TCS Seminar Series

Please tell Stephan Gocht if you want to give a seminar in the series. They are ideally held Mondays after lunch, but exceptions are possible.

See also information about other seminars, such as our in depth Theory reading group.

TCS Seminar Series Autumn 2018

  • 09 Oct 2018 at 13:15 in Room 4523
    Hoare Logic Contracts in Denotational Semantics
    (Dilian Gurov, KTH)

    We sketch a simple theory of Hoare logic contracts for programs with procedures, presented in denotational semantics. In particular, we give a simple semantic justification of the usual procedure-modular treatment of such programs. The justification is given by means of a proof of soundness of a contract-relative denotational semantics against the standard denotational semantics of procedures in the context of procedure declarations. The suggested formal development can be used as an inspiration for more ambitious contract theories.

  • 18 Sep 2018 at 11:00 in Room 4523
    How can the Eclipse Foundation help you promote your research in open source
    (Gaël Blondelle, Eclipse Europe)

    Eclipse has been famous for the last 17 years for the Eclipse IDE. But nowadays, the Eclipse Foundation hosts more than 350 projects in very different domains, some related to the Eclipse platform like the Eclipse Modeling stack, other focused on other domains like the IoT Working Group. With Java EE migrating to the Eclipse Foundation under the name of Jakarta EE, that’s a whole new ecosystem for enterprise Java that joins the ecosystem. Since 2013, the Eclipse Foundation Europe has been a partner of several European research projects, with the main mission to help the partners create an open source community to foster dissemination and make the results sustainable. This presentation will quickly introduce the principles of the Eclipse ecosystem, the technology landscape of the Eclipse Foundation, and how the Eclipse Foundation helps universities in Europe to publish their research results in open source.

  • 17 Sep 2018 at 13:45 in 4523
    Comparing Risk Identification in Hazard Analysis and Threat Analysis
    (Hideaki Nishihara, AIST)

    In the context of cyber-physical systems, safety and security have been discussed and dealt with separately in the past, since security was not a critical issue of safety and vice versa. They are similar in some points, and it is natural to try dealing with them in parallel or in a uni ed manner. This talk considers symmetrical treatment of safety and security, especially in identifying possible harms. We compare the result of hazard analysis and threat analysis for a single model of a small IoT system. It shows that identfied harms have much overlaps, which indicates the two analyses can be unified.

  • 17 Sep 2018 at 13:15 in 4523
    Optimal Test Suite Generation for Modified Condition Decision Coverage using SAT solving
    (Takashi Kitamura, AIST)

    Boolean expressions occur frequently in descriptions of com- puter systems, but they tend to be complex and error-prone in complex systems. The modified condition decision coverage (MCDC) criterion in system testing is an important testing technique for Boolean expression, as its usage mandated by safety standards such as DO-178 [1] (avionics) and ISO26262 [2] (automotive). In this paper, we develop an algorithm to generate optimal MCDC test suites for Boolean expressions. Our algo- rithm is based on SAT solving and generates minimal MCDC test suites. Experiments on a real-world avionics system confirm that the technique can construct minimal MCDC test suites within reasonable times, and improves significantly upon prior techniques.

  • 13 Sep 2018 at 13:15 in Room 4523
    Security and Quality Assurance for Deep Learning System
    (Lei Ma)

    Over the past decades, deep learning (DL) systems achived tremendous success and gained great popularity in various applications, e.g., robotics, image processing, speech processing, and medical diagnostics. A deep neural network (DNN), as a type of deep learning systems, is the key driving force behind its recent success. However, the security and quality assurance techniques for DL are still as the early stage, and a plethora of studies have shown that the state-of-the-art DL systems suffer from various vulnerabilities which can lead to severe consequences when applied to real-world applications. In this talk, we will touch the current state-of-the art and discuss our ongoing work towards proposing general purpose security and quality assurance technique for DL systems.

  • 12 Sep 2018 at 10:00 in 4523, Lindstedtsvägen 5
    From Runtime Failures to Patches: Study of Patch Generation in Production
    (Thomas Durieux, Inria,

    This presentation presents two new patch generation techniques that aim to remove the human intervention for patch generation. The core idea of these two techniques is to put as close as possible the patch generation to the production environment. The production environment contains the data and executions that can be analyzed to understand the behavior of the application and identify the bugs. This presentation presents our approaches to exploit this information to create patches for client and server-side applications.

Previous years' seminars.

Top page top