• UMIACS - Dr. Jonathan Katz

The Impact of Network Modelling on Feasibility Results for Consensus

6th August, 2019

Abstract: Theoretical results in cryptography and distributed computing are always proved relative to some formal model that is intended to accurately capture the real world. We focus here on the effect of different network models on the feasibility of various tasks related to consensus. First, we highlight assumptions about the power of adaptive adversaries in distributed protocols, noting that while […]

  • su_portrait

iTrust-ADSC Seminar: EMI and SPE Testing: Finding 1600+ Bugs in GCC and Clang/LLVM

10th December, 2018

Abstract: This talk gives an overview of two recently developed general classes of practical techniques for validating compilers – equivalence modulo input (EMI) testing, and skeletal program enumeration (SPE) – and a continuous, extensive effort in applying/adapting them to find and report thousands of bugs across a range of production and research compilers for C/C++ (GCC, Clang/LLVM, ICC, CompCert), Scala, Rust, […]

  • raf_300x400

iTrust-ADSC Seminar: Safety and Security of Infrastructures

7th November, 2018

Abstract: In the talk, I will discuss two subjects of crucial importance for critical infrastructures: safety and security. Solutions provided by several ‘smart’ ideas: smart grids, smart cities, smart production, depend on exchange of data. Frequently, broadcasts of raw data is used, which is not secure at all. In the wrong hands data can reveal sensitive information and may also be […]

iTrust-ADSC Seminar: Safety and Security of Infrastructures & Smart Laboratory for Water Infrastructures

7th November, 2018

Title: Safety and Security of Infrastructures.

Abstract: In the talk, I will discuss two subjects of crucial importance for critical infrastructures: safety and security.  Solutions provided by several ‘smart’ ideas: smart grids, smart cities, smart production, depend on exchange of data. Frequently, broadcasts of raw data is used, which is not secure at all. In the wrong hands data can reveal […]

  • jorge

iTrust-ADSC Seminar: Smart Laboratory for Water Infrastructures

7th November, 2018

Abstract: This new laboratory will be able to reproduce water infrastructures such as district heating, water distribution and wastewater collection as well as their interconnection with the power grid. This modular laboratory will allow the users to configure different topologies and scenarios. Thus, it will make possible to test control strategies in a realistic environment before the real implementation. Therefore, the […]

  • ruby

iTrust-ADSC Seminar: Anomaly Detection in Power Grid Systems

16th October, 2018

Abstract: Security-critical infrastructures like the power grid have substations whose controllers are vulnerable to attacks, including zero-day attacks. Attacks against the control code of a power grid station can be catastrophic. Earlier detection of the attacks can prevent further damage. We propose a data-driven, deep learning architecture to detect anomalous behavior in a power-grid controller. The deep learning training is done on […]

  • PretschnerAlexander

iTrust-ADSC Seminar: Software Integrity Protection with Checker Networks and Oblivious Hashing

3rd September, 2018

Abstract: Runtime integrity assessments of software can be done using cyclic networks of monitors that periodically compute checksums of the code in memory. One problem is that these checkers are comparatively easy to spot: programs usually don’t read their own code. Oblivious hashing has been proposed as a more stealthy technique to perform state inspection for integrity assessments – but is restricted […]

  • PretschnerAlexander

iTrust Seminar: Accountability and Causality for Cyber-Physical Systems

28th August, 2018

Abstract: Accountability is the property of a system to help answer questions regarding why specific events have happened. With accountability infrastructures in place, identified reasons can be used to improve systems and to assign blame. Accountability rests on two pillars, monitoring and causality analyses. In this lecture, we focus on causality analyses and respective underlying models and show their wide applicability in […]

  • Shielded-Room2B-for-website-700x441

Workshop on IoT Security

27th August, 2018

Internet of Things (IoT) is having an exponential growth in a multitude of applications. However, the security of IoT has been always neglected, leading to large-scale attacks on IoT devices. The heterogeneous nature of IoT devices exposes them to diverse attack vectors and attacks on critical infrastructure, causing alarm for all stakeholders involved. Recent large-scale attacks such as Mirai and IoT […]

  • mc

iTrust Seminar Series – Distributed Robust Optimization: A Randomized Approach

18th July, 2018

Abstract: A wide class of interconnected systems ranging from power grid, chemical refinery plant, and water distribution system to wireless sensor network, and even swarm robotics fall in the category of cyber-physical systems. Control of such a complex networked-system has raised a number of new challenges. Conventionally, a single node or agent having access to all the information solves the control problem […]