Who: Peter Y A Ryan (University of Luxembourg)\
When: 14:30, June 8 \
Where: room EDIT 81033\
Title: {{ page.title }}
Abstract:\
In conventional cryptographic E2E verification schemes, voters are provided with encrypted ballots that enable them to confirm that their vote is accurately included in the tally.
Who: Thibaud Antignac\
When: 11:00 am, April 29\
Where: EDIT 8103\
Title: {{ page.title }}
Abstract:\
This talk will be about privacy engineering, a field mainly concerned with techniques, methods, and tools to systematically take into account and address privacy issues when building a system.
Who: Aslan Askarov (Aarhus University)\
When: 14:15, April 27\
Where: room ED\
Title: {{ page.title }}
Abstract:\
A promising new approach to controlling timing channels relies on distinguishing between the direct timing dependencies that are visible at the program control flow level, and the indirect timing dependencies that typically have architectural nature.
Who: Mark S. Miller (Google)\
When: 10:00, May 27 \
Where: room EDIT 3364\
Title: {{ page.title }}
Abstract:\
Support ultra-fine-grain protection domains in JavaScript. Minimizing standardization, development, explanation, and runtime costs.
Who: Steven Van Acker (Chalmers)\
When: 14:15, May 11 \
Where: room ED\
Title: {{ page.title }}
Abstract:\
Most people with an online presence these days, store large amounts of information about their lives in online web services: e-mails, pictures, medical information, … To prevent unauthorised access to their personal and private information, these web services require users to authenticate and this authentication is typically done using a username and password, transmitted for verification via a login page.
Who: Gustavo Grieco (CIFASIS - CONICET and VERIMAG) When: 11:00, May 6 in Where: room EDIT 8103 Title: {{ page.title }}
Abstract:\
Mutational fuzzing is a powerful tool to detect vulnerabilities in software.
Who: Alejandro Russo When: 11:00 am on April 15 Where: Room 3364\
Title: {{ page.title }}
Abstract:\
For several decades, researchers from different communities have independently focused on protecting confidentiality of data.
Who: Elena Pagnin When: Friday April 1, 11:00 Where: Room 8103 Title: {{ page.title }}
Abstract: This talk is supposed to give an overview of the state of the art in the area of Homomorphic Encryption (HE) and Multi-Linear Maps (MLM).
Who: Matteo Maffei\
When: Thursday, {{ page.date | date_to_long_string }}, 13:30-14:30\
Where: Room 3364\
Title: {{ page.title }}
Abstract:\
In this talk, I will present two ongoing projects on the formal verification of security properties for mobile and web applications.