Juan Lastra Díaz

Tuesday, December 15, 2020

Juan Lastra Díaz, Ad-honorem Researcher, National University of Distance Education, Spain

Reproducibility practices and initiative encouraged by Information Systems

Abstract: Reproducibility crisis in science, including computational sciences, is a serious, well-known, and well-documented probl...


Lydia Garms

Wednesday, December 2, 2020

Lydia Garms, Post-doctoral Researcher, Royal Holloway, University of London, United Kingdom

Group Signatures with Selective Linkability and Extensions

Abstract: Group signatures allow user data to be collected while preserving the user’s privacy but still ensuring it origina...


Antonio Nappa

Tuesday, November 17, 2020

Antonio Nappa, Chief Technology Officer, BitCorp Intelligence Creative Labs, Italy

One ray to rule them all: Inducing soft-errors by gamma-ray emissions at ground level

Abstract: What do Apple, the FBI and a Belgian politician have in common? In 2003, in Belgium there was an electronic election and...


Pedro Cabalar

Tuesday, November 10, 2020

Pedro Cabalar, Associate Professor, University of A Coruña, Spain

Answer Set Programming and its Temporal Extension

Abstract: In this talk, I will make an introduction to the paradigm of Answer Set Programming (ASP) and its extension for temporal...


Eduardo Soria Vázquez

Wednesday, October 14, 2020

Eduardo Soria Vázquez, Post-doctoral Researcher, Aarhus University, Denmark

Secure and Verifiable Computation (over rings)

Abstract: This talk is scoped for both cryptographers and non-cryptographers. I will start by introducing two of the most active r...


Abstract: Malware analysis systems are one of the best weapons in the arsenal of cybersecurity companies and researchers. An integ...


Manuel Rigger

Thursday, July 2, 2020

Manuel Rigger, Post-doctoral Researcher, ETH Zurich, Switzerland

Three Tales on Finding Logic Bugs in Database Management Systems

Abstract: Database Management Systems (DBMS) are used ubiquitously for storing and retrieving data. It is critical that they funct...


Michael Greenberg

Tuesday, June 9, 2020

Michael Greenberg, Assistant Professor, Pomona College

Executable Formal Semantics for the POSIX Shell

Abstract: The POSIX shell is a widely deployed, powerful tool for managing computer systems. The shell is the expert’s control pan...


Stefania Dumbrava

Tuesday, June 9, 2020

Stefania Dumbrava, Assistant Research Professor, Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise (ENSIIE)

Mechanically Verified Graph Query Processing

Abstract: Modern graph query engines are gaining momentum, driven by exponentially growing, interconnected data volumes that popul...


Aastha Mehta

Monday, April 13, 2020

Aastha Mehta, PhD Student, Max Planck Institute for Software Systems, Germany

Policy Compliance in Online Services

Abstract: In response to incidents of unintended disclosure and misuse of user data by online services, modern data protection reg...


Leonidas Lampropoulos

Friday, April 3, 2020

Leonidas Lampropoulos, Post-doctoral Researcher, U. of Maryland and U. of Pennsylvania, USA

Software Correctness at Scale through Testing and Verification

Abstract: Software correctness is becoming an increasingly important concern as our society grows more and more reliant on compute...


Arpan Gujarati

Tuesday, March 31, 2020

Arpan Gujarati, Post-doctoral Researcher, Max Planck Institute for Software Systems, Germany

Towards Ultra-Reliable Cyber-Physical Systems: Reliability Analysis of Distributed Real-Time Systems

Abstract: Fully-autonomous cyber-physical systems (CPS) such as autonomous vehicles, drones, and robots today are not engineered a...


Abstract: Traditionally, the server-side code of websites was written in languages such as PHP or Java for which security issues a...


Pedro Moreno Sánchez

Monday, March 16, 2020

Pedro Moreno Sánchez, Post-doctoral Researcher, Vienna University of Technology, Austria

Security, Privacy and Scalability in Blockchain Technologies

Abstract: Blockchain technologies have rapidly acquired popularity and promise to become one of the pillars of the digital society...


Alberto Ros

Thursday, March 5, 2020

Alberto Ros, Associate Research Professor, Universidad de Murcia

Non-Speculative and Invisible Reordering of Memory Operations

Abstract: High-performance multicores providing strong consistency guarantees speculatively reorder memory operations. If a memory...


Borzoo  Bonakdarpour

Tuesday, February 25, 2020

Borzoo Bonakdarpour, Assistant Research Professor, Iowa State University

Synthesis of Parametrized Distributed Self-stabilizing Protocols

Abstract: Program synthesis is often called the “holy grail” of computer science, as it enables users to refrain from ...


Carsten Baum

Monday, February 24, 2020

Carsten Baum, Post-doctoral Researcher, Aarhus University, Denmark

Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability

Abstract: Recent years have seen a tremendous growth in the interest in secure multiparty computation (MPC) and its applications. ...


Jaron Skvosted Gundersen

Thursday, February 20, 2020

Jaron Skvosted Gundersen, PhD Student, Aalborg University, Denmark

Improved Bounds on the Threshold Gap in Ramp Secret Sharing

Abstract: In secret sharing a dealer holds a secret and wants to distribute it among several parties in such a way that the indivi...


Abstract: Software is a fundamental pillar of modern scientific research, across all fields and disciplines. However, there is a g...


Abstract: The Elliptic Curve Digital Signature Algorithm (ECDSA) is a widely adopted digital signature standard; in particular it ...


Abstract: Caches have become the prime method for unintended information extraction across logical isolation boundaries. They are ...