printlogo
ETH Zuerich - Homepage
Information Security
 
print
  

Talks in 2009

December 15, 2009

ZISC Colloquium
Speaker: Luke O'Connor, Zurich Financial Services
Title: Some Black Swans in IT Security
Time: 17:15h
Place: HG F5

Speaker: Mohammad Torabi Dashti
Title: An open problem in combinatorics with applications to security
Time: 14:00
Place: IFW C 44

December 14, 2009

Speaker: Richard Waldinger, Artificial Intelligence Center, SRI International (link)
Title: Recursive Plans and Imperative Programs Revisited: Deductive Synthesis
Time: 15:00
Place: IFW D 42

December 8, 2009

Speaker: Jean-Raymond Abrial
Title: A new construction of the Real Number
Time: 15:00-16:00
Place: IFW D 42

December 1, 2009

ZISC Colloquium
Speaker: Claudia Diaz, Department of Electrical Engineering, K.U.Leuven
Title: The wisdom of Crowds: attacks and optimal constructions
Time: 17:15h
Place: HG F5

November 26, 2009

Speaker: Ueli Maurer
Title: Abstract Cryptography (and Security)
Time: 14:00
Place: IFW C 44

November 24, 2009

ZISC Colloquium
Speaker: Lukas Ruf, Consecom AG, Zurich
Title: Virtualization - Opportunities, Threats and Challenges
Time: 17:15h
Place: HG F5

November 17, 2009

ZISC Colloquium
Speaker: Luca Viganò, Università di Verona
Title: Automated Validation of Trust and Security of Service-oriented Architectures
Time: 17:15h
Place: HG F5

November 10, 2009

Speaker: Manuel Clavel, IMDEA Software & Univ. Complutense, Madrid, Spain
Title: Automatic Generation and Analysis of Smart, Security-Aware GUI Models
Time: 14:00
Place: IFW C 44

November 3, 2009

ZISC Colloquium
Speaker: Graham Steel, Laboratoire Spécification et Vérification, ENS-Cachan
Title: Differential attacks on PIN Process APIs
Time: 17:15h
Place: HG F5

October 28, 2009

Speaker: Silvo Ranise
Title: Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures
Time: 14:00
Place: IFW D 42

October 27, 2009

Speaker: Sylvain Hallé
Title: Runtime monitoring of a quantified temporal logic: an application to interface contracts in web applications
Time: 14:00
Place: IFW C 44

ZISC Colloquium
Speaker: Jean-Pierre Hubaux, EPFL, Lausanne
Title: Security Mechanisms with Selfish Players in Wireless Networks
Time: 17:15h
Place: HG F5

October 20, 2009

Speaker: Mario Frank
Title: Hybrid role mining
Time: 14:00
Place: IFW C 44

October 13, 2009

Speaker: Matus Harvan
Title: State-based Usage Control Enforcement with Data Flow Tracking using System
Call Interposition
Time: 14:00
Place: IFW C 44

October 6, 2009

Speaker: Christian Dax
Title: Specification Languages for Stutter-Invariant Regular Properties
Time: 13:30
Place: IFW D 44

September 29, 2009

ZISC Colloquium
Speaker: Refik Molva, EURECOM, Sophia-Antipolis
Title: Safebook - a decentralized online social network for privacy
Time: 17:15h
Place: HG F5

August 18, 2009

Speaker: Matthias Schmalz
Title: Counterexamples in Probabilistic LTL Model Checking for Markov Chains
Time: 14:00
Place: IFW C 44

June 29, 2009

Speaker: Michael Schläpfer
Title: Automatic Generation of Smart&SecGUIs from Security Design Models
Time: 14:00
Place: IFW C 44

June 16, 2009

Speaker: Eugen Zalinescu
Title: Automated Computational Verification for Cryptographic Protocol Implementations
Time: 13:00
Place: IFW C 44

June 2, 2009

Speaker: Jan Alsenz
Title: Usage Control at the CPU Level
Time: 14:00
Place: IFW D 42

May 12, 2009

Speaker: Jan Alsenz (postponed to June 2)
Title: Usage Control at the CPU Level
Speaker: Matthias Buechler
Title: Usage Control Enforcement with an Application to the X11 Protocol
Speaker: Jan-Filip Zagalak
Title: Information Flow Analysis on the Java Byte Code Level
Place: IFW C 44
Time: 14:00 - 15:30

Friday, May 8th, 2009

Speaker: Prof. Burkhart Wolff
Title: HOL-Boogie — An Interactive Prover-Backend for the Verifying C Compiler
Place: IFW C 44
Time: 14:00

Tuesday, May 5th, 2009

Speaker: Jean-Raymond Abrial
Title: Event-B Model Decomposition
Place: IFW C 44
Time: 14:00

Wednesday, April 22nd, 2009

Speaker: Michael Kirkpatrick
Title: Toward Event-Driven Context-Dependent Access Control
Place: IFW C 44
Time: 14:00

Tuesday, April 21st, 2009

Speaker: Prof. Maria Paola Bonacina
Title: Decision procedures for software verification
Place: IFW C 44
Time: 14:00

Tuesday, April 7, 2009

Speaker: Carl-Daniel Hailfinger
Title: Automatable dependency analysis of networked processes
Place: IFW C 44
Time: 14:00

Tuesday, March 31, 2009

Speaker: Andreas Fuerst
Title: Design Patterns in Event-B and Their Tool Support
Place: IFW C 44
Time: 14:00

Tuesday, March 24, 2009

Speaker: Bruno Conchinha Montalto
Title: Modeling and Reasoning About an Attacker with Cryptanalytical Capabilities
Place: IFW C 44
Time: 14:00

Tuesday, March 10, 2009

Speaker: Cas Cremers
Title: From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries
Place: IFW C 44
Time: 14:00

Wednesday, February 25, 2009

Speaker: Sergiu Bursuc
Title: Deducibility constraints
Place: IFW C 44
Time: 14:00

Tuesday, February 24, 2009

Speaker: Dr. Balder ten Cate
Title: XPath: expressive power and static analysis
Place: IFW C 44
Time: 14:00

Wednesday, January 28, 2009

Speaker: Dr. Marina Egea González
Title: An executable Formal Semantics for OCL with Applications to Model Analysis and Validation
Place: IFW C 44
Time: 11:00

Tuesday, January 6, 2009

Student semester end presentation
Speaker: Lukas Stuker
Title: Construction of the Sliding Window Protocol by Step-wise Refinement
Place: IFW C 44
Time: 14:00

 

Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
folgender Seite.

Important Note:
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.
More information

© 2011 ETH Zurich | Imprint | Disclaimer | 19 November 2010
top