NavTalks
From Navigators
(Difference between revisions)
Line 64: | Line 64: | ||
<td align="center" style="width:100px">30</td> | <td align="center" style="width:100px">30</td> | ||
<td style="width:300px">João Inácio</td> | <td style="width:300px">João Inácio</td> | ||
- | <td style="width:600px"><span style="border-bottom: dashed 1px #000" title=""> | + | <td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure. |
+ | One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> | ||
<td style="width:30px"> </td> | <td style="width:30px"> </td> | ||
</tr> | </tr> |
Revision as of 14:45, 1 April 2021
The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.
Leave mouse over title's presentation to read the abstract.
Contents |
Upcoming presentations
April 2021
7 | Vasco Leitão | Discovering Association Rules Between Software System Requirements and Product Specifications | |
21 | João Caseirito | Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing |
May 2021
5 | Paulo Antunes | Web Vulnerability Discovery at an Intermediate Language Level | |
19 | Frederico Apolónia | TBD |
June 2021
2 | Bernardo Ferreira | TBD | |
16 | Žygimantas Jasiūnas and Vasco Ferreira | TBD | |
30 | João Inácio | Automatic Removal of Flaws in Embedded System Software |
July 2021
14 | André Gil | TBD | |
28 | João Valente | TBD |
Past presentations
September 2018
20 | Alysson Bessani | SMaRtChain: A Principled Design for a New Generation of Blockchains | |
20 | Rui Miguel | Named Data Networking with Programmable Switches |
October 2018
4 | Bruno Vavala (Research Scientist in Intel Labs) | Private Data Objects | |
4 | Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) | Reflective Consensus | |
18 | Yair Amir (Professor, Johns Hopkins University) | Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks |
November 2018
13 | Salvatore Signorello | The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking | |
13 | Tiago Oliveira | Vawlt - Privacy-Centered Cloud Storage | |
27 | Nuno Neves | Segurança de Software - Como Encontrar uma Agulha num Palheiro? | |
27 | Ricardo Mendes | Vawlt - The Zero-knowledge End-to-end Encryption Protocol |
December 2018
11/12 | António Casimiro | AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments | |
11/12 | Carlos Nascimento | Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot |
January 2019
15/01 | Fernando Alves | A comparison between vulnerability publishing in OSINT and Vulnerability Databases | |
15/01 | Ibéria Medeiros | SEAL: SEcurity progrAmming of web appLications | |
29/01 | Fernando Ramos | Networks that drive themselves…of the cliff | |
29/01 | Miguel Garcia | Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper) |
February 2019
19/02 | Ana Fidalgo | Conditional Random Fields and Vulnerability Detection in Web Applications | |
19/02 | João Sousa | Towards BFT-SMaRt v2: Blockchains and Flow Control |
March 2019
13/03 | Fernando Ramos | How to give a great -- OK, at least a good -- research talk | |
13/03 | Ricardo Morgado | Automatically correcting PHP web applications |
March 2019
27/03 | Nuno Dionísio | Cyberthreat Detection from Twitter using Deep Neural Networks | |
27/03 | Fernando Ramos | My network protocol is better than yours! |
April 2019
10/04 | Adriano Serckumecka | SIEMs | |
10/04 | Tulio Ribeiro | BFT Consensus & PoW Consensus (blockchain). |
May 2019
08/05 | Miguel Garcia | Diverse Intrusion-tolerant Systems | |
29/05 | Pedro Ferreira | The concept of the next navigators cybersecurity H2020 project | |
29/05 | Vinicius Cogo | Auditable Register Emulations |
June 2019
05/06 | Diogo Gonçalves | Network coding switch | |
05/06 | Francisco Araújo | Generating Software Tests To Check For Flaws and Functionalities | |
26/06 | Joao Pinto | Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles | |
26/06 | Tiago Correia | Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation | |
26/06 | Robin Vassantlal | Confidential BFT State Machine Replication |
March 2021
24 | Ana Fidalgo | Machine Learning approaches for vulnerability detection |