Wednesday, November 3, 2021
Sandro Stucky, Post-doctoral Researcher, University of Gothenburg, SwedenGray-Box Monitorability of Hyperproperties
Abstract: Many important system properties, particularly in security and privacy, cannot be verified statically. Therefore, runtim...
Wednesday, November 3, 2021
Gerardo Schneider, Research Professor, University of Gothenburg, SwedenMonitor-Triggered Temporal Logic
Abstract: This talk is concerned with the combination of monitoring techniques and reactive synthesis based on temporal logic (LTL...
Wednesday, November 3, 2021
Diego Garbervetsky, Associate Professor, Universidad de Buenos Aires and CONICET, ArgentinaUsing abstractions to validate and test programs with rich protocols
Abstract: A significant proportion of classes in modern software introduce or use object protocols, prescriptions on the temporal ...
Tuesday, July 27, 2021
Louis-Marie Dando, Post-doctoral Researcher, ANR Delta, LIS, Marseille, FranceWeighted Automata and Expressions over Pre-Rational Monoids
Abstract: The Kleene theorem establishes a fundamental link between automata and expressions over the free monoid. Numerous genera...
Tuesday, July 6, 2021
Chana Weil-Kennedy, PhD candidate, TU MunichVerification of Immediate Observation Petri Nets
Abstract: Petri nets are a popular and well-studied formal model for the representation and verification of parallel processes. Th...
Friday, May 21, 2021
Damien Robissout, PhD Student, Laboratoire Hubert Curien, University of Lyon, FranceOnline Performance Evaluation and Improvement of Deep Learning Networks for Side-Channel Analysis
Abstract: The past ten years have seen an increasing presence of deep learning algorithms to perform a diverse set of tasks thanks...
Tuesday, May 18, 2021
Nikos Vasilakis, Researcher, MIT CSAIL, USARetrofitting Security, Module by Module
Abstract: Software developers make pervasive use of third-party software supply chains to reduce costs and accelerate release cycl...
Tuesday, May 11, 2021
Andrés Sánchez, Master Intern, EPFL, SwitzerlandLeaking Secrets Through Compressed Caches
Abstract: The hardware security crisis brought on by recent speculative execution attacks has shown that it is crucial to adopt a ...
Tuesday, April 20, 2021
Miguel Ambrona, Post-doctoral Researcher, NTT Secure Platform Laboratories, JapanAcyclicity Programming for Sigma-Protocols
Abstract: Cramer, Damgård, and Schoenmakers (CDS) built a proof system to demonstrate the possession of subsets of witnesses for a...
Thursday, March 25, 2021
Thaleia-Dimitra Doudali, PhD candidate, Georgia Institute of Technology, USAAdding Machine Learning to the Management of Heterogeneous Resources
Abstract: Computing platforms increasingly incorporate heterogeneous hardware technologies, as a way to scale application performa...
Wednesday, March 24, 2021
Matteo Dell'Amico, Researcher, EURECOM, FranceApproaches to Explore Complex Data
Abstract: Analyzing large and heterogeneous data is a recurrent problem for analysts and researchers. For example, a dataset of ne...
Thursday, March 18, 2021
Danilo Francati, PhD candidate, Stevens Institute of Technology, Hoboken, USAKolmogorov complexity and cryptography: New connections and applications to space-demanding functions
Abstract: Nowadays, attackers have large amount of resources (e.g., computational and space capabilities) that are used for malici...
Thursday, March 11, 2021
Duc Le, PhD candidate, Purdue University, USACryptographic Constructions for Resource-Constrained Devices with Applications to Blockchains
Abstract: The blockchain offered a distributed way to provide security guarantees for financial transactions that avoid the single...
Wednesday, March 3, 2021
Vanessa Frías-Martínez, Associate Professor, University of Maryland, USAData-driven decision making for cities and communities
Abstract: The pervasiveness of cell phones, mobile applications and social media generates vast amounts of digital traces that can...
Monday, March 1, 2021
Tianhao Wang, PhD candidate, Purdue University, USACollecting Sensitive Data with Local Differential Privacy
Abstract: When collecting information, local differential privacy (LDP) relieves users’ privacy concerns, as it adds noise t...
Monday, February 22, 2021
Lana Josipović, Doctoral Assistant, EPFL, SwitzerlandHigh-Level Synthesis of Dynamically Scheduled Circuits
Abstract: The slowdown in transistor scaling and the end of Moore’s law indicate a need to invest in new computing paradigms...
Tuesday, February 9, 2021
Nik Sultana, Post-doctoral Researcher, University of Pennsylvania, USAProgramming for Distributed and Heterogeneous Resources
Abstract: The multi-scale programmability of modern computer systems, including network fabrics and systems-on-chip, presents unpr...
Monday, February 8, 2021
Manuel Rigger, Post-doctoral Researcher, ETH Zurich, SwitzerlandRobustifying Data-Centric Systems
Abstract: Data is eating the world. Systems for storing and processing data, such as Database Management Systems (DBMSs), are thus...
Wednesday, February 3, 2021
Marios Kogias, Researcher, Microsoft Research, Cambridge, United KingdomBuilding Latency-Critical Datacenter Systems
Abstract: Online services play a major role in our everyday life for communication, entertainment, socializing, e-commerce, etc. T...
Monday, February 1, 2021
Christian Schilling, Interim Professor, University of Konstanz, GermanyOutside the Box: Scalable Formal Methods
Abstract: I will talk about two fairly different but representative lines of my work. The first line of work is about reachability...
Friday, January 29, 2021
Rahul Gopinath, Post-doctoral Researcher, CISPA Helmholtz Center for Information Security, GermanyThe Science of Fuzzing
Abstract: Efficient and effective fuzzing requires the availability of the input specification for the program under test. However...