NavTalks

From Navigators

(Difference between revisions)
Jump to: navigation, search
(31 intermediate revisions not shown)
Line 1: Line 1:
-
<p>The Navtalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p>
+
<p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p>
<p><i>Leave mouse over title's presentation to read the abstract.</i></p>
<p><i>Leave mouse over title's presentation to read the abstract.</i></p>
-
<!--<span style="border-bottom: dashed 1px #000" title="">TESTE</span>-->
+
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>-->
<!--  
<!--  
Line 112: Line 112:
</div>
</div>
 +
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
-
 
-
<!--
 
-
###########################################################
 
-
############## UPCOMING  PRESENTATIONS#####################
 
-
########################################################### -->
 
-
 
-
<h2><strong>Upcoming  presentations</strong></h2>
 
-
 
-
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
 
<h3><strong>January 2019</strong></h3>
<h3><strong>January 2019</strong></h3>
-
<table border="0" cellspacing="0" >
+
<table border="0" cellspacing="0" style="background:#89B085">
<tr>
<tr>
             <td style="width:100px">15/01</td>
             <td style="width:100px">15/01</td>
             <td style="width:300px">Fernando Alves</td>
             <td style="width:300px">Fernando Alves</td>
-
             <td style="width:600px">&nbsp;</td>
+
             <td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td>
             <td style="width:100px">&nbsp;</td>
             <td style="width:100px">&nbsp;</td>
-
        </tr>
+
</tr>
-
<tr>
+
<tr>
<td>15/01</td>
<td>15/01</td>
<td>Ib&eacute;ria Medeiros</td>
<td>Ib&eacute;ria Medeiros</td>
-
<td>&nbsp;</td>
+
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP).  To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
</tr>
Line 139: Line 131:
<td>29/01</td>
<td>29/01</td>
<td>Fernando Ramos</td>
<td>Fernando Ramos</td>
-
<td>&nbsp;</td>
+
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
</tr>
Line 145: Line 137:
<td>29/01</td>
<td>29/01</td>
<td>Miguel Garcia</td>
<td>Miguel Garcia</td>
-
<td>&nbsp;</td>
+
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
</tr>
Line 153: Line 145:
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<h3><strong>February 2019</strong></h3>
<h3><strong>February 2019</strong></h3>
-
<table border="0" cellspacing="0" >
+
<table border="0" cellspacing="0" style="background:#89B085">
<tr>
<tr>
<td style="width:100px">19/02</td>
<td style="width:100px">19/02</td>
<td style="width:300px">Ana Fidalgo</td>
<td style="width:300px">Ana Fidalgo</td>
-
<td style="width:600px">&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td>
<td style="width:100px">&nbsp;</td>
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>19/02</td> <td>Jo&atilde;o Sousa</td>
+
<td>19/02</td>
-
<td>&nbsp;</td>
+
<td>Jo&atilde;o Sousa</td>
 +
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
</tr>
Line 170: Line 163:
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<h3><strong>March 2019</strong></h3>
<h3><strong>March 2019</strong></h3>
-
<table border="0" cellspacing="0" >
+
<table border="0" cellspacing="0" style="background:#89B085">
<tr>
<tr>
-
<td style="width:100px">12/03</td>
+
<td style="width:100px">13/03</td>
-
<td style="width:300px">Pedro Gaspar</td>
+
<td style="width:300px">Fernando Ramos</td>
-
<td style="width:600px">&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td>
<td style="width:100px">&nbsp;</td>
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>12/03</td> <td>Ricardo Morgado</td>
+
<td>13/03</td> <td>Ricardo Morgado</td>
-
<td>&nbsp;</td>
+
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
</tr>
 +
 +
</table>
 +
</div>
 +
 +
 +
 +
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
 +
<h3><strong>March 2019</strong></h3>
 +
<table border="0" cellspacing="0"  style="background:#89B085">
<tr>
<tr>
-
<td>26/03</td> <td>Andr&eacute; Oliveira</td>
+
<td style="width:100px">27/03</td>
-
<td>&nbsp;</td>
+
<td style="width:300px">Nuno Dion&iacute;sio</td>
-
<td>&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.
 +
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.
 +
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).
 +
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td>
 +
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>26/03</td> <td>Nuno Dion&iacute;sio</td>
+
        <td style="width:100px">27/03</td>
-
<td>&nbsp;</td>
+
<td style="width:300px">Fernando Ramos</td>
-
<td>&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td>
 +
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
</table>
</table>
</div>
</div>
 +
 +
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<h3><strong>April 2019</strong></h3>
<h3><strong>April 2019</strong></h3>
-
<table border="0" cellspacing="0" >
+
<table border="0" cellspacing="0" style="background:#89B085" >
<tr>
<tr>
-
<td style="width:100px">09/04</td>
+
<td style="width:100px">10/04</td>
<td style="width:300px">Adriano Serckumecka</td>
<td style="width:300px">Adriano Serckumecka</td>
-
<td style="width:600px">&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.
 +
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.
 +
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.
 +
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.
 +
">SIEMs</span></td>
<td style="width:100px">&nbsp;</td>
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>09/04</td> <td>Tulio Ribeiro</td>
+
<td>10/04</td> <td>Tulio Ribeiro</td>
-
<td>&nbsp;</td>
+
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,
 +
some challenges regarding the approaches and a brief comparison about them.
 +
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
</tr>
 +
</table>
 +
</div>
 +
 +
 +
 +
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
 +
<h3><strong>May 2019</strong></h3>
 +
<table border="0" cellspacing="0" style="background:#89B085" >
<tr>
<tr>
-
<td>30/04</td> <td>Miguel Moreira</td>
+
<td style="width:100px">08/05</td>
-
<td>&nbsp;</td>
+
<td style="width:300px">Miguel Garcia</td>
-
<td>&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!
 +
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.
 +
">Diverse Intrusion-tolerant Systems</span></td>
 +
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>30/04</td> <td>Pedro Ferreira</td>
+
<td style="width:100px">29/05</td>
-
<td>&nbsp;</td>
+
<td style="width:300px">Pedro Ferreira</td>
-
<td>&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.
 +
">The concept of the next navigators cybersecurity H2020 project</span></td>
 +
<td style="width:100px">&nbsp;</td>
 +
</tr>
 +
<tr>
 +
<td style="width:100px">29/05</td>
 +
<td style="width:300px">Vinicius Cogo</td>
 +
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).
 +
">Auditable Register Emulations</span></td>
 +
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
</table>
</table>
</div>
</div>
 +
 +
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
-
<h3><strong>May 2019</strong></h3>
+
<h3><strong>June 2019</strong></h3>
-
<table border="0" cellspacing="0" >
+
<table border="0" cellspacing="0" style="background:#89B085" >
<tr>
<tr>
-
<td style="width:100px">14/05</td>
+
<td style="width:100px">05/06</td>
<td style="width:300px">Diogo Gon&ccedil;alves</td>
<td style="width:300px">Diogo Gon&ccedil;alves</td>
-
<td style="width:600px">&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.
 +
​In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.
 +
">Network coding switch</span></td>
<td style="width:100px">&nbsp;</td>
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>14/05</td> <td>Vinicius Cogo</td>
+
<td style="width:100px">05/06</td>
-
<td>&nbsp;</td>
+
<td style="width:300px">Francisco Ara&uacute;jo</td>
-
<td>&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application.  While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. ​
 +
">Generating Software Tests To Check For Flaws and Functionalities</span></td>
 +
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>28/05</td> <td>Francisco Ara&uacute;jo</td>
+
<td style="width:100px">26/06</td>
-
<td>&nbsp;</td>
+
<td style="width:300px">Joao Pinto</td>
-
<td>&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather
 +
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.
 +
 +
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td>
 +
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>28/05</td> <td>Miguel Matos</td>
+
<td style="width:100px">26/06</td>
-
<td>&nbsp;</td>
+
<td style="width:300px">Tiago Correia</td>
-
<td>&nbsp;</td>
+
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.
 +
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.
 +
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.
 +
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td>
 +
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
 +
<tr>
 +
<td style="width:100px">26/06</td>
 +
<td style="width:300px">Robin Vassantlal</td>
 +
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. ​
 +
">Confidential BFT State Machine Replication</span></td>
 +
<td style="width:100px">&nbsp;</td>
 +
</tr>
 +
</table>
</table>
</div>
</div>
 +
 +
 +
<!--
 +
###########################################################
 +
###########################################################
 +
############## UPCOMING  PRESENTATIONS#####################
 +
###########################################################
 +
 +
 +
<h2><strong>Upcoming  presentations</strong></h2>
 +
 +
 +
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
-
<h3><strong>June 2019</strong></h3>
+
<h3><strong>July 2019</strong></h3>
<table border=0 cellspacing=0  >
<table border=0 cellspacing=0  >
<tr>
<tr>
-
<td style="width:100px">11/06</td>
+
<td style="width:100px">26/06</td>
-
<td style="width:300px">Eric Vial</td>
+
<td style="width:300px">Tiago Correia</td>
<td style="width:600px">&nbsp;</td>
<td style="width:600px">&nbsp;</td>
<td style="width:100px">&nbsp;</td>
<td style="width:100px">&nbsp;</td>
</tr>
</tr>
<tr>
<tr>
-
<td>11/06</td>
+
<td>26/06</td>
-
<td>Robin Vassantlal</td>
+
-
<td>&nbsp;</td>
+
-
<td>&nbsp;</td>
+
-
</tr>
+
-
<tr>
+
-
<td>25/06</td>
+
<td>Jo&atilde;o Pinto</td>
<td>Jo&atilde;o Pinto</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
Line 271: Line 335:
</tr>
</tr>
<tr>
<tr>
-
<td>25/06</td>
+
<td>26/06</td> <td>Robin Vassantlal</td>
-
<td>Tiago Correia</td>
+
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
</tr>
-
 
</table>
</table>
</div>
</div>
 +
-->
 +
 +
 +
 +
<!--
<!--
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px">
Line 286: Line 353:
<td>Bruno Louren&ccedil;o</td>
<td>Bruno Louren&ccedil;o</td>
</tr>
</tr>
-
<tr>
+
 
-
<td>Bruno Nunes</td>
+
-
</tr>
+
<tr>
<tr>
<td>Cl&aacute;udio Martins</td>
<td>Cl&aacute;udio Martins</td>
Line 300: Line 365:
<tr>
<tr>
<td>Hugo Amieira</td>
<td>Hugo Amieira</td>
-
</tr>
 
-
<tr>
 
-
<td>Jo&atilde;o Paulino</td>
 
</tr>
</tr>
<tr>
<tr>
Line 309: Line 371:
<tr>
<tr>
<td>Paulo Antunes</td>
<td>Paulo Antunes</td>
-
</tr>
 
-
<tr>
 
-
<td>Pedro Alves</td>
 
</tr>
</tr>
<tr>
<tr>
<td>Rui Azevedo</td>
<td>Rui Azevedo</td>
</tr>
</tr>
-
<tr>
 
-
<td>Tom&aacute;s Peixinho</td>
 
-
</tr>
 
</table>
</table>
</div>
</div>
-->
-->

Revision as of 09:37, 18 July 2019

The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.

Leave mouse over title's presentation to read the abstract.


Contents

Past presentations

September 2018

20 Alysson Bessani SMaRtChain: A Principled Design for a New Generation of Blockchains  
20 Rui Miguel Named Data Networking with Programmable Switches  

October 2018

4 Bruno Vavala (Research Scientist in Intel Labs) Private Data Objects  
4 Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) Reflective Consensus  
18 Yair Amir (Professor, Johns Hopkins University) Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks  

November 2018

13 Salvatore Signorello The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking  
13 Tiago Oliveira Vawlt - Privacy-Centered Cloud Storage  
27 Nuno Neves Segurança de Software - Como Encontrar uma Agulha num Palheiro?  
27 Ricardo Mendes Vawlt - The Zero-knowledge End-to-end Encryption Protocol  

December 2018

11/12 António Casimiro AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments  
11/12 Carlos Nascimento Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot  

January 2019

15/01 Fernando Alves A comparison between vulnerability publishing in OSINT and Vulnerability Databases  
15/01 Ibéria Medeiros SEAL: SEcurity progrAmming of web appLications  
29/01 Fernando Ramos Networks that drive themselves…of the cliff  
29/01 Miguel Garcia Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)  

February 2019

19/02 Ana Fidalgo Conditional Random Fields and Vulnerability Detection in Web Applications  
19/02 João Sousa Towards BFT-SMaRt v2: Blockchains and Flow Control  

March 2019

13/03 Fernando Ramos How to give a great -- OK, at least a good -- research talk  
13/03 Ricardo Morgado Automatically correcting PHP web applications  


March 2019

27/03 Nuno Dionísio Cyberthreat Detection from Twitter using Deep Neural Networks  
27/03 Fernando Ramos My network protocol is better than yours!  


April 2019

10/04 Adriano Serckumecka SIEMs  
10/04 Tulio Ribeiro BFT Consensus & PoW Consensus (blockchain).  


May 2019

08/05 Miguel Garcia Diverse Intrusion-tolerant Systems  
29/05 Pedro Ferreira The concept of the next navigators cybersecurity H2020 project  
29/05 Vinicius Cogo Auditable Register Emulations  


June 2019

05/06 Diogo Gonçalves Network coding switch  
05/06 Francisco Araújo Generating Software Tests To Check For Flaws and Functionalities  
26/06 Joao Pinto Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles  
26/06 Tiago Correia Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation  
26/06 Robin Vassantlal Confidential BFT State Machine Replication  




Personal tools
Navigators toolbox