Sandro Stucky

Wednesday, November 3, 2021

Sandro Stucky, Post-doctoral Researcher, University of Gothenburg, Sweden

Gray-Box Monitorability of Hyperproperties

Abstract: Many important system properties, particularly in security and privacy, cannot be verified statically. Therefore, runtim...


Gerardo Schneider

Wednesday, November 3, 2021

Gerardo Schneider, Research Professor, University of Gothenburg, Sweden

Monitor-Triggered Temporal Logic

Abstract: This talk is concerned with the combination of monitoring techniques and reactive synthesis based on temporal logic (LTL...


Diego Garbervetsky

Wednesday, November 3, 2021

Diego Garbervetsky, Associate Professor, Universidad de Buenos Aires and CONICET, Argentina

Using abstractions to validate and test programs with rich protocols

Abstract: A significant proportion of classes in modern software introduce or use object protocols, prescriptions on the temporal ...


Louis-Marie Dando

Tuesday, July 27, 2021

Louis-Marie Dando, Post-doctoral Researcher, ANR Delta, LIS, Marseille, France

Weighted Automata and Expressions over Pre-Rational Monoids

Abstract: The Kleene theorem establishes a fundamental link between automata and expressions over the free monoid. Numerous genera...


Chana Weil-Kennedy

Tuesday, July 6, 2021

Chana Weil-Kennedy, PhD candidate, TU Munich

Verification of Immediate Observation Petri Nets

Abstract: Petri nets are a popular and well-studied formal model for the representation and verification of parallel processes. Th...


Damien Robissout

Friday, May 21, 2021

Damien Robissout, PhD Student, Laboratoire Hubert Curien, University of Lyon, France

Online Performance Evaluation and Improvement of Deep Learning Networks for Side-Channel Analysis

Abstract: The past ten years have seen an increasing presence of deep learning algorithms to perform a diverse set of tasks thanks...


Nikos Vasilakis

Tuesday, May 18, 2021

Nikos Vasilakis, Researcher, MIT CSAIL, USA

Retrofitting Security, Module by Module

Abstract: Software developers make pervasive use of third-party software supply chains to reduce costs and accelerate release cycl...


Andrés Sánchez

Tuesday, May 11, 2021

Andrés Sánchez, Master Intern, EPFL, Switzerland

Leaking Secrets Through Compressed Caches

Abstract: The hardware security crisis brought on by recent speculative execution attacks has shown that it is crucial to adopt a ...


Miguel Ambrona

Tuesday, April 20, 2021

Miguel Ambrona, Post-doctoral Researcher, NTT Secure Platform Laboratories, Japan

Acyclicity Programming for Sigma-Protocols

Abstract: Cramer, Damgård, and Schoenmakers (CDS) built a proof system to demonstrate the possession of subsets of witnesses for a...


Thaleia-Dimitra Doudali

Thursday, March 25, 2021

Thaleia-Dimitra Doudali, PhD candidate, Georgia Institute of Technology, USA

Adding Machine Learning to the Management of Heterogeneous Resources

Abstract: Computing platforms increasingly incorporate heterogeneous hardware technologies, as a way to scale application performa...


Matteo Dell'Amico

Wednesday, March 24, 2021

Matteo Dell'Amico, Researcher, EURECOM, France

Approaches to Explore Complex Data

Abstract: Analyzing large and heterogeneous data is a recurrent problem for analysts and researchers. For example, a dataset of ne...


Abstract: Nowadays, attackers have large amount of resources (e.g., computational and space capabilities) that are used for malici...


Abstract: The blockchain offered a distributed way to provide security guarantees for financial transactions that avoid the single...


Vanessa Frías-Martínez

Wednesday, March 3, 2021

Vanessa Frías-Martínez, Associate Professor, University of Maryland, USA

Data-driven decision making for cities and communities

Abstract: The pervasiveness of cell phones, mobile applications and social media generates vast amounts of digital traces that can...


Tianhao Wang

Monday, March 1, 2021

Tianhao Wang, PhD candidate, Purdue University, USA

Collecting Sensitive Data with Local Differential Privacy

Abstract: When collecting information, local differential privacy (LDP) relieves users’ privacy concerns, as it adds noise t...


Lana Josipović

Monday, February 22, 2021

Lana Josipović, Doctoral Assistant, EPFL, Switzerland

High-Level Synthesis of Dynamically Scheduled Circuits

Abstract: The slowdown in transistor scaling and the end of Moore’s law indicate a need to invest in new computing paradigms...


Nik Sultana

Tuesday, February 9, 2021

Nik Sultana, Post-doctoral Researcher, University of Pennsylvania, USA

Programming for Distributed and Heterogeneous Resources

Abstract: The multi-scale programmability of modern computer systems, including network fabrics and systems-on-chip, presents unpr...


Manuel Rigger

Monday, February 8, 2021

Manuel Rigger, Post-doctoral Researcher, ETH Zurich, Switzerland

Robustifying Data-Centric Systems

Abstract: Data is eating the world. Systems for storing and processing data, such as Database Management Systems (DBMSs), are thus...


Marios Kogias

Wednesday, February 3, 2021

Marios Kogias, Researcher, Microsoft Research, Cambridge, United Kingdom

Building Latency-Critical Datacenter Systems

Abstract: Online services play a major role in our everyday life for communication, entertainment, socializing, e-commerce, etc. T...


Christian Schilling

Monday, February 1, 2021

Christian Schilling, Interim Professor, University of Konstanz, Germany

Outside the Box: Scalable Formal Methods

Abstract: I will talk about two fairly different but representative lines of my work. The first line of work is about reachability...


Rahul Gopinath

Friday, January 29, 2021

Rahul Gopinath, Post-doctoral Researcher, CISPA Helmholtz Center for Information Security, Germany

The Science of Fuzzing

Abstract: Efficient and effective fuzzing requires the availability of the input specification for the program under test. However...