Thursday, December 15, 2022
Taylor T. Johnson, Associate Professor, Vanderbilt University, Nashville, Tennessee, USAFormal Verification of Neural Networks in Autonomous Cyber-Physical Systems
Abstract: The ongoing renaissance in artificial intelligence (AI) has led to the advent of data-driven machine learning (ML) metho...
Wednesday, December 14, 2022
Miguel Ángel Carreira Perpiñán, Professor, University of California at Merced, USASolving counterfactual explanations for decision trees and forests
Abstract: A counterfactual explanation refers to the problem of finding a minimum change to a given input instance that will resul...
Tuesday, November 29, 2022
Nikos Vasilakis, Assistant Professor, Brown University, Rhode Island, USAPaSh: Light-Touch, Practically Correct, Just-in-Time Shell Script Parallelization
Abstract: Unix / Linux shell scripting is ubiquitous, partly due to the simplicity in which it allows combining third-party compon...
Abstract: Low-level pointer-manipulating programs are hard to verify, requiring complex spatial program logics that support reason...
Wednesday, September 7, 2022
Gregory Boddin & Danny Willems, Researcher, LeakIXExploring Internet services mis-configuration at scale
Abstract: In this talk we will demonstrate that not only vulnerabilities in exposed services can be dangerous, but also the issue ...
Tuesday, May 31, 2022
Patrick Cousot, Professor, Courant Institute of Mathematical Sciences, New York University, USAsynchronous Correspondences Between Hybrid Trajectory Semantics
Abstract: We study abstraction correspondences between hybrid trajectory semantics for verification and refinement, including disc...
Tuesday, May 17, 2022
Gordon Pace, PhD Student, University of MaltaSmart Contracts and Runtime Verification
Abstract: Smart contracts running on blockchains have been hailed as trustless platforms for carrying out agreements between parti...
Friday, May 6, 2022
Sunjay Cauligi, Post-doctoral Researcher, Max Planck InstitutePractical Foundations for Software Spectre Defenses
Abstract: Spectre vulnerabilities violate our fundamental assumptions about programming abstractions, allowing attackers to steal ...
Wednesday, April 6, 2022
Martin Leucker, Professor, University of Luebeck, GermanyFormal Verification of Neural Networks?
Abstract: Machine learning is a popular tool for building state of the art software systems. It is more and more used also in safe...
Wednesday, April 6, 2022
Gerardo Schneider, Full Professor, University of Gothenburg, SwedenTowards a Framework for Specifying and Realizing Correct–by–Construction Contextual Robotic Missions
Abstract: In this talk I will present some initial ideas (a first proposal) on how to define a framework to define missions for au...
Tuesday, April 5, 2022
Hannews Kallwies, PhD Student, University of Luebeck, GermanyAggregate Update Problem for Multi-clocked Dataflow Languages
Abstract: Dataflow languages have, as well as functional languages, immutable semantics, which is often implemented by copying val...
Tuesday, April 5, 2022
Antonio Faonio, Assistant Professor, EURECOM, FranceContinuously Non-Malleable Secret Sharing in the Plain Model
Abstract: In this talk I will present a paper published at TCC'21 together with Gianluca Brian and Daniele Venturi from Sapienza U...
Tuesday, March 29, 2022
Hanna Lachnitt & Nicholas Mosier, , Stanford University, USAAxiomatic Hardware-Software Contracts for Security
Abstract: Microarchitectural attacks are side/covert channel attacks which enable leakage/communication as a direct result of hard...
Tuesday, March 29, 2022
Collins Daniel Patrick, PhD Student, EPFL, SwitzerlandSecure messaging: past, present and future
Abstract: Secure messaging applications are used by billions of users every day. Applications like WhatsApp make use of the semina...
Thursday, March 24, 2022
Alessio Mansutti, Research Associate, University of Oxford, United KingdomFrom arithmetic theories and separation logic to statically detecting arithmetic errors in programs
Abstract: In this talk I will touch on two results I achieved during my PhD and Postdoc in the area of logics for algorithmic veri...
Wednesday, March 16, 2022
Dmitrii Ustiugov, PhD Student, University of Edinburgh, United KingdomTurbocharging Serverless Research with vHive
Abstract: Serverless has emerged as the next dominant cloud architecture and paradigm due to its scalability and a flexible billin...
Tuesday, March 15, 2022
John Hughes, Professor, Chalmers University of Technology, Göteborg, SwedenTesting Smart Contracts on the Cardano Blockchain with QuickCheck
Abstract: The Cardano blockchain underlies one of the world’s top-ten cryptocurrencies, and supports smart contracts written...
Thursday, March 10, 2022
Yueqi Chen, PhD Student, Pennsylvania State University, USASecuring Operating System Kernels with Fewer Shots
Abstract: Despite significant efforts on cybersecurity, we are observing an increasing number of attacks in recent years. The reas...
Monday, March 7, 2022
Kostas Ferles, Post-doctoral Researcher, The University of Texas at Austin, USASimple and Efficient Concurrent Programming via Synchronization Synthesis
Abstract: Multithreaded concurrency is an extremely challenging programming setting, with bugs manifesting themselves in resource ...
Friday, February 25, 2022
Wouter Lueks, Post-doctoral Researcher, Ecole Polytechnique Federale de Lausanne, SwitzerlandDesigning End-to-End Privacy-Friendly and Deployable Systems
Abstract: Digital technology creates risks to people’s privacy in ways that did not exist before. I design end-to-end privat...
Friday, February 18, 2022
Gergely Neu, Research Assistant Professor, Universitat Pompeu Fabra, Barcelona, SpainInformation-Theoretic Generalization Bounds for Stochastic Gradient Descent
Abstract: We study the generalization properties of the popular stochastic optimization method known as stochastic gradient descen...
Tuesday, January 25, 2022
Daniele Cozzo, PhD Student, KU Leuven, BelgiumGladius: LWR-based efficient hybrid public key encryption with distributed decryption
Abstract: Standard hybrid encryption schemes based on the KEM-DEM framework are hard to implement efficiently in a distributed man...
Tuesday, January 18, 2022
Pierre Civit, PhD Student, Sorbonne University, Paris, FranceAccountability in distributed systems
Abstract: Consider a distributed protocol whose n processes ensure some (distributed) safety and liveness properties, communicatin...
Monday, January 10, 2022
Hamza Abusalah, Post-doctoral Researcher, Vienna University of Technology, AustriaSNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients
Abstract: We revisit the problem of designing light-client blockchain protocols from the perspective of classical proof-system the...