Taylor T. Johnson

Thursday, December 15, 2022

Taylor T. Johnson, Associate Professor, Vanderbilt University, Nashville, Tennessee, USA

Formal Verification of Neural Networks in Autonomous Cyber-Physical Systems

Abstract: The ongoing renaissance in artificial intelligence (AI) has led to the advent of data-driven machine learning (ML) metho...


Miguel Ángel Carreira Perpiñán

Wednesday, December 14, 2022

Miguel Ángel Carreira Perpiñán, Professor, University of California at Merced, USA

Solving counterfactual explanations for decision trees and forests

Abstract: A counterfactual explanation refers to the problem of finding a minimum change to a given input instance that will resul...


Nikos Vasilakis

Tuesday, November 29, 2022

Nikos Vasilakis, Assistant Professor, Brown University, Rhode Island, USA

PaSh: Light-Touch, Practically Correct, Just-in-Time Shell Script Parallelization

Abstract: Unix / Linux shell scripting is ubiquitous, partly due to the simplicity in which it allows combining third-party compon...


Nico Lehmann

Tuesday, October 4, 2022

Nico Lehmann, PhD Student, UC San Diego

Flux: Liquid Types for Rust

Abstract: Low-level pointer-manipulating programs are hard to verify, requiring complex spatial program logics that support reason...


Abstract: In this talk we will demonstrate that not only vulnerabilities in exposed services can be dangerous, but also the issue ...


Patrick Cousot

Tuesday, May 31, 2022

Patrick Cousot, Professor, Courant Institute of Mathematical Sciences, New York University, US

Asynchronous Correspondences Between Hybrid Trajectory Semantics

Abstract: We study abstraction correspondences between hybrid trajectory semantics for verification and refinement, including disc...


Gordon Pace

Tuesday, May 17, 2022

Gordon Pace, PhD Student, University of Malta

Smart Contracts and Runtime Verification

Abstract: Smart contracts running on blockchains have been hailed as trustless platforms for carrying out agreements between parti...


Sunjay Cauligi

Friday, May 6, 2022

Sunjay Cauligi, Post-doctoral Researcher, Max Planck Institute

Practical Foundations for Software Spectre Defenses

Abstract: Spectre vulnerabilities violate our fundamental assumptions about programming abstractions, allowing attackers to steal ...


Martin Leucker

Wednesday, April 6, 2022

Martin Leucker, Professor, University of Luebeck, Germany

Formal Verification of Neural Networks?

Abstract: Machine learning is a popular tool for building state of the art software systems. It is more and more used also in safe...


Abstract: In this talk I will present some initial ideas (a first proposal) on how to define a framework to define missions for au...


Hannews Kallwies

Tuesday, April 5, 2022

Hannews Kallwies, PhD Student, University of Luebeck, Germany

Aggregate Update Problem for Multi-clocked Dataflow Languages

Abstract: Dataflow languages have, as well as functional languages, immutable semantics, which is often implemented by copying val...


Antonio Faonio

Tuesday, April 5, 2022

Antonio Faonio, Assistant Professor, EURECOM, France

Continuously Non-Malleable Secret Sharing in the Plain Model

Abstract: In this talk I will present a paper published at TCC'21 together with Gianluca Brian and Daniele Venturi from Sapienza U...


Hanna Lachnitt & Nicholas Mosier

Tuesday, March 29, 2022

Hanna Lachnitt & Nicholas Mosier, , Stanford University, USA

Axiomatic Hardware-Software Contracts for Security

Abstract: Microarchitectural attacks are side/covert channel attacks which enable leakage/communication as a direct result of hard...


Collins Daniel Patrick

Tuesday, March 29, 2022

Collins Daniel Patrick, PhD Student, EPFL, Switzerland

Secure messaging: past, present and future

Abstract: Secure messaging applications are used by billions of users every day. Applications like WhatsApp make use of the semina...


Abstract: In this talk I will touch on two results I achieved during my PhD and Postdoc in the area of logics for algorithmic veri...


Dmitrii Ustiugov

Wednesday, March 16, 2022

Dmitrii Ustiugov, PhD Student, University of Edinburgh, United Kingdom

Turbocharging Serverless Research with vHive

Abstract: Serverless has emerged as the next dominant cloud architecture and paradigm due to its scalability and a flexible billin...


John Hughes

Tuesday, March 15, 2022

John Hughes, Professor, Chalmers University of Technology, Göteborg, Sweden

Testing Smart Contracts on the Cardano Blockchain with QuickCheck

Abstract: The Cardano blockchain underlies one of the world’s top-ten cryptocurrencies, and supports smart contracts written...


Yueqi Chen

Thursday, March 10, 2022

Yueqi Chen, PhD Student, Pennsylvania State University, USA

Securing Operating System Kernels with Fewer Shots

Abstract: Despite significant efforts on cybersecurity, we are observing an increasing number of attacks in recent years. The reas...


Kostas Ferles

Monday, March 7, 2022

Kostas Ferles, Post-doctoral Researcher, The University of Texas at Austin, USA

Simple and Efficient Concurrent Programming via Synchronization Synthesis

Abstract: Multithreaded concurrency is an extremely challenging programming setting, with bugs manifesting themselves in resource ...


Wouter Lueks

Friday, February 25, 2022

Wouter Lueks, Post-doctoral Researcher, Ecole Polytechnique Federale de Lausanne, Switzerland

Designing End-to-End Privacy-Friendly and Deployable Systems

Abstract: Digital technology creates risks to people’s privacy in ways that did not exist before. I design end-to-end privat...


Gergely Neu

Friday, February 18, 2022

Gergely Neu, Research Assistant Professor, Universitat Pompeu Fabra, Barcelona, Spain

Information-Theoretic Generalization Bounds for Stochastic Gradient Descent

Abstract: We study the generalization properties of the popular stochastic optimization method known as stochastic gradient descen...


Abstract: Standard hybrid encryption schemes based on the KEM-DEM framework are hard to implement efficiently in a distributed man...


Pierre Civit

Tuesday, January 18, 2022

Pierre Civit, PhD Student, Sorbonne University, Paris, France

Accountability in distributed systems

Abstract: Consider a distributed protocol whose n processes ensure some (distributed) safety and liveness properties, communicatin...


Hamza Abusalah

Monday, January 10, 2022

Hamza Abusalah, Post-doctoral Researcher, Vienna University of Technology, Austria

SNACKs: Leveraging Proofs of Sequential Work for Blockchain Light Clients

Abstract: We revisit the problem of designing light-client blockchain protocols from the perspective of classical proof-system the...