Trigger-Action Platforms (TAPs) connect disparate online services and enable users to create automation rules in diverse domains such as smart homes and business productivity. Unfortunately, the current TAP design is flawed from a privacy perspective, since it has unfettered access to sensitive user data.
Who: Catalin Hritcu from Inria Paris, France \
When: 14:00 - 15:00 Thursday {{ page.date | date_to_long_string }}\
Where: Room ES52, Linsen (Maskingränd 2).\
Title: {{ page.title }}
Abstract:\
We propose a new formal criterion for evaluating secure compartmentalization schemes for unsafe languages like C and C++, expressing end-to-end security guarantees for software components that may become compromised after encountering undefined behavior—for example, by accessing an array out of bounds.
Who: Elena Pagnin from Aarhus University, Denmark \
When: 10:00 - 11:00 Thursday {{ page.date | date_to_long_string }}\
Where: Room 8103, EDIT building.\
Title: {{ page.title }}
Abstract:\
We consider the problem of outsourcing computation on data authenticated by different users.
Who: Elena Pagnin from Aarhus University, Denmark \
When: 10:00 - 11:00 Wednesday {{ page.date | date_to_long_string }}\
Where: Room Analysen, EDIT building.\
Title: {{ page.title }}
Abstract:\
As messaging applications are becoming increasingly popular, it is of utmost importance to analyze their security and mitigate existing weaknesses.
Who: Pascal Felber from the University of Neuchâtel, Switzerland \
When: 11:15 - 12:30 Friday{{ page.date | date_to_long_string }}\
Where: EL42, EDIT building.\
Title: {{ page.title }}
Abstract:\
In this talk, we will give an overview of popular trusted execution environments (TEEs), with special emphasis on Intel’s SGX, and we will describe how they can be exploited for implementing privacy-preserving operations in the Cloud that are both secure and efficient.
Who: Pablo Buiras, PhD from Chalmers, now PostDoc at Harvard university\
When: 10:30 - 11:30 Friday{{ page.date | date_to_long_string }}\
Where: room EDIT 3364\
Title: {{ page.title }}
Abstract:\
Cryptography can in principle be used to protect users' data when stored or transmitted, but in practice is error-prone and can potentially result in a violation of a user’s security concerns.
Who: room EDIT 8103\
When: 9:30-10:30{{ page.date | date_to_long_string }}\
Where: room EDIT 8103 \
Title: {{ page.title }}
Abstract:\
In this talk, I will present two lines of research I am currently pursuing.
Who: Daniel Huang \
When: 16.00 {{ page.date | date_to_long_string }}\
Where: 5128 (Grouproom) \
Title: {{ page.title }}
Abstract:\
In this talk, we will present some of our recent work on probabilistic programming languages.