
Abstract: Malware analysis systems are one of the best weapons in the arsenal of cybersecurity companies and researchers. An integ...
Thursday, July 2, 2020
Manuel Rigger, Post-doctoral Researcher, ETH Zurich, SwitzerlandThree Tales on Finding Logic Bugs in Database Management Systems
Abstract: Database Management Systems (DBMS) are used ubiquitously for storing and retrieving data. It is critical that they funct...
Tuesday, June 9, 2020
Michael Greenberg, Assistant Professor, Pomona CollegeExecutable Formal Semantics for the POSIX Shell
Abstract: The POSIX shell is a widely deployed, powerful tool for managing computer systems. The shell is the expert’s control pan...
Tuesday, June 9, 2020
Stefania Dumbrava, Assistant Research Professor, Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise (ENSIIE)Mechanically Verified Graph Query Processing
Abstract: Modern graph query engines are gaining momentum, driven by exponentially growing, interconnected data volumes that popul...
Monday, April 13, 2020
Aastha Mehta, PhD Student, Max Planck Institute for Software Systems, GermanyPolicy Compliance in Online Services
Abstract: In response to incidents of unintended disclosure and misuse of user data by online services, modern data protection reg...
Friday, April 3, 2020
Leonidas Lampropoulos, Post-doctoral Researcher, U. of Maryland and U. of Pennsylvania, USASoftware Correctness at Scale through Testing and Verification
Abstract: Software correctness is becoming an increasingly important concern as our society grows more and more reliant on compute...
Tuesday, March 31, 2020
Arpan Gujarati, Post-doctoral Researcher, Max Planck Institute for Software Systems, GermanyTowards Ultra-Reliable Cyber-Physical Systems: Reliability Analysis of Distributed Real-Time Systems
Abstract: Fully-autonomous cyber-physical systems (CPS) such as autonomous vehicles, drones, and robots today are not engineered a...
Wednesday, March 25, 2020
Cristian-Alexandru Staicu, Post-doctoral Researcher, tu_darmstadtCode Reuse Gone Rogue: The Dangers of Overrelying on Third-Party JavaScript Code
Abstract: Traditionally, the server-side code of websites was written in languages such as PHP or Java for which security issues a...
Monday, March 16, 2020
Pedro Moreno Sánchez, Post-doctoral Researcher, Vienna University of Technology, AustriaSecurity, Privacy and Scalability in Blockchain Technologies
Abstract: Blockchain technologies have rapidly acquired popularity and promise to become one of the pillars of the digital society...
Thursday, March 5, 2020
Alberto Ros, Associate Research Professor, Universidad de MurciaNon-Speculative and Invisible Reordering of Memory Operations
Abstract: High-performance multicores providing strong consistency guarantees speculatively reorder memory operations. If a memory...
Tuesday, February 25, 2020
Borzoo Bonakdarpour, Assistant Research Professor, Iowa State UniversitySynthesis of Parametrized Distributed Self-stabilizing Protocols
Abstract: Program synthesis is often called the “holy grail” of computer science, as it enables users to refrain from ...
Monday, February 24, 2020
Carsten Baum, Post-doctoral Researcher, Aarhus University, DenmarkEfficient Constant-Round MPC with Identifiable Abort and Public Verifiability
Abstract: Recent years have seen a tremendous growth in the interest in secure multiparty computation (MPC) and its applications. ...
Thursday, February 20, 2020
Jaron Skvosted Gundersen, PhD Student, Aalborg University, DenmarkImproved Bounds on the Threshold Gap in Ramp Secret Sharing
Abstract: In secret sharing a dealer holds a secret and wants to distribute it among several parties in such a way that the indivi...
Thursday, February 13, 2020
Roberto Di Cosmo, Research Professor, INRIA Paris, FranceArchiving, assessing and attributing research software: towards software as a first class citizen in the scholarly world
Abstract: Software is a fundamental pillar of modern scientific research, across all fields and disciplines. However, there is a g...
Wednesday, January 15, 2020
Ida Tucker, PhD Student, École Normale Supérieure de Lyon, FranceDistributing the elliptic curve digital signature algorithm both securely and efficiently
Abstract: The Elliptic Curve Digital Signature Algorithm (ECDSA) is a widely adopted digital signature standard; in particular it ...
Tuesday, January 14, 2020
Samira Briongos, Post-doctoral Researcher, UPMRELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
Abstract: Caches have become the prime method for unintended information extraction across logical isolation boundaries. They are ...