https://navigators.di.fc.ul.pt/w2/index.php?title=Special:Contributions/Jcecilio&feed=atom&limit=50&target=Jcecilio&year=&month=Navigators - User contributions [en]2024-03-29T07:14:23ZFrom NavigatorsMediaWiki 1.16.5https://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2022-03-07T20:47:03Z<p>Jcecilio: /* Announcements */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Feb/2022) Pedro Ferreira, José Cecílio, Manuel Fonseca, and Vinícius Cogo invite to follow Smart2B project at the freshly launch social media [https://www.lasige.pt/smart2b-launching-social-media Link].<br />
* (Feb/2022) Robin Vassantlal and Nuno Burnay achieved at the Google Hash Code 2022 4th place at the national level.<br />
* (Jan/2022) Ibéria Medeiros and Nuno Neves publish in IEEE Transactions on Reliability, a high-impact journal.<br />
* (Jan/2022) Alysson Bessani, Tiago Guerreiro, and Cátia Pesquita are the new Executive Committee 2022/23.<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2022-March-10, 2:00pm''', Where: '''c6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Miracle_Aniakor | Miracle Aniakor]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION'''<br />
|-<br />
|}<br />
<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2022-03-07T20:46:04Z<p>Jcecilio: /* Announcements */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Feb/2022) Pedro Ferreira, José Cecílio, Manuel Fonseca, and Vinícius Cogo invite to follow Smart2B project at the freshly launch social media [https://www.lasige.pt/smart2b-launching-social-media].<br />
* (Feb/2022) Robin Vassantlal and Nuno Burnay achieved at the Google Hash Code 2022 4th place at the national level.<br />
* (Jan/2022) Ibéria Medeiros and Nuno Neves publish in IEEE Transactions on Reliability, a high-impact journal.<br />
* (Jan/2022) Alysson Bessani, Tiago Guerreiro, and Cátia Pesquita are the new Executive Committee 2022/23.<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2022-March-10, 2:00pm''', Where: '''c6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Miracle_Aniakor | Miracle Aniakor]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION'''<br />
|-<br />
|}<br />
<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2022-03-07T20:44:36Z<p>Jcecilio: /* Announcements */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Feb/2022) Pedro Ferreira, José Cecílio, Manuel Fonseca, and Vinícius Cogo invite to follow Smart2B project at the freshly launch social media.<br />
* (Feb/2022) Robin Vassantlal and Nuno Burnay achieved at the Google Hash Code 2022 4th place at the national level.<br />
* (Jan/2022) Ibéria Medeiros and Nuno Neves publish in IEEE Transactions on Reliability, a high-impact journal.<br />
* (Jan/2022) Alysson Bessani, Tiago Guerreiro, and Cátia Pesquita are the new Executive Committee 2022/23.<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2022-March-10, 2:00pm''', Where: '''c6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Miracle_Aniakor | Miracle Aniakor]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION'''<br />
|-<br />
|}<br />
<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2022-03-07T20:40:26Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2022-March-10, 2:00pm''', Where: '''c6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Miracle_Aniakor | Miracle Aniakor]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION'''<br />
|-<br />
|}<br />
<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2022-03-07T20:37:38Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="It is prevalent that buildings are one of the fastest growing energy-consuming sectors since they account for one-third of the global final energy consumption. Strategies are needed to ameliorate buildings’ energy efficiency to mitigate the impact of this growing demand. The goal of this ongoing work is to develop a context-aware predictive framework to compose and support the automated building energy self-assessment and optimization services. This presentation overviews the proposed framework and details the initial contributions on extending energy-related ontologies for better describing building subsystems and their energy consumption.">CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>November 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">26</td><br />
<td style="width:300px">Maria Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Although the putative advantages of meritocracy have already been refuted by several scientific studies, it is still largely adopted by many individuals and organisations, especially in industrialised countries. In fact, it has been shown that decisions based solely on merit may lead to gender discrimination. In the fourth chapter of her book Invisible Women: Exposing data bias in a world designed for men, Perez reviews the research related to the myth of meritocracy for women at work, with a focus on STEM companies and academia. For this presentation, Maria will present the main findings of the chapter, finishing with some solutions on how to render the workplace less designed only for men.">The Meritocracy Myth: A Gender Perspective</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The complex engineering research field of cyber-physical systems (CPS) is based on integrating computation, communication, and physical processes, providing design, modelling, and analysis techniques as a whole. In this talk, we will present an architectural model of CPS and discuss the requirements and challenges to make CPS safe.">Architectural support and mechanisms for resilient and safe control in Cyber-Physical System</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for implementing trustworthy services that has received renewed interest with the emergence of blockchains and decentralized infrastructures. A fundamental limitation of BFT SMR is that it provides integrity and availability despite a fraction of the replicas being controlled by an active adversary, but does not offer any confidentiality protection. Previous works addressed this issue by integrating secret sharing with the consensus-based framework of BFT SMR, but without providing all features required by practical systems, which include replica recovery, group reconfiguration, and acceptable performance when dealing with a large number of secrets. We present COBRA, a new protocol stack for Dynamic Proactive Secret Sharing that allows implementing confidentiality in practical BFT SMR systems. COBRA exhibits the best asymptotic communication complexity and optimal storage overhead, being able to renew 100k shares in a group of ten replicas 5 times faster than the current state of the art.">COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Connected and autonomous vehicles aim to improve passenger safety and driving quality of experience. However, current self-driving solutions still constitute an entry barrier to many potential users due to their cost and the offloading of the self-driving algorithms to reduce the onboard computing requirements. At the same time, a viable alternative requires a stable connection to the cloud. This work explores deep learning concepts to forecast mobile network KPIs. These models may ultimately be used to adjust the vehicle's operational parameters to improve network signal quality and ensure a reliable connection to the cloud servers.">Deep learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will present the complete toolchain for programming CPS as proposed in my PhD. In particular, I will discuss how Shelley, our domain-specific model checker, uses a verification algorithm that checks the integration of stateful systems and other safety properties (e.g., absence of deadlocks). This tool is able to verify systems with billions of systems in a few seconds on a personal computer. In an alternative scenario, I will also hint on how it might be possible to adapt an existing programming language (e.g., Python) to verify the same set of properties.">Safe and Modular Integration of Cyber-Physical Systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As the Internet of Things is growing considerably, there is a need for high scalability and standardization of the platform on which projects focused on remote controlling, monitoring and actuation of devices will be based.<br />
The application context of IoT projects can vary from each other. However, key factors like scalability, availability, security, reusability and maintainability will always be concerned. This project aims to develop a platform to satisfy all the key factors that are more common in IoT projects by taking advantage of existing solutions like cloud computing services that privilege the aforementioned factors without neglecting other important aspects such as security.<br />
To complement the mentioned platform, a mobile application will be created to control, monitor, and actuate devices connected to a swimming pool, proving the efficiency and quality of the scalable solution by fitting the exact description of a project to which this platform will be suitable.">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Every day more people live in cities. The quality of life in cities depends heavily on urban planning and the introduction and maintenance of urban green spaces (UGSs). The images of the earth's surface obtained by remote sensing through artificial satellites make it possible to identify the land cover through the electromagnetic spectrum, which represents a complex and time-consuming task due to the diversity of its characteristics (Trees and shrubs and their size, the type of foliage, lakes and respective banks), as well as their temporal variability, depending on the seasons. The use of Machine Learning(ML) algorithms to classify objects through satellite images, such as Support Vector Machine(SVM), Decision Tree(DT), Neural Network (NN), has been widespread in the analysis. of land cover and can therefore be used to classify UGSs.">Machine learning to predict ecological features in satellite Earth observation data</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<br />
<br />
<br />
</div><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2022-03-07T20:35:46Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="It is prevalent that buildings are one of the fastest growing energy-consuming sectors since they account for one-third of the global final energy consumption. Strategies are needed to ameliorate buildings’ energy efficiency to mitigate the impact of this growing demand. The goal of this ongoing work is to develop a context-aware predictive framework to compose and support the automated building energy self-assessment and optimization services. This presentation overviews the proposed framework and details the initial contributions on extending energy-related ontologies for better describing building subsystems and their energy consumption.">CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>November 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">26</td><br />
<td style="width:300px">Maria Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Although the putative advantages of meritocracy have already been refuted by several scientific studies, it is still largely adopted by many individuals and organisations, especially in industrialised countries. In fact, it has been shown that decisions based solely on merit may lead to gender discrimination. In the fourth chapter of her book Invisible Women: Exposing data bias in a world designed for men, Perez reviews the research related to the myth of meritocracy for women at work, with a focus on STEM companies and academia. For this presentation, Maria will present the main findings of the chapter, finishing with some solutions on how to render the workplace less designed only for men.">The Meritocracy Myth: A Gender Perspective</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The complex engineering research field of cyber-physical systems (CPS) is based on integrating computation, communication, and physical processes, providing design, modelling, and analysis techniques as a whole. In this talk, we will present an architectural model of CPS and discuss the requirements and challenges to make CPS safe.">Architectural support and mechanisms for resilient and safe control in Cyber-Physical System</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for implementing trustworthy services that has received renewed interest with the emergence of blockchains and decentralized infrastructures. A fundamental limitation of BFT SMR is that it provides integrity and availability despite a fraction of the replicas being controlled by an active adversary, but does not offer any confidentiality protection. Previous works addressed this issue by integrating secret sharing with the consensus-based framework of BFT SMR, but without providing all features required by practical systems, which include replica recovery, group reconfiguration, and acceptable performance when dealing with a large number of secrets. We present COBRA, a new protocol stack for Dynamic Proactive Secret Sharing that allows implementing confidentiality in practical BFT SMR systems. COBRA exhibits the best asymptotic communication complexity and optimal storage overhead, being able to renew 100k shares in a group of ten replicas 5 times faster than the current state of the art.">COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Connected and autonomous vehicles aim to improve passenger safety and driving quality of experience. However, current self-driving solutions still constitute an entry barrier to many potential users due to their cost and the offloading of the self-driving algorithms to reduce the onboard computing requirements. At the same time, a viable alternative requires a stable connection to the cloud. This work explores deep learning concepts to forecast mobile network KPIs. These models may ultimately be used to adjust the vehicle's operational parameters to improve network signal quality and ensure a reliable connection to the cloud servers.">Deep learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will present the complete toolchain for programming CPS as proposed in my PhD. In particular, I will discuss how Shelley, our domain-specific model checker, uses a verification algorithm that checks the integration of stateful systems and other safety properties (e.g., absence of deadlocks). This tool is able to verify systems with billions of systems in a few seconds on a personal computer. In an alternative scenario, I will also hint on how it might be possible to adapt an existing programming language (e.g., Python) to verify the same set of properties.">Safe and Modular Integration of Cyber-Physical Systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As the Internet of Things is growing considerably, there is a need for high scalability and standardization of the platform on which projects focused on remote controlling, monitoring and actuation of devices will be based.<br />
The application context of IoT projects can vary from each other. However, key factors like scalability, availability, security, reusability and maintainability will always be concerned. This project aims to develop a platform to satisfy all the key factors that are more common in IoT projects by taking advantage of existing solutions like cloud computing services that privilege the aforementioned factors without neglecting other important aspects such as security.<br />
To complement the mentioned platform, a mobile application will be created to control, monitor, and actuate devices connected to a swimming pool, proving the efficiency and quality of the scalable solution by fitting the exact description of a project to which this platform will be suitable.">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Every day more people live in cities. The quality of life in cities depends heavily on urban planning and the introduction and maintenance of urban green spaces (UGSs). The images of the earth's surface obtained by remote sensing through artificial satellites make it possible to identify the land cover through the electromagnetic spectrum, which represents a complex and time-consuming task due to the diversity of its characteristics (Trees and shrubs and their size, the type of foliage, lakes and respective banks), as well as their temporal variability, depending on the seasons. The use of Machine Learning(ML) algorithms to classify objects through satellite images, such as Support Vector Machine(SVM), Decision Tree(DT), Neural Network (NN), has been widespread in the analysis. of land cover and can therefore be used to classify UGSs.">Machine learning to predict ecological features in satellite Earth observation data</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<br />
<br />
<br />
<br />
</div><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2022-03-07T20:31:12Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="It is prevalent that buildings are one of the fastest growing energy-consuming sectors since they account for one-third of the global final energy consumption. Strategies are needed to ameliorate buildings’ energy efficiency to mitigate the impact of this growing demand. The goal of this ongoing work is to develop a context-aware predictive framework to compose and support the automated building energy self-assessment and optimization services. This presentation overviews the proposed framework and details the initial contributions on extending energy-related ontologies for better describing building subsystems and their energy consumption.">CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The complex engineering research field of cyber-physical systems (CPS) is based on integrating computation, communication, and physical processes, providing design, modelling, and analysis techniques as a whole. In this talk, we will present an architectural model of CPS and discuss the requirements and challenges to make CPS safe.">Architectural support and mechanisms for resilient and safe control in Cyber-Physical System</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for implementing trustworthy services that has received renewed interest with the emergence of blockchains and decentralized infrastructures. A fundamental limitation of BFT SMR is that it provides integrity and availability despite a fraction of the replicas being controlled by an active adversary, but does not offer any confidentiality protection. Previous works addressed this issue by integrating secret sharing with the consensus-based framework of BFT SMR, but without providing all features required by practical systems, which include replica recovery, group reconfiguration, and acceptable performance when dealing with a large number of secrets. We present COBRA, a new protocol stack for Dynamic Proactive Secret Sharing that allows implementing confidentiality in practical BFT SMR systems. COBRA exhibits the best asymptotic communication complexity and optimal storage overhead, being able to renew 100k shares in a group of ten replicas 5 times faster than the current state of the art.">COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Connected and autonomous vehicles aim to improve passenger safety and driving quality of experience. However, current self-driving solutions still constitute an entry barrier to many potential users due to their cost and the offloading of the self-driving algorithms to reduce the onboard computing requirements. At the same time, a viable alternative requires a stable connection to the cloud. This work explores deep learning concepts to forecast mobile network KPIs. These models may ultimately be used to adjust the vehicle's operational parameters to improve network signal quality and ensure a reliable connection to the cloud servers.">Deep learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will present the complete toolchain for programming CPS as proposed in my PhD. In particular, I will discuss how Shelley, our domain-specific model checker, uses a verification algorithm that checks the integration of stateful systems and other safety properties (e.g., absence of deadlocks). This tool is able to verify systems with billions of systems in a few seconds on a personal computer. In an alternative scenario, I will also hint on how it might be possible to adapt an existing programming language (e.g., Python) to verify the same set of properties.">Safe and Modular Integration of Cyber-Physical Systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As the Internet of Things is growing considerably, there is a need for high scalability and standardization of the platform on which projects focused on remote controlling, monitoring and actuation of devices will be based.<br />
The application context of IoT projects can vary from each other. However, key factors like scalability, availability, security, reusability and maintainability will always be concerned. This project aims to develop a platform to satisfy all the key factors that are more common in IoT projects by taking advantage of existing solutions like cloud computing services that privilege the aforementioned factors without neglecting other important aspects such as security.<br />
To complement the mentioned platform, a mobile application will be created to control, monitor, and actuate devices connected to a swimming pool, proving the efficiency and quality of the scalable solution by fitting the exact description of a project to which this platform will be suitable.">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Every day more people live in cities. The quality of life in cities depends heavily on urban planning and the introduction and maintenance of urban green spaces (UGSs). The images of the earth's surface obtained by remote sensing through artificial satellites make it possible to identify the land cover through the electromagnetic spectrum, which represents a complex and time-consuming task due to the diversity of its characteristics (Trees and shrubs and their size, the type of foliage, lakes and respective banks), as well as their temporal variability, depending on the seasons. The use of Machine Learning(ML) algorithms to classify objects through satellite images, such as Support Vector Machine(SVM), Decision Tree(DT), Neural Network (NN), has been widespread in the analysis. of land cover and can therefore be used to classify UGSs.">Machine learning to predict ecological features in satellite Earth observation data</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<br />
<br />
<br />
<br />
</div><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2022-03-07T20:29:28Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="It is prevalent that buildings are one of the fastest growing energy-consuming sectors since they account for one-third of the global final energy consumption. Strategies are needed to ameliorate buildings’ energy efficiency to mitigate the impact of this growing demand. The goal of this ongoing work is to develop a context-aware predictive framework to compose and support the automated building energy self-assessment and optimization services. This presentation overviews the proposed framework and details the initial contributions on extending energy-related ontologies for better describing building subsystems and their energy consumption.">CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The complex engineering research field of cyber-physical systems (CPS) is based on integrating computation, communication, and physical processes, providing design, modelling, and analysis techniques as a whole. In this talk, we will present an architectural model of CPS and discuss the requirements and challenges to make CPS safe.">Architectural support and mechanisms for resilient and safe control in Cyber-Physical System</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for implementing trustworthy services that has received renewed interest with the emergence of blockchains and decentralized infrastructures. A fundamental limitation of BFT SMR is that it provides integrity and availability despite a fraction of the replicas being controlled by an active adversary, but does not offer any confidentiality protection. Previous works addressed this issue by integrating secret sharing with the consensus-based framework of BFT SMR, but without providing all features required by practical systems, which include replica recovery, group reconfiguration, and acceptable performance when dealing with a large number of secrets. We present COBRA, a new protocol stack for Dynamic Proactive Secret Sharing that allows implementing confidentiality in practical BFT SMR systems. COBRA exhibits the best asymptotic communication complexity and optimal storage overhead, being able to renew 100k shares in a group of ten replicas 5 times faster than the current state of the art.">COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Connected and autonomous vehicles aim to improve passenger safety and driving quality of experience. However, current self-driving solutions still constitute an entry barrier to many potential users due to their cost and the offloading of the self-driving algorithms to reduce the onboard computing requirements. At the same time, a viable alternative requires a stable connection to the cloud. This work explores deep learning concepts to forecast mobile network KPIs. These models may ultimately be used to adjust the vehicle's operational parameters to improve network signal quality and ensure a reliable connection to the cloud servers.">Deep learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will present the complete toolchain for programming CPS as proposed in my PhD. In particular, I will discuss how Shelley, our domain-specific model checker, uses a verification algorithm that checks the integration of stateful systems and other safety properties (e.g., absence of deadlocks). This tool is able to verify systems with billions of systems in a few seconds on a personal computer. In an alternative scenario, I will also hint on how it might be possible to adapt an existing programming language (e.g., Python) to verify the same set of properties.">Safe and Modular Integration of Cyber-Physical Systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As the Internet of Things is growing considerably, there is a need for high scalability and standardization of the platform on which projects focused on remote controlling, monitoring and actuation of devices will be based.<br />
The application context of IoT projects can vary from each other. However, key factors like scalability, availability, security, reusability and maintainability will always be concerned. This project aims to develop a platform to satisfy all the key factors that are more common in IoT projects by taking advantage of existing solutions like cloud computing services that privilege the aforementioned factors without neglecting other important aspects such as security.<br />
To complement the mentioned platform, a mobile application will be created to control, monitor, and actuate devices connected to a swimming pool, proving the efficiency and quality of the scalable solution by fitting the exact description of a project to which this platform will be suitable.">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Every day more people live in cities. The quality of life in cities depends heavily on urban planning and the introduction and maintenance of urban green spaces (UGSs). The images of the earth's surface obtained by remote sensing through artificial satellites make it possible to identify the land cover through the electromagnetic spectrum, which represents a complex and time-consuming task due to the diversity of its characteristics (Trees and shrubs and their size, the type of foliage, lakes and respective banks), as well as their temporal variability, depending on the seasons. The use of Machine Learning(ML) algorithms to classify objects through satellite images, such as Support Vector Machine(SVM), Decision Tree(DT), Neural Network (NN), has been widespread in the analysis. of land cover and can therefore be used to classify UGSs.">Machine learning to predict ecological features in satellite Earth observation data</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<br />
<br />
<br />
<br />
</div><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2022-03-07T20:27:07Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="It is prevalent that buildings are one of the fastest growing energy-consuming sectors since they account for one-third of the global final energy consumption. Strategies are needed to ameliorate buildings’ energy efficiency to mitigate the impact of this growing demand. The goal of this ongoing work is to develop a context-aware predictive framework to compose and support the automated building energy self-assessment and optimization services. This presentation overviews the proposed framework and details the initial contributions on extending energy-related ontologies for better describing building subsystems and their energy consumption.">CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The complex engineering research field of cyber-physical systems (CPS) is based on integrating computation, communication, and physical processes, providing design, modelling, and analysis techniques as a whole. In this talk, we will present an architectural model of CPS and discuss the requirements and challenges to make CPS safe.">Architectural support and mechanisms for resilient and safe control in Cyber-Physical System</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for implementing trustworthy services that has received renewed interest with the emergence of blockchains and decentralized infrastructures. A fundamental limitation of BFT SMR is that it provides integrity and availability despite a fraction of the replicas being controlled by an active adversary, but does not offer any confidentiality protection. Previous works addressed this issue by integrating secret sharing with the consensus-based framework of BFT SMR, but without providing all features required by practical systems, which include replica recovery, group reconfiguration, and acceptable performance when dealing with a large number of secrets. We present COBRA, a new protocol stack for Dynamic Proactive Secret Sharing that allows implementing confidentiality in practical BFT SMR systems. COBRA exhibits the best asymptotic communication complexity and optimal storage overhead, being able to renew 100k shares in a group of ten replicas 5 times faster than the current state of the art.">COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Connected and autonomous vehicles aim to improve passenger safety and driving quality of experience. However, current self-driving solutions still constitute an entry barrier to many potential users due to their cost and the offloading of the self-driving algorithms to reduce the onboard computing requirements. At the same time, a viable alternative requires a stable connection to the cloud. This work explores deep learning concepts to forecast mobile network KPIs. These models may ultimately be used to adjust the vehicle's operational parameters to improve network signal quality and ensure a reliable connection to the cloud servers.">Deep learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Every day more people live in cities. The quality of life in cities depends heavily on urban planning and the introduction and maintenance of urban green spaces (UGSs). The images of the earth's surface obtained by remote sensing through artificial satellites make it possible to identify the land cover through the electromagnetic spectrum, which represents a complex and time-consuming task due to the diversity of its characteristics (Trees and shrubs and their size, the type of foliage, lakes and respective banks), as well as their temporal variability, depending on the seasons. The use of Machine Learning(ML) algorithms to classify objects through satellite images, such as Support Vector Machine(SVM), Decision Tree(DT), Neural Network (NN), has been widespread in the analysis. of land cover and can therefore be used to classify UGSs.">Machine learning to predict ecological features in satellite Earth observation data</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<br />
<br />
<br />
<br />
</div><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2022-03-07T20:25:47Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="It is prevalent that buildings are one of the fastest growing energy-consuming sectors since they account for one-third of the global final energy consumption. Strategies are needed to ameliorate buildings’ energy efficiency to mitigate the impact of this growing demand. The goal of this ongoing work is to develop a context-aware predictive framework to compose and support the automated building energy self-assessment and optimization services. This presentation overviews the proposed framework and details the initial contributions on extending energy-related ontologies for better describing building subsystems and their energy consumption.">CONTEXT-AWARE PREDICTIVE FRAMEWORK FOR BUILDING ENERGY SELF-ASSESSMENT AND OPTIMIZATION</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The complex engineering research field of cyber-physical systems (CPS) is based on integrating computation, communication, and physical processes, providing design, modelling, and analysis techniques as a whole. In this talk, we will present an architectural model of CPS and discuss the requirements and challenges to make CPS safe.">Architectural support and mechanisms for resilient and safe control in Cyber-Physical System</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for implementing trustworthy services that has received renewed interest with the emergence of blockchains and decentralized infrastructures. A fundamental limitation of BFT SMR is that it provides integrity and availability despite a fraction of the replicas being controlled by an active adversary, but does not offer any confidentiality protection. Previous works addressed this issue by integrating secret sharing with the consensus-based framework of BFT SMR, but without providing all features required by practical systems, which include replica recovery, group reconfiguration, and acceptable performance when dealing with a large number of secrets. We present COBRA, a new protocol stack for Dynamic Proactive Secret Sharing that allows implementing confidentiality in practical BFT SMR systems. COBRA exhibits the best asymptotic communication complexity and optimal storage overhead, being able to renew 100k shares in a group of ten replicas 5 times faster than the current state of the art.">COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Connected and autonomous vehicles aim to improve passenger safety and driving quality of experience. However, current self-driving solutions still constitute an entry barrier to many potential users due to their cost and the offloading of the self-driving algorithms to reduce the onboard computing requirements. At the same time, a viable alternative requires a stable connection to the cloud. This work explores deep learning concepts to forecast mobile network KPIs. These models may ultimately be used to adjust the vehicle's operational parameters to improve network signal quality and ensure a reliable connection to the cloud servers.">Deep learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<br />
<br />
<br />
<br />
</div><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Jo%C3%A3o_LoureiroJoão Loureiro2022-01-25T16:53:08Z<p>Jcecilio: Created page with "{{Person |name=João Loureiro |email=fc46796@alunos.fc.ul.pt |role=MSc student |advisor=José Cecílio, }}"</p>
<hr />
<div>{{Person<br />
|name=João Loureiro<br />
|email=fc46796@alunos.fc.ul.pt <br />
|role=MSc student<br />
|advisor=José Cecílio, <br />
}}</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2022-01-25T16:48:50Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2022-Jan-27, 2:00pm''', Where: '''Zoom: https://videoconf-colibri.zoom.us/j/84425943613?pwd=Tk5VU3BXY25NVGNCN3ZDbE5jcEtqQT09''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Robin_Vassantlal | Robin Vassantlal]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services'''<br />
|-<br />
|}<br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
|style="vertical-align: top;white-space: nowrap;" | [[João_Loureiro | João Loureiro]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Deep learning for communication optimization on autonomous vehicles'''<br />
|-<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2022-01-25T16:47:39Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2022-Jan-13, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Robin_Vassantlal | Robin Vassantlal]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services'''<br />
|-<br />
|}<br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
|style="vertical-align: top;white-space: nowrap;" | [[João_Loureiro | João Loureiro]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Deep learning for communication optimization on autonomous vehicles'''<br />
|-<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2022-01-25T16:46:43Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2022-Jan-13, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Robin_Vassantlal | Robin Vassantlal]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services'''<br />
|-<br />
|}<br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
|style="vertical-align: top;white-space: nowrap;" | João Loureiro || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Deep learning for communication optimization on autonomous vehicles'''<br />
|-<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2022-01-25T16:44:44Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The complex engineering research field of cyber-physical systems (CPS) is based on integrating computation, communication, and physical processes, providing design, modelling, and analysis techniques as a whole. In this talk, we will present an architectural model of CPS and discuss the requirements and challenges to make CPS safe.">Architectural support and mechanisms for resilient and safe control in Cyber-Physical System</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for implementing trustworthy services that has received renewed interest with the emergence of blockchains and decentralized infrastructures. A fundamental limitation of BFT SMR is that it provides integrity and availability despite a fraction of the replicas being controlled by an active adversary, but does not offer any confidentiality protection. Previous works addressed this issue by integrating secret sharing with the consensus-based framework of BFT SMR, but without providing all features required by practical systems, which include replica recovery, group reconfiguration, and acceptable performance when dealing with a large number of secrets. We present COBRA, a new protocol stack for Dynamic Proactive Secret Sharing that allows implementing confidentiality in practical BFT SMR systems. COBRA exhibits the best asymptotic communication complexity and optimal storage overhead, being able to renew 100k shares in a group of ten replicas 5 times faster than the current state of the art.">COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Connected and autonomous vehicles aim to improve passenger safety and driving quality of experience. However, current self-driving solutions still constitute an entry barrier to many potential users due to their cost and the offloading of the self-driving algorithms to reduce the onboard computing requirements. At the same time, a viable alternative requires a stable connection to the cloud. This work explores deep learning concepts to forecast mobile network KPIs. These models may ultimately be used to adjust the vehicle's operational parameters to improve network signal quality and ensure a reliable connection to the cloud servers.">Deep learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Deep Learning is a relatively new method in the machine learning industry that has been used for a variety of tasks; it has sparked considerable attention among academics worldwide. Deep learning has been applied to complicated problems that need a high degree of human intelligence, most notably in the healthcare industry. One of the medical sectors that deep learning is widely used is radiology. In radiology, different radiographic techniques are used to identify brain tumors, which are among the most severe and fatal types of tumors, with a limited survival rate if not treated at its early stage. While classifying tumors in radiographic images is a critical task in the health sector, it is a hard and time-consuming procedure that radiologists must undertake, with the accuracy of their analysis entirely depending on their knowledge. Today's radiological diagnostic, such as magnetic resonance (MR) tests, is mostly subjective and may be inadequately accurate, posing a significant danger to patients. As a result, harnessing Artificial Intelligence (AI) technologies to decrease diagnostic mistakes is critical. This work used deep learning and radiomics to develop an automated approach for identifying cancers in patients using magnetic resonance imaging (MRI) datasets from kaggle third party API database. The suggested approach employs a Convolutional Neural Network (CNN) with transfer learning as our deep learning model for performing binary classification on our magnetic resonance images. In other words, this study used a pre-trained AlexNet model and moved it to a CNN architecture, and then assessed the model's efficacy and performance using an image dataset that the model had never seen after training, achieving an accuracy of 93.1 percent.">BRAIN TUMOR CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2022-01-10T21:16:59Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2022-Jan-13, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Rohit_Kumar | Rohit Kumar]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Architectural support and mechanisms for resilient and safe control in Cyber-Physical System'''<br />
|-<br />
|}<br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
|style="vertical-align: top;white-space: nowrap;" | Daniel Ângelo || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Privacy-preserving Deanonymization of Dark Web Tor OnionvServices for Criminal Investigations'''<br />
|-<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2022-01-10T21:08:00Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The complex engineering research field of cyber-physical systems (CPS) is based on integrating computation, communication, and physical processes, providing design, modelling, and analysis techniques as a whole. In this talk, we will present an architectural model of CPS and discuss the requirements and challenges to make CPS safe.">Architectural support and mechanisms for resilient and safe control in Cyber-Physical System</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Deep-learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Deep Learning is a relatively new method in the machine learning industry that has been used for a variety of tasks; it has sparked considerable attention among academics worldwide. Deep learning has been applied to complicated problems that need a high degree of human intelligence, most notably in the healthcare industry. One of the medical sectors that deep learning is widely used is radiology. In radiology, different radiographic techniques are used to identify brain tumors, which are among the most severe and fatal types of tumors, with a limited survival rate if not treated at its early stage. While classifying tumors in radiographic images is a critical task in the health sector, it is a hard and time-consuming procedure that radiologists must undertake, with the accuracy of their analysis entirely depending on their knowledge. Today's radiological diagnostic, such as magnetic resonance (MR) tests, is mostly subjective and may be inadequately accurate, posing a significant danger to patients. As a result, harnessing Artificial Intelligence (AI) technologies to decrease diagnostic mistakes is critical. This work used deep learning and radiomics to develop an automated approach for identifying cancers in patients using magnetic resonance imaging (MRI) datasets from kaggle third party API database. The suggested approach employs a Convolutional Neural Network (CNN) with transfer learning as our deep learning model for performing binary classification on our magnetic resonance images. In other words, this study used a pre-trained AlexNet model and moved it to a CNN architecture, and then assessed the model's efficacy and performance using an image dataset that the model had never seen after training, achieving an accuracy of 93.1 percent.">BRAIN TUMOR CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2022-01-10T21:01:11Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Deep-learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Deep Learning is a relatively new method in the machine learning industry that has been used for a variety of tasks; it has sparked considerable attention among academics worldwide. Deep learning has been applied to complicated problems that need a high degree of human intelligence, most notably in the healthcare industry. One of the medical sectors that deep learning is widely used is radiology. In radiology, different radiographic techniques are used to identify brain tumors, which are among the most severe and fatal types of tumors, with a limited survival rate if not treated at its early stage. While classifying tumors in radiographic images is a critical task in the health sector, it is a hard and time-consuming procedure that radiologists must undertake, with the accuracy of their analysis entirely depending on their knowledge. Today's radiological diagnostic, such as magnetic resonance (MR) tests, is mostly subjective and may be inadequately accurate, posing a significant danger to patients. As a result, harnessing Artificial Intelligence (AI) technologies to decrease diagnostic mistakes is critical. This work used deep learning and radiomics to develop an automated approach for identifying cancers in patients using magnetic resonance imaging (MRI) datasets from kaggle third party API database. The suggested approach employs a Convolutional Neural Network (CNN) with transfer learning as our deep learning model for performing binary classification on our magnetic resonance images. In other words, this study used a pre-trained AlexNet model and moved it to a CNN architecture, and then assessed the model's efficacy and performance using an image dataset that the model had never seen after training, achieving an accuracy of 93.1 percent.">BRAIN TUMOR CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-13T21:08:21Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2021-Dec-16, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Paulo_Antunes | Paulo Antunes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Web Vulnerability Discovery at an Intermediate Language Level'''<br />
|-<br />
|<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2021-12-13T21:06:44Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tor is one of the most popular anonymity networks in the world. Users of this platform range from dissidents to cybercriminals or even ordinary citizens concerned with their privacy. It is based on advanced security mechanisms to provide strong guarantees against traffic correlation attacks that can deanonymize its users and services.<br />
Torpedo is the first known traffic correlation attack on Tor that aims at deanonymizing OS sessions. In a federated way, servers belonging to ISPs around the globe can process deanonymization queries of specific IPs. With the abstraction of an interface, these queries can be submitted by an attacker to deanonymize OSes and clients.<br />
Initial results show that this attack is able to identify the IP addresses of OS sessions with high confidence (no false positives). However, the current version of Torpedo relies on a central authority to manage the system, which requires ISPs to share sensitive network traffic of their<br />
clients with a third party.<br />
Thus, this work seeks to complement the previously developed research with the introduction and study of multi-party computation (MPC) techniques, with the objective of developing and assessing a new attack vector on Tor that can work even if ISPs encrypt their network traffic before correlation. In more detail, we intend to leverage, test and assess some existing general-purpose and machine learning oriented MPC frameworks and build a privacy- preserving solution on top of Torpedo that satisfies its scalability and performance requirements.">Privacy-preserving Deanonymization of Dark Web Tor Onion Services for Criminal Investigations</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Deep-learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Deep Learning is a relatively new method in the machine learning industry that has been used for a variety of tasks; it has sparked considerable attention among academics worldwide. Deep learning has been applied to complicated problems that need a high degree of human intelligence, most notably in the healthcare industry. One of the medical sectors that deep learning is widely used is radiology. In radiology, different radiographic techniques are used to identify brain tumors, which are among the most severe and fatal types of tumors, with a limited survival rate if not treated at its early stage. While classifying tumors in radiographic images is a critical task in the health sector, it is a hard and time-consuming procedure that radiologists must undertake, with the accuracy of their analysis entirely depending on their knowledge. Today's radiological diagnostic, such as magnetic resonance (MR) tests, is mostly subjective and may be inadequately accurate, posing a significant danger to patients. As a result, harnessing Artificial Intelligence (AI) technologies to decrease diagnostic mistakes is critical. This work used deep learning and radiomics to develop an automated approach for identifying cancers in patients using magnetic resonance imaging (MRI) datasets from kaggle third party API database. The suggested approach employs a Convolutional Neural Network (CNN) with transfer learning as our deep learning model for performing binary classification on our magnetic resonance images. In other words, this study used a pre-trained AlexNet model and moved it to a CNN architecture, and then assessed the model's efficacy and performance using an image dataset that the model had never seen after training, achieving an accuracy of 93.1 percent.">BRAIN TUMOR CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2021-12-09T12:24:34Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate representation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Deep-learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Deep Learning is a relatively new method in the machine learning industry that has been used for a variety of tasks; it has sparked considerable attention among academics worldwide. Deep learning has been applied to complicated problems that need a high degree of human intelligence, most notably in the healthcare industry. One of the medical sectors that deep learning is widely used is radiology. In radiology, different radiographic techniques are used to identify brain tumors, which are among the most severe and fatal types of tumors, with a limited survival rate if not treated at its early stage. While classifying tumors in radiographic images is a critical task in the health sector, it is a hard and time-consuming procedure that radiologists must undertake, with the accuracy of their analysis entirely depending on their knowledge. Today's radiological diagnostic, such as magnetic resonance (MR) tests, is mostly subjective and may be inadequately accurate, posing a significant danger to patients. As a result, harnessing Artificial Intelligence (AI) technologies to decrease diagnostic mistakes is critical. This work used deep learning and radiomics to develop an automated approach for identifying cancers in patients using magnetic resonance imaging (MRI) datasets from kaggle third party API database. The suggested approach employs a Convolutional Neural Network (CNN) with transfer learning as our deep learning model for performing binary classification on our magnetic resonance images. In other words, this study used a pre-trained AlexNet model and moved it to a CNN architecture, and then assessed the model's efficacy and performance using an image dataset that the model had never seen after training, achieving an accuracy of 93.1 percent.">BRAIN TUMOR CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2021-12-09T11:56:32Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Deep-learning for communication optimization on autonomous vehicles</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Developing a scalable IoT solution for remote monitoring and control</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Deep Learning is a relatively new method in the machine learning industry that has been used for a variety of tasks; it has sparked considerable attention among academics worldwide. Deep learning has been applied to complicated problems that need a high degree of human intelligence, most notably in the healthcare industry. One of the medical sectors that deep learning is widely used is radiology. In radiology, different radiographic techniques are used to identify brain tumors, which are among the most severe and fatal types of tumors, with a limited survival rate if not treated at its early stage. While classifying tumors in radiographic images is a critical task in the health sector, it is a hard and time-consuming procedure that radiologists must undertake, with the accuracy of their analysis entirely depending on their knowledge. Today's radiological diagnostic, such as magnetic resonance (MR) tests, is mostly subjective and may be inadequately accurate, posing a significant danger to patients. As a result, harnessing Artificial Intelligence (AI) technologies to decrease diagnostic mistakes is critical. This work used deep learning and radiomics to develop an automated approach for identifying cancers in patients using magnetic resonance imaging (MRI) datasets from kaggle third party API database. The suggested approach employs a Convolutional Neural Network (CNN) with transfer learning as our deep learning model for performing binary classification on our magnetic resonance images. In other words, this study used a pre-trained AlexNet model and moved it to a CNN architecture, and then assessed the model's efficacy and performance using an image dataset that the model had never seen after training, achieving an accuracy of 93.1 percent.">BRAIN TUMOR CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">Lightweight Cryptography for Internet of Things (IoT) Devices</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2021-12-09T11:47:23Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Deep Learning is a relatively new method in the machine learning industry that has been used for a variety of tasks; it has sparked considerable attention among academics worldwide. Deep learning has been applied to complicated problems that need a high degree of human intelligence, most notably in the healthcare industry. One of the medical sectors that deep learning is widely used is radiology. In radiology, different radiographic techniques are used to identify brain tumors, which are among the most severe and fatal types of tumors, with a limited survival rate if not treated at its early stage. While classifying tumors in radiographic images is a critical task in the health sector, it is a hard and time-consuming procedure that radiologists must undertake, with the accuracy of their analysis entirely depending on their knowledge. Today's radiological diagnostic, such as magnetic resonance (MR) tests, is mostly subjective and may be inadequately accurate, posing a significant danger to patients. As a result, harnessing Artificial Intelligence (AI) technologies to decrease diagnostic mistakes is critical. This work used deep learning and radiomics to develop an automated approach for identifying cancers in patients using magnetic resonance imaging (MRI) datasets from kaggle third party API database. The suggested approach employs a Convolutional Neural Network (CNN) with transfer learning as our deep learning model for performing binary classification on our magnetic resonance images. In other words, this study used a pre-trained AlexNet model and moved it to a CNN architecture, and then assessed the model's efficacy and performance using an image dataset that the model had never seen after training, achieving an accuracy of 93.1 percent.">BRAIN TUMOR CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Wireless Sensor Networks used in aquatic environments for continuous monitoring are constantly being affected by physical or environmental factors that create anomalies in collected data by the sensors. This presentation explains the use and reformulation of a previously created framework in the context of the AQUAMON project. The objective of this work is to use this framework in the AQUAMON project to help detect and correct data collected from different sensors and implement a dashboard for a more comprehensive view of real-time data.">Integration of various data sources and implementation of a dashboard for the remotemonitorization system</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2021-12-09T11:45:37Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Deep Learning is a relatively new method in the machine learning industry that has been used for a variety of tasks; it has sparked considerable attention among academics worldwide. Deep learning has been applied to complicated problems that need a high degree of human intelligence, most notably in the healthcare industry. One of the medical sectors that deep learning is widely used is radiology. In radiology, different radiographic techniques are used to identify brain tumors, which are among the most severe and fatal types of tumors, with a limited survival rate if not treated at its early stage. While classifying tumors in radiographic images is a critical task in the health sector, it is a hard and time-consuming procedure that radiologists must undertake, with the accuracy of their analysis entirely depending on their knowledge. Today's radiological diagnostic, such as magnetic resonance (MR) tests, is mostly subjective and may be inadequately accurate, posing a significant danger to patients. As a result, harnessing Artificial Intelligence (AI) technologies to decrease diagnostic mistakes is critical. This work used deep learning and radiomics to develop an automated approach for identifying cancers in patients using magnetic resonance imaging (MRI) datasets from kaggle third party API database. The suggested approach employs a Convolutional Neural Network (CNN) with transfer learning as our deep learning model for performing binary classification on our magnetic resonance images. In other words, this study used a pre-trained AlexNet model and moved it to a CNN architecture, and then assessed the model's efficacy and performance using an image dataset that the model had never seen after training, achieving an accuracy of 93.1 percent.">BRAIN TUMOR CLASSIFICATION USING CONVOLUTIONAL NEURAL NETWORK</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2021-12-09T11:41:26Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">27</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">10</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2021-12-09T11:36:48Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>December 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">Bruno Matos</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>January 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Carlos Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">Daniel Ângelo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Robin Vassantlal</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Loureiro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>February 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Rohit Kumar</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">David Silva</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Adriano Mão de Ferro</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>March 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miracle Aniakor</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">Diogo Duarte</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Nuno Dionísio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Samaneh Shafee</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">Diogo Pires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Žygimantas Jasiūnas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>May 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Allan Espíndola</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">Gabriel Freitas</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Tiago R. N. Carvalho</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Gonçalo Reis</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Rafael Ramires</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">Inês Sousa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Pedro Rosa</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Jorge Martins</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Pedro Alves</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Lívio Rodrigues</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2022</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">Miguel Oliveira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table> <br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2021-12-09T11:19:02Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In the domain of IoT(Internet of Things), there is a correlation between the efficiency and effectiveness of a platform, and the quality of the data available for processing and decision making. When a scenario of data collection from different types of sensors, integrated into several devices that are distributed alongside the building, is presented. And, considering that data is essential to monitor and control the level of actuation in the building, the process becomes a matter of extreme importance.<br />
Because of it, there is the intention of developing a platform, capable of evaluating data quality that are collected from the devices of the building, and to prevent a situation where, low quality data puts at risk the proper functioning of the component responsible for the monitoring and control, in a way, that suppresses the effects of low quality data and error propagation.<br />
For that to happen, methods and techniques which target themes like data quality, fault detection and fault mitigation, will be presented, developed, evaluated and implemented.">Data quality and dependability of IoT platform for buildings energy assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T11:10:15Z<p>Jcecilio: /* Announcements */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Jun/2021) Alysson Bessani and Nuno Neves's paper, co-authored by alumnus Miguel Garcia Henriques et al., won the DSN-2021 Test-of-Time Award.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2021-Dec-16, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Paulo_Antunes | Paulo Antunes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Bruno_Matos | Bruno Matos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T11:06:07Z<p>Jcecilio: /* Announcements */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project started.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project started.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2021-Dec-16, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Paulo_Antunes | Paulo Antunes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Bruno_Matos | Bruno Matos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T11:05:00Z<p>Jcecilio: /* Announcements */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Oct/2021) Ana Respício was one of the recipients of the IFIP Service Award.<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project starts.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project starts.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2021-Dec-16, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Paulo_Antunes | Paulo Antunes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Bruno_Matos | Bruno Matos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T11:03:01Z<p>Jcecilio: /* Announcements */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2021) The 1st release of the promotional video of EU H2020 ADMORPH’s project was delivered [https://youtu.be/MSdXloMfzmQ video].<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project starts.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project starts.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2021-Dec-16, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Paulo_Antunes | Paulo Antunes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Bruno_Matos | Bruno Matos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T10:59:34Z<p>Jcecilio: /* Announcements */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Sep/2021) The EU H2020 Smart building management in the clouds (SMART2B) project starts.<br />
* (Sep/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project starts.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2021-Dec-16, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Paulo_Antunes | Paulo Antunes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Bruno_Matos | Bruno Matos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T10:58:35Z<p>Jcecilio: /* Announcements */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Out/2021) The EU H2020 Smart building management in the clouds (SMART2B) project starts.<br />
* (Out/2021) Alysson Bessani won the best paper award at SRDS 2021.<br />
* (Dec/2020) The Very Efficient Deep Learning in IoT (VEDLIoT) project starts.<br />
<br />
<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
<br />
<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2021-Dec-16, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Paulo_Antunes | Paulo Antunes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Bruno_Matos | Bruno Matos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Navtalk_EventsNavtalk Events2021-12-09T10:41:29Z<p>Jcecilio: </p>
<hr />
<div>== Past Events ==<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2021-Dec-2, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Ana_Fidalgo | Maria Fidalgo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''The Meritocracy Myth: A Gender Perspective'''<br />
|-<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2021-Nov-18, 3:00pm''', Where: '''room 6.3.27''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Allan_Espindola | Allan Espindola]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Methodology for preparing a survey '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Alysson_Bessani | Alysson Bessani]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''How to Research in Navigators'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jul-4, 12:00am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Alan Oliveira || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''System Identification Attacks, Model-based Offensives and Countermeasures in Networked Control Systems '''<br />
|-<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jun-20, 11:30am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Luiz Rust || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Cyber security for Smart Devices'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jun-6, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[João_Sousa | João Sousa]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Tiago_Oliveira | Tiago Oliveira]] and [[Ricardo_Mendes | Ricardo Mendes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Vawlt - from Science to Business'''<br />
|}<br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-May-23, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Nuno Dionisio || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Improving Cyberthreat Discovery in Open Source Intelligence using Deep Learning Techniques '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Pedro_Ferreira | Pedro Ferreira]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Artificial Intelligence for Agricultural Production in Protected Environments'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-May-2, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Paulo Antunes || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Monitoring Web Applications for Vulnerability Removal Under Attack'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[AdrianoSerckumecka | Adriano Serckumecka]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Putting SIEMs in the Cloud'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Apr-18, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Fernando_Alves | Fernando Alves]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''OSINT-Based Data-Driven Cybersecurity Discovery'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Aurélien Bettini || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Representation and generation of IoC extracted from OSINT'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Apr-4, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Wilson Melo || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Decentralized Metrological Surveillance of Fuel Pumps'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Vinicius_Vielmo_Cogo | Vinicius Cogo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''On the Challenges of Deduplicating Human Genomic Sequencing Data'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Mar-21, 12:15pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Ibéria_Medeiros | Ibéria Medeiros]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Detecting Web Application Vulnerabilities using Fuzzing and Symbolic Execution'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Tomás Peixinho || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Securing the internet at the exchange point with a blockchain'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Mar-7, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Nuno_Ferreira_Neves | Nuno Neves]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' dry run talk SUPERCLOUD final review'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Eric_Vial| Eric Vial]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''dry run demo SUPERCLOUD final review'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Feb-21, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Rui_Azevedo | Rui Azevedo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure SIEM using OSINT for avoiding threats'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Feb-7, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Miguel Garcia | Miguel Garcia]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' BFT-controllers for Intrusion-tolerant systems'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Fernando Ramos | Fernando Ramos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Logically centralising the Software-Defined Network'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2018-Jan-17, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[José_Rufino | José Rufino]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' NORTH - Non-intrusive Observation and RunTime verification of cyber-pHysical systems'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[António_Casimiro | António Casimiro]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Membership-based Maneuver Negotiation in Safety-critical Vehicular Systems'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Dec-6, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Rui Miguel ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Named Data Networking with Programmable Switches'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' GINJA: One-dollar Cloud-based Disaster Recovery for Databases'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Nov-22, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Wilson Melo''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' How Blockchains can help Legal Metrology<br />
'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Nov-8, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Max Alaluna''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Multi-Cloud Network Virtualization'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Túlio Ribeiro''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Heimdall: a Distributed and Fault Tolerant Update Aware SDN Controller '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Oct-24, 12pm''', Where: '''room 8.2.19''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eduardo Viegas (PUCPR)''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network-based Intrusion Detection: on Protecting a Moving Target'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ricardo Fonseca''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Demonstration of resilient communications in the context of a smart grid'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171012 NavTalk], When: '''Tue 2017-Oct-12, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' How to do Research in Navigators/LASIGE '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170926 NavTalk], When: '''Tue 2017-Sep-26, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Oliver Michel (guest speaker) ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network Defragmentation in Virtualized Data Centers '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170614 NavTalk], When: '''Wednesday 2017-Jun-14, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ibéria Medeiros ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Demonstrating a Tool for Injection Attack Prevention in MySQL '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Ramos ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''uPVN: User-centric Programmable Virtual Networks '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170517 NavTalk], When: '''Wednesday 2017-May-31, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Miguel Correia ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Detecting Malicious Hosts Using Traffic Flows '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Sileshi Demesi Yalew ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Mobile Device Security with ARM TrustZone '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170517 NavTalk], When: '''Friday 2017-May-19, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' João Silva ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Distributed implementation of evolutionary algorithms '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Diogo Pinto ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' (to be rescheduled) ''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170503 NavTalk], When: '''Wednesday, 2017-May-03, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Rui Miguel ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' P4: Programming Protocol-Independent Packet Processors (Bosshart et al., SIGCOMM'14) '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fabio Pereria ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network Monitoring in a Secure and Efficient Way '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170419 NavTalk], When: '''Wednesday, 2017-Apr-19, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Bruno Nunes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Live Migration of Networks '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Pedro Alves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Smarter Routing for a Smarter Grid '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170405 NavTalk], When: '''Wednesday, 2017-Apr-05, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Antonio Casimiro ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Enforcing Timeliness and Safety in Mission-Critical Systems '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eunice Branco ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Cyberthreat Discovery in Open Source Intelligence using Deep Learning Techniques '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170308 NavTalk], When: '''Wednesday, 2017-Mar-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Miguel Falé ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Protecting WAP from infinite recursion '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Henrique Mendes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Securing DLMS/COSEM implementations for use in the smart grid '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170308 NavTalk], When: '''Wednesday, 2017-Mar-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Adriano Serckumecka ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Collection and monitoring of security events to feed SIEMs '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eric Vial, Max Alaluna,<br> Fernando Ramos ''' || style="vertical-align: top;" | present || style="vertical-align: top;" | ''' Demonstration of Sirius, a Multi-Cloud Network Virtualization Platform '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170222 NavTalk], When: '''Wednesday, 2017-Feb-22, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Nuno Neves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Intrusion Tolerant Eclipse SCADA '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Bruno Vavala ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Tera-scale Data Crunching with a Small TCB '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170208 NavTalk], When: '''Wednesday, 2017-Feb-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Tiago Oliveira ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Exploring Key-Value Stores in Multi-Writer Byzantine-Resilient Register Emulations '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Max Alanuna ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Sehen: Secure Yet Efficient Virtual Network Embedding in a Multi-Cloud Environment '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170208 NavTalk], When: '''Wednesday, 2017-Jan-25, 12pm-2pm''', <br> Where: '''(exceptionally) room 6.2.46''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Altair Santin ''' <br>(guest speaker) || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Segurança para ambiente de Smart Grid <br />
(Security for Smart Grid Environments)'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' João Sousa ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Practical experiences with a BFT middleware database '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170113 NavTalk], When: '''Thursday, 2017-Jan-13, 12pm-2pm''', <br> Where: '''(exceptionally) room 6.1.25''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' José Rufino ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' The (Hidden) Potential of Non-Intrusive Runtime Verification '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Inês Gouveia ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Enforcing Safety and Security Through Non-Intrusive Runtime Verification '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161216 NavTalk], When: '''Thursday, 2016-Dec-16, 12.30pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Alves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Machine Learning with Big Data - Specialized distributed systems for machine learning purposes '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ibéria Medeiros ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Attacks, you shall not pass! SEPTIC will not avail you. '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161202 NavTalk], When: '''Thursday, 2016-Dec-02, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Pedro Costa ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161118 NavTalk], When: '''Thursday, 2016-Nov-17, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Vinicius Cogo ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Getting Started on LSH '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ricardo Mendes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Janus: User-defined Cloud-backed Storage '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161103 NavTalk], When: '''Thursday, 2016-Nov-03, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Dependable Storage and Computing using Multiple Cloud Providers '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Túlio Ribeiro ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Floodlight Tracing, Durable and Fault Tolerant '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161020 NavTalk], When: '''Thursday, 2016-Oct-20, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Ramos ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''No more excuses: it’s time to secure BGP! '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Miguel Garcia''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' On the Origin of Diversity, by Means of Cluster Selection, or the Preservation of Favoured OSes in the Struggle for Dependability '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161006 NavTalk], When: '''Thursday, 2016-Oct-06, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '''Eric Vial''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Packet Manipulation Tools for Linux '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Ricardo Fonseca''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Securing SDN-based monitoring - obstacles and learned insights '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160617 NavTalk], When: '''Friday, 2016-Jun-17, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '''Bruno Vavala''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Identification of Actively Executed Code on a Generic Trusted Component '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''André Nogueira''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Making the SCADA System Intrusion Tolerant '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Georg Jäger''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Safety Dependent Sensor Data Processing in Dynamic Composed Systems '''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160603 NavTalk], When: '''Friday, 2016-Jun-03, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Antonio Casimiro''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' ''' Open challenges for dependable autonomous and cooperative cars ''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Max Alaluna''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' (Literally) above the clouds: virtualizing the network over multiple clouds '''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160520 NavTalk], When: '''Friday, 2016-May-20, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Alysson Bessani ''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''The DiSIEM (Diversity-enhancements for SIEMs) Project''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Tiago Santos''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Intrusion detection and response on mobile devices'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160506 NavTalk], When: '''Friday, 2016-May-06, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Nuno Ferreira''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''Securing OEM controllers in a SDN environment''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Fernando Ramos''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Blending photons with electrons to reduce the energy footprint of IPTV networks'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160422 NavTalk], When: '''Friday, 2016-Apr-22, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Sebastian Zug''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''GNSS Quality Forecasting for UAV Trajectory Planning in Urban Environments''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''André Correia''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Discovering security threats in social networks'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160408 NavTalk], When: '''Friday, 2016-Apr-08, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Costa'' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Medusa: An Efficient Cloud Fault-Tolerant MapReduce''<br />
|}<br />
<br />
''(Friday, 2016-Mar-25 '''Easter break -- No Navtalk''')''<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160311 NavTalk], '''When''': Friday, 2016-Mar-11, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Frederico Brito'' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Towards Resilient Segment Routing''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Joel Alcantara'' || style="vertical-align: top;" | presents || ''Low-cost Cloud-based Disaster Recovery for Transactional Databases''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160226 NavTalk], '''When''': Friday, 2016-Feb-26, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Fabien Charmet <br/> (Telecom Sud Paris) '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Implementation of security policy in SDN environment''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Luis Ferrolho'' || style="vertical-align: top;" | presents || ''Secure and Dependable Virtual Network Embedding''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160212 NavTalk], '''When''': Friday, 2016-Feb-12, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Ferreira'' || style="vertical-align: top;" | presents || ''Entropy based unsupervised selection of data sets for improved model fitting''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''José Soares '' || style="vertical-align: top;" | presents || ''Live migration of networks in a multi-cloud environment''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160129 NavTalk], '''When''': Friday, 2016-Jan-29, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Diogo Duarte'' || style="vertical-align: top;" | presents || ''Vulnerability Detection in SDN Switches''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Tiago Oliveira'' || style="vertical-align: top;" | presents || ''Exploring Key-Value Stores in register emulations''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160115 NavTalk], '''When''': Friday, 2016-Jan-15, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Nuno Neves'' || style="vertical-align: top;" | presents || ''Making WAP Really Discover 0-day Vulnerabilities with Less Errors''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Maia'' || style="vertical-align: top;" | presents || ''Resilient Communications in Smart Grids''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] '''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks NavTalk], '''When''': Friday, 2015-Dec-18, 12h00-14h00, '''Where''': room C6.3.38 <br/><br />
:Title: ''' Vulnerability discovery in powerline communication ''' <br/><br />
:Speaker: '''Fernando Alves''' <br/><br />
:Title: '''Distribution, fault tolerance & consistency in SDN control: Pick three''' <br/><br />
:Speaker: '''Andre Mantas''' <br/><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] '''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Navtalk_EventsNavtalk Events2021-12-09T10:40:06Z<p>Jcecilio: </p>
<hr />
<div>== Past Events ==<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2021-Dec-2, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Maria_Fidalgo | Maria Fidalgo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''The Meritocracy Myth: A Gender Perspective'''<br />
|-<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2021-Nov-18, 3:00pm''', Where: '''room 6.3.27''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Allan_Espindola | Allan Espindola]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Methodology for preparing a survey '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Alysson_Bessani | Alysson Bessani]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''How to Research in Navigators'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jul-4, 12:00am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Alan Oliveira || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''System Identification Attacks, Model-based Offensives and Countermeasures in Networked Control Systems '''<br />
|-<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jun-20, 11:30am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Luiz Rust || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Cyber security for Smart Devices'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jun-6, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[João_Sousa | João Sousa]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Tiago_Oliveira | Tiago Oliveira]] and [[Ricardo_Mendes | Ricardo Mendes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Vawlt - from Science to Business'''<br />
|}<br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-May-23, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Nuno Dionisio || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Improving Cyberthreat Discovery in Open Source Intelligence using Deep Learning Techniques '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Pedro_Ferreira | Pedro Ferreira]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Artificial Intelligence for Agricultural Production in Protected Environments'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-May-2, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Paulo Antunes || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Monitoring Web Applications for Vulnerability Removal Under Attack'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[AdrianoSerckumecka | Adriano Serckumecka]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Putting SIEMs in the Cloud'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Apr-18, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Fernando_Alves | Fernando Alves]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''OSINT-Based Data-Driven Cybersecurity Discovery'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Aurélien Bettini || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Representation and generation of IoC extracted from OSINT'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Apr-4, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Wilson Melo || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Decentralized Metrological Surveillance of Fuel Pumps'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Vinicius_Vielmo_Cogo | Vinicius Cogo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''On the Challenges of Deduplicating Human Genomic Sequencing Data'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Mar-21, 12:15pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Ibéria_Medeiros | Ibéria Medeiros]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Detecting Web Application Vulnerabilities using Fuzzing and Symbolic Execution'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Tomás Peixinho || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Securing the internet at the exchange point with a blockchain'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Mar-7, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Nuno_Ferreira_Neves | Nuno Neves]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' dry run talk SUPERCLOUD final review'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Eric_Vial| Eric Vial]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''dry run demo SUPERCLOUD final review'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Feb-21, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Rui_Azevedo | Rui Azevedo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure SIEM using OSINT for avoiding threats'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Feb-7, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Miguel Garcia | Miguel Garcia]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' BFT-controllers for Intrusion-tolerant systems'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Fernando Ramos | Fernando Ramos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Logically centralising the Software-Defined Network'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2018-Jan-17, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[José_Rufino | José Rufino]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' NORTH - Non-intrusive Observation and RunTime verification of cyber-pHysical systems'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[António_Casimiro | António Casimiro]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Membership-based Maneuver Negotiation in Safety-critical Vehicular Systems'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Dec-6, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Rui Miguel ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Named Data Networking with Programmable Switches'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' GINJA: One-dollar Cloud-based Disaster Recovery for Databases'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Nov-22, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Wilson Melo''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' How Blockchains can help Legal Metrology<br />
'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Nov-8, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Max Alaluna''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Multi-Cloud Network Virtualization'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Túlio Ribeiro''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Heimdall: a Distributed and Fault Tolerant Update Aware SDN Controller '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Oct-24, 12pm''', Where: '''room 8.2.19''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eduardo Viegas (PUCPR)''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network-based Intrusion Detection: on Protecting a Moving Target'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ricardo Fonseca''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Demonstration of resilient communications in the context of a smart grid'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171012 NavTalk], When: '''Tue 2017-Oct-12, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' How to do Research in Navigators/LASIGE '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170926 NavTalk], When: '''Tue 2017-Sep-26, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Oliver Michel (guest speaker) ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network Defragmentation in Virtualized Data Centers '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170614 NavTalk], When: '''Wednesday 2017-Jun-14, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ibéria Medeiros ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Demonstrating a Tool for Injection Attack Prevention in MySQL '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Ramos ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''uPVN: User-centric Programmable Virtual Networks '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170517 NavTalk], When: '''Wednesday 2017-May-31, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Miguel Correia ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Detecting Malicious Hosts Using Traffic Flows '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Sileshi Demesi Yalew ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Mobile Device Security with ARM TrustZone '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170517 NavTalk], When: '''Friday 2017-May-19, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' João Silva ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Distributed implementation of evolutionary algorithms '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Diogo Pinto ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' (to be rescheduled) ''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170503 NavTalk], When: '''Wednesday, 2017-May-03, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Rui Miguel ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' P4: Programming Protocol-Independent Packet Processors (Bosshart et al., SIGCOMM'14) '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fabio Pereria ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network Monitoring in a Secure and Efficient Way '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170419 NavTalk], When: '''Wednesday, 2017-Apr-19, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Bruno Nunes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Live Migration of Networks '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Pedro Alves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Smarter Routing for a Smarter Grid '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170405 NavTalk], When: '''Wednesday, 2017-Apr-05, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Antonio Casimiro ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Enforcing Timeliness and Safety in Mission-Critical Systems '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eunice Branco ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Cyberthreat Discovery in Open Source Intelligence using Deep Learning Techniques '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170308 NavTalk], When: '''Wednesday, 2017-Mar-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Miguel Falé ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Protecting WAP from infinite recursion '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Henrique Mendes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Securing DLMS/COSEM implementations for use in the smart grid '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170308 NavTalk], When: '''Wednesday, 2017-Mar-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Adriano Serckumecka ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Collection and monitoring of security events to feed SIEMs '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eric Vial, Max Alaluna,<br> Fernando Ramos ''' || style="vertical-align: top;" | present || style="vertical-align: top;" | ''' Demonstration of Sirius, a Multi-Cloud Network Virtualization Platform '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170222 NavTalk], When: '''Wednesday, 2017-Feb-22, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Nuno Neves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Intrusion Tolerant Eclipse SCADA '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Bruno Vavala ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Tera-scale Data Crunching with a Small TCB '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170208 NavTalk], When: '''Wednesday, 2017-Feb-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Tiago Oliveira ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Exploring Key-Value Stores in Multi-Writer Byzantine-Resilient Register Emulations '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Max Alanuna ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Sehen: Secure Yet Efficient Virtual Network Embedding in a Multi-Cloud Environment '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170208 NavTalk], When: '''Wednesday, 2017-Jan-25, 12pm-2pm''', <br> Where: '''(exceptionally) room 6.2.46''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Altair Santin ''' <br>(guest speaker) || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Segurança para ambiente de Smart Grid <br />
(Security for Smart Grid Environments)'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' João Sousa ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Practical experiences with a BFT middleware database '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170113 NavTalk], When: '''Thursday, 2017-Jan-13, 12pm-2pm''', <br> Where: '''(exceptionally) room 6.1.25''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' José Rufino ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' The (Hidden) Potential of Non-Intrusive Runtime Verification '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Inês Gouveia ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Enforcing Safety and Security Through Non-Intrusive Runtime Verification '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161216 NavTalk], When: '''Thursday, 2016-Dec-16, 12.30pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Alves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Machine Learning with Big Data - Specialized distributed systems for machine learning purposes '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ibéria Medeiros ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Attacks, you shall not pass! SEPTIC will not avail you. '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161202 NavTalk], When: '''Thursday, 2016-Dec-02, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Pedro Costa ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161118 NavTalk], When: '''Thursday, 2016-Nov-17, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Vinicius Cogo ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Getting Started on LSH '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ricardo Mendes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Janus: User-defined Cloud-backed Storage '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161103 NavTalk], When: '''Thursday, 2016-Nov-03, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Dependable Storage and Computing using Multiple Cloud Providers '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Túlio Ribeiro ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Floodlight Tracing, Durable and Fault Tolerant '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161020 NavTalk], When: '''Thursday, 2016-Oct-20, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Ramos ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''No more excuses: it’s time to secure BGP! '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Miguel Garcia''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' On the Origin of Diversity, by Means of Cluster Selection, or the Preservation of Favoured OSes in the Struggle for Dependability '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161006 NavTalk], When: '''Thursday, 2016-Oct-06, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '''Eric Vial''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Packet Manipulation Tools for Linux '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Ricardo Fonseca''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Securing SDN-based monitoring - obstacles and learned insights '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160617 NavTalk], When: '''Friday, 2016-Jun-17, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '''Bruno Vavala''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Identification of Actively Executed Code on a Generic Trusted Component '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''André Nogueira''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Making the SCADA System Intrusion Tolerant '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Georg Jäger''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Safety Dependent Sensor Data Processing in Dynamic Composed Systems '''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160603 NavTalk], When: '''Friday, 2016-Jun-03, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Antonio Casimiro''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' ''' Open challenges for dependable autonomous and cooperative cars ''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Max Alaluna''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' (Literally) above the clouds: virtualizing the network over multiple clouds '''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160520 NavTalk], When: '''Friday, 2016-May-20, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Alysson Bessani ''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''The DiSIEM (Diversity-enhancements for SIEMs) Project''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Tiago Santos''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Intrusion detection and response on mobile devices'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160506 NavTalk], When: '''Friday, 2016-May-06, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Nuno Ferreira''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''Securing OEM controllers in a SDN environment''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Fernando Ramos''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Blending photons with electrons to reduce the energy footprint of IPTV networks'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160422 NavTalk], When: '''Friday, 2016-Apr-22, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Sebastian Zug''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''GNSS Quality Forecasting for UAV Trajectory Planning in Urban Environments''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''André Correia''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Discovering security threats in social networks'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160408 NavTalk], When: '''Friday, 2016-Apr-08, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Costa'' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Medusa: An Efficient Cloud Fault-Tolerant MapReduce''<br />
|}<br />
<br />
''(Friday, 2016-Mar-25 '''Easter break -- No Navtalk''')''<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160311 NavTalk], '''When''': Friday, 2016-Mar-11, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Frederico Brito'' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Towards Resilient Segment Routing''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Joel Alcantara'' || style="vertical-align: top;" | presents || ''Low-cost Cloud-based Disaster Recovery for Transactional Databases''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160226 NavTalk], '''When''': Friday, 2016-Feb-26, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Fabien Charmet <br/> (Telecom Sud Paris) '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Implementation of security policy in SDN environment''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Luis Ferrolho'' || style="vertical-align: top;" | presents || ''Secure and Dependable Virtual Network Embedding''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160212 NavTalk], '''When''': Friday, 2016-Feb-12, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Ferreira'' || style="vertical-align: top;" | presents || ''Entropy based unsupervised selection of data sets for improved model fitting''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''José Soares '' || style="vertical-align: top;" | presents || ''Live migration of networks in a multi-cloud environment''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160129 NavTalk], '''When''': Friday, 2016-Jan-29, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Diogo Duarte'' || style="vertical-align: top;" | presents || ''Vulnerability Detection in SDN Switches''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Tiago Oliveira'' || style="vertical-align: top;" | presents || ''Exploring Key-Value Stores in register emulations''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160115 NavTalk], '''When''': Friday, 2016-Jan-15, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Nuno Neves'' || style="vertical-align: top;" | presents || ''Making WAP Really Discover 0-day Vulnerabilities with Less Errors''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Maia'' || style="vertical-align: top;" | presents || ''Resilient Communications in Smart Grids''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] '''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks NavTalk], '''When''': Friday, 2015-Dec-18, 12h00-14h00, '''Where''': room C6.3.38 <br/><br />
:Title: ''' Vulnerability discovery in powerline communication ''' <br/><br />
:Speaker: '''Fernando Alves''' <br/><br />
:Title: '''Distribution, fault tolerance & consistency in SDN control: Pick three''' <br/><br />
:Speaker: '''Andre Mantas''' <br/><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] '''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T10:39:02Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2021-Dec-16, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Paulo_Antunes | Paulo Antunes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Bruno_Matos | Bruno Matos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''TBA'''<br />
|<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Navtalk_EventsNavtalk Events2021-12-09T10:27:23Z<p>Jcecilio: </p>
<hr />
<div>== Past Events ==<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2021-Dec-2, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Maria_Fidalgo | Maria Fidalgo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''The Meritocracy Myth: A Gender Perspective'''<br />
|-<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jun-6, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Allan_Espindola | Allan Espindola]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Methodology for preparing a survey '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Alysson_Bessani | Alysson Bessani]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''How to Research in Navigators'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jul-4, 12:00am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Alan Oliveira || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''System Identification Attacks, Model-based Offensives and Countermeasures in Networked Control Systems '''<br />
|-<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jun-20, 11:30am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Luiz Rust || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Cyber security for Smart Devices'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jun-6, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[João_Sousa | João Sousa]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Tiago_Oliveira | Tiago Oliveira]] and [[Ricardo_Mendes | Ricardo Mendes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Vawlt - from Science to Business'''<br />
|}<br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-May-23, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Nuno Dionisio || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Improving Cyberthreat Discovery in Open Source Intelligence using Deep Learning Techniques '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Pedro_Ferreira | Pedro Ferreira]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Artificial Intelligence for Agricultural Production in Protected Environments'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-May-2, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Paulo Antunes || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Monitoring Web Applications for Vulnerability Removal Under Attack'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[AdrianoSerckumecka | Adriano Serckumecka]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Putting SIEMs in the Cloud'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Apr-18, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Fernando_Alves | Fernando Alves]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''OSINT-Based Data-Driven Cybersecurity Discovery'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Aurélien Bettini || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Representation and generation of IoC extracted from OSINT'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Apr-4, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Wilson Melo || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Decentralized Metrological Surveillance of Fuel Pumps'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Vinicius_Vielmo_Cogo | Vinicius Cogo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''On the Challenges of Deduplicating Human Genomic Sequencing Data'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Mar-21, 12:15pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Ibéria_Medeiros | Ibéria Medeiros]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Detecting Web Application Vulnerabilities using Fuzzing and Symbolic Execution'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Tomás Peixinho || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Securing the internet at the exchange point with a blockchain'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Mar-7, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Nuno_Ferreira_Neves | Nuno Neves]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' dry run talk SUPERCLOUD final review'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Eric_Vial| Eric Vial]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''dry run demo SUPERCLOUD final review'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Feb-21, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Rui_Azevedo | Rui Azevedo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure SIEM using OSINT for avoiding threats'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Feb-7, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Miguel Garcia | Miguel Garcia]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' BFT-controllers for Intrusion-tolerant systems'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Fernando Ramos | Fernando Ramos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Logically centralising the Software-Defined Network'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2018-Jan-17, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[José_Rufino | José Rufino]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' NORTH - Non-intrusive Observation and RunTime verification of cyber-pHysical systems'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[António_Casimiro | António Casimiro]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Membership-based Maneuver Negotiation in Safety-critical Vehicular Systems'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Dec-6, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Rui Miguel ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Named Data Networking with Programmable Switches'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' GINJA: One-dollar Cloud-based Disaster Recovery for Databases'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Nov-22, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Wilson Melo''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' How Blockchains can help Legal Metrology<br />
'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Nov-8, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Max Alaluna''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Multi-Cloud Network Virtualization'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Túlio Ribeiro''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Heimdall: a Distributed and Fault Tolerant Update Aware SDN Controller '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Oct-24, 12pm''', Where: '''room 8.2.19''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eduardo Viegas (PUCPR)''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network-based Intrusion Detection: on Protecting a Moving Target'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ricardo Fonseca''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Demonstration of resilient communications in the context of a smart grid'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171012 NavTalk], When: '''Tue 2017-Oct-12, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' How to do Research in Navigators/LASIGE '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170926 NavTalk], When: '''Tue 2017-Sep-26, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Oliver Michel (guest speaker) ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network Defragmentation in Virtualized Data Centers '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170614 NavTalk], When: '''Wednesday 2017-Jun-14, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ibéria Medeiros ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Demonstrating a Tool for Injection Attack Prevention in MySQL '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Ramos ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''uPVN: User-centric Programmable Virtual Networks '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170517 NavTalk], When: '''Wednesday 2017-May-31, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Miguel Correia ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Detecting Malicious Hosts Using Traffic Flows '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Sileshi Demesi Yalew ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Mobile Device Security with ARM TrustZone '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170517 NavTalk], When: '''Friday 2017-May-19, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' João Silva ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Distributed implementation of evolutionary algorithms '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Diogo Pinto ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' (to be rescheduled) ''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170503 NavTalk], When: '''Wednesday, 2017-May-03, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Rui Miguel ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' P4: Programming Protocol-Independent Packet Processors (Bosshart et al., SIGCOMM'14) '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fabio Pereria ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network Monitoring in a Secure and Efficient Way '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170419 NavTalk], When: '''Wednesday, 2017-Apr-19, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Bruno Nunes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Live Migration of Networks '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Pedro Alves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Smarter Routing for a Smarter Grid '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170405 NavTalk], When: '''Wednesday, 2017-Apr-05, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Antonio Casimiro ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Enforcing Timeliness and Safety in Mission-Critical Systems '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eunice Branco ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Cyberthreat Discovery in Open Source Intelligence using Deep Learning Techniques '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170308 NavTalk], When: '''Wednesday, 2017-Mar-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Miguel Falé ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Protecting WAP from infinite recursion '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Henrique Mendes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Securing DLMS/COSEM implementations for use in the smart grid '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170308 NavTalk], When: '''Wednesday, 2017-Mar-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Adriano Serckumecka ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Collection and monitoring of security events to feed SIEMs '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eric Vial, Max Alaluna,<br> Fernando Ramos ''' || style="vertical-align: top;" | present || style="vertical-align: top;" | ''' Demonstration of Sirius, a Multi-Cloud Network Virtualization Platform '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170222 NavTalk], When: '''Wednesday, 2017-Feb-22, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Nuno Neves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Intrusion Tolerant Eclipse SCADA '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Bruno Vavala ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Tera-scale Data Crunching with a Small TCB '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170208 NavTalk], When: '''Wednesday, 2017-Feb-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Tiago Oliveira ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Exploring Key-Value Stores in Multi-Writer Byzantine-Resilient Register Emulations '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Max Alanuna ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Sehen: Secure Yet Efficient Virtual Network Embedding in a Multi-Cloud Environment '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170208 NavTalk], When: '''Wednesday, 2017-Jan-25, 12pm-2pm''', <br> Where: '''(exceptionally) room 6.2.46''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Altair Santin ''' <br>(guest speaker) || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Segurança para ambiente de Smart Grid <br />
(Security for Smart Grid Environments)'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' João Sousa ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Practical experiences with a BFT middleware database '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170113 NavTalk], When: '''Thursday, 2017-Jan-13, 12pm-2pm''', <br> Where: '''(exceptionally) room 6.1.25''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' José Rufino ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' The (Hidden) Potential of Non-Intrusive Runtime Verification '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Inês Gouveia ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Enforcing Safety and Security Through Non-Intrusive Runtime Verification '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161216 NavTalk], When: '''Thursday, 2016-Dec-16, 12.30pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Alves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Machine Learning with Big Data - Specialized distributed systems for machine learning purposes '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ibéria Medeiros ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Attacks, you shall not pass! SEPTIC will not avail you. '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161202 NavTalk], When: '''Thursday, 2016-Dec-02, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Pedro Costa ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161118 NavTalk], When: '''Thursday, 2016-Nov-17, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Vinicius Cogo ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Getting Started on LSH '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ricardo Mendes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Janus: User-defined Cloud-backed Storage '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161103 NavTalk], When: '''Thursday, 2016-Nov-03, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Dependable Storage and Computing using Multiple Cloud Providers '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Túlio Ribeiro ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Floodlight Tracing, Durable and Fault Tolerant '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161020 NavTalk], When: '''Thursday, 2016-Oct-20, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Ramos ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''No more excuses: it’s time to secure BGP! '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Miguel Garcia''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' On the Origin of Diversity, by Means of Cluster Selection, or the Preservation of Favoured OSes in the Struggle for Dependability '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161006 NavTalk], When: '''Thursday, 2016-Oct-06, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '''Eric Vial''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Packet Manipulation Tools for Linux '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Ricardo Fonseca''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Securing SDN-based monitoring - obstacles and learned insights '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160617 NavTalk], When: '''Friday, 2016-Jun-17, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '''Bruno Vavala''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Identification of Actively Executed Code on a Generic Trusted Component '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''André Nogueira''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Making the SCADA System Intrusion Tolerant '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Georg Jäger''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Safety Dependent Sensor Data Processing in Dynamic Composed Systems '''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160603 NavTalk], When: '''Friday, 2016-Jun-03, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Antonio Casimiro''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' ''' Open challenges for dependable autonomous and cooperative cars ''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Max Alaluna''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' (Literally) above the clouds: virtualizing the network over multiple clouds '''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160520 NavTalk], When: '''Friday, 2016-May-20, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Alysson Bessani ''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''The DiSIEM (Diversity-enhancements for SIEMs) Project''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Tiago Santos''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Intrusion detection and response on mobile devices'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160506 NavTalk], When: '''Friday, 2016-May-06, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Nuno Ferreira''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''Securing OEM controllers in a SDN environment''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Fernando Ramos''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Blending photons with electrons to reduce the energy footprint of IPTV networks'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160422 NavTalk], When: '''Friday, 2016-Apr-22, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Sebastian Zug''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''GNSS Quality Forecasting for UAV Trajectory Planning in Urban Environments''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''André Correia''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Discovering security threats in social networks'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160408 NavTalk], When: '''Friday, 2016-Apr-08, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Costa'' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Medusa: An Efficient Cloud Fault-Tolerant MapReduce''<br />
|}<br />
<br />
''(Friday, 2016-Mar-25 '''Easter break -- No Navtalk''')''<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160311 NavTalk], '''When''': Friday, 2016-Mar-11, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Frederico Brito'' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Towards Resilient Segment Routing''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Joel Alcantara'' || style="vertical-align: top;" | presents || ''Low-cost Cloud-based Disaster Recovery for Transactional Databases''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160226 NavTalk], '''When''': Friday, 2016-Feb-26, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Fabien Charmet <br/> (Telecom Sud Paris) '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Implementation of security policy in SDN environment''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Luis Ferrolho'' || style="vertical-align: top;" | presents || ''Secure and Dependable Virtual Network Embedding''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160212 NavTalk], '''When''': Friday, 2016-Feb-12, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Ferreira'' || style="vertical-align: top;" | presents || ''Entropy based unsupervised selection of data sets for improved model fitting''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''José Soares '' || style="vertical-align: top;" | presents || ''Live migration of networks in a multi-cloud environment''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160129 NavTalk], '''When''': Friday, 2016-Jan-29, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Diogo Duarte'' || style="vertical-align: top;" | presents || ''Vulnerability Detection in SDN Switches''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Tiago Oliveira'' || style="vertical-align: top;" | presents || ''Exploring Key-Value Stores in register emulations''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160115 NavTalk], '''When''': Friday, 2016-Jan-15, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Nuno Neves'' || style="vertical-align: top;" | presents || ''Making WAP Really Discover 0-day Vulnerabilities with Less Errors''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Maia'' || style="vertical-align: top;" | presents || ''Resilient Communications in Smart Grids''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] '''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks NavTalk], '''When''': Friday, 2015-Dec-18, 12h00-14h00, '''Where''': room C6.3.38 <br/><br />
:Title: ''' Vulnerability discovery in powerline communication ''' <br/><br />
:Speaker: '''Fernando Alves''' <br/><br />
:Title: '''Distribution, fault tolerance & consistency in SDN control: Pick three''' <br/><br />
:Speaker: '''Andre Mantas''' <br/><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] '''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Navtalk_EventsNavtalk Events2021-12-09T10:20:04Z<p>Jcecilio: </p>
<hr />
<div>== Past Events ==<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2021-Nov-18, 3:00pm''', Where: '''room 6.3.27''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Alysson Bessani || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''How to Research in Navigators '''<br />
|-<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jul-4, 12:00am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Alan Oliveira || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''System Identification Attacks, Model-based Offensives and Countermeasures in Networked Control Systems '''<br />
|-<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jun-20, 11:30am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Luiz Rust || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Cyber security for Smart Devices'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Jun-6, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[João_Sousa | João Sousa]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Tiago_Oliveira | Tiago Oliveira]] and [[Ricardo_Mendes | Ricardo Mendes]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Vawlt - from Science to Business'''<br />
|}<br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-May-23, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Nuno Dionisio || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Improving Cyberthreat Discovery in Open Source Intelligence using Deep Learning Techniques '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Pedro_Ferreira | Pedro Ferreira]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Artificial Intelligence for Agricultural Production in Protected Environments'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-May-2, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Paulo Antunes || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Monitoring Web Applications for Vulnerability Removal Under Attack'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[AdrianoSerckumecka | Adriano Serckumecka]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Putting SIEMs in the Cloud'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Apr-18, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Fernando_Alves | Fernando Alves]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''OSINT-Based Data-Driven Cybersecurity Discovery'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Aurélien Bettini || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Representation and generation of IoC extracted from OSINT'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Apr-4, 12:00pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | Wilson Melo || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Decentralized Metrological Surveillance of Fuel Pumps'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Vinicius_Vielmo_Cogo | Vinicius Cogo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''On the Challenges of Deduplicating Human Genomic Sequencing Data'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Mar-21, 12:15pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Ibéria_Medeiros | Ibéria Medeiros]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Detecting Web Application Vulnerabilities using Fuzzing and Symbolic Execution'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | Tomás Peixinho || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Securing the internet at the exchange point with a blockchain'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Mar-7, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Nuno_Ferreira_Neves | Nuno Neves]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' dry run talk SUPERCLOUD final review'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Eric_Vial| Eric Vial]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''dry run demo SUPERCLOUD final review'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Feb-21, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Rui_Azevedo | Rui Azevedo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure SIEM using OSINT for avoiding threats'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Wed 2018-Feb-7, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Miguel Garcia | Miguel Garcia]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' BFT-controllers for Intrusion-tolerant systems'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Fernando Ramos | Fernando Ramos]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Logically centralising the Software-Defined Network'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2018-Jan-17, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[José_Rufino | José Rufino]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' NORTH - Non-intrusive Observation and RunTime verification of cyber-pHysical systems'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[António_Casimiro | António Casimiro]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Membership-based Maneuver Negotiation in Safety-critical Vehicular Systems'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Dec-6, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Rui Miguel ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Named Data Networking with Programmable Switches'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' GINJA: One-dollar Cloud-based Disaster Recovery for Databases'''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Nov-22, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Wilson Melo''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' How Blockchains can help Legal Metrology<br />
'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Nov-8, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Max Alaluna''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Multi-Cloud Network Virtualization'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Túlio Ribeiro''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Heimdall: a Distributed and Fault Tolerant Update Aware SDN Controller '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Tue 2017-Oct-24, 12pm''', Where: '''room 8.2.19''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eduardo Viegas (PUCPR)''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network-based Intrusion Detection: on Protecting a Moving Target'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ricardo Fonseca''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Demonstration of resilient communications in the context of a smart grid'''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171012 NavTalk], When: '''Tue 2017-Oct-12, 12pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' How to do Research in Navigators/LASIGE '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170926 NavTalk], When: '''Tue 2017-Sep-26, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Oliver Michel (guest speaker) ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network Defragmentation in Virtualized Data Centers '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170614 NavTalk], When: '''Wednesday 2017-Jun-14, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ibéria Medeiros ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Demonstrating a Tool for Injection Attack Prevention in MySQL '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Ramos ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''uPVN: User-centric Programmable Virtual Networks '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170517 NavTalk], When: '''Wednesday 2017-May-31, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Miguel Correia ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Detecting Malicious Hosts Using Traffic Flows '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Sileshi Demesi Yalew ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Mobile Device Security with ARM TrustZone '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170517 NavTalk], When: '''Friday 2017-May-19, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' João Silva ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Distributed implementation of evolutionary algorithms '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Diogo Pinto ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' (to be rescheduled) ''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170503 NavTalk], When: '''Wednesday, 2017-May-03, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Rui Miguel ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' P4: Programming Protocol-Independent Packet Processors (Bosshart et al., SIGCOMM'14) '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fabio Pereria ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Network Monitoring in a Secure and Efficient Way '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170419 NavTalk], When: '''Wednesday, 2017-Apr-19, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Bruno Nunes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Live Migration of Networks '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Pedro Alves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Smarter Routing for a Smarter Grid '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170405 NavTalk], When: '''Wednesday, 2017-Apr-05, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Antonio Casimiro ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Enforcing Timeliness and Safety in Mission-Critical Systems '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eunice Branco ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Cyberthreat Discovery in Open Source Intelligence using Deep Learning Techniques '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170308 NavTalk], When: '''Wednesday, 2017-Mar-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Miguel Falé ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Protecting WAP from infinite recursion '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Henrique Mendes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Securing DLMS/COSEM implementations for use in the smart grid '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170308 NavTalk], When: '''Wednesday, 2017-Mar-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Adriano Serckumecka ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Collection and monitoring of security events to feed SIEMs '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Eric Vial, Max Alaluna,<br> Fernando Ramos ''' || style="vertical-align: top;" | present || style="vertical-align: top;" | ''' Demonstration of Sirius, a Multi-Cloud Network Virtualization Platform '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170222 NavTalk], When: '''Wednesday, 2017-Feb-22, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Nuno Neves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Intrusion Tolerant Eclipse SCADA '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Bruno Vavala ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Tera-scale Data Crunching with a Small TCB '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170208 NavTalk], When: '''Wednesday, 2017-Feb-08, 12pm-2pm''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Tiago Oliveira ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Exploring Key-Value Stores in Multi-Writer Byzantine-Resilient Register Emulations '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Max Alanuna ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Sehen: Secure Yet Efficient Virtual Network Embedding in a Multi-Cloud Environment '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170208 NavTalk], When: '''Wednesday, 2017-Jan-25, 12pm-2pm''', <br> Where: '''(exceptionally) room 6.2.46''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Altair Santin ''' <br>(guest speaker) || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Segurança para ambiente de Smart Grid <br />
(Security for Smart Grid Environments)'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' João Sousa ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Practical experiences with a BFT middleware database '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20170113 NavTalk], When: '''Thursday, 2017-Jan-13, 12pm-2pm''', <br> Where: '''(exceptionally) room 6.1.25''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' José Rufino ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' The (Hidden) Potential of Non-Intrusive Runtime Verification '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Inês Gouveia ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Enforcing Safety and Security Through Non-Intrusive Runtime Verification '''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161216 NavTalk], When: '''Thursday, 2016-Dec-16, 12.30pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Alves ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Machine Learning with Big Data - Specialized distributed systems for machine learning purposes '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ibéria Medeiros ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Attacks, you shall not pass! SEPTIC will not avail you. '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161202 NavTalk], When: '''Thursday, 2016-Dec-02, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Pedro Costa ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161118 NavTalk], When: '''Thursday, 2016-Nov-17, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Vinicius Cogo ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Getting Started on LSH '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Ricardo Mendes ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Janus: User-defined Cloud-backed Storage '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161103 NavTalk], When: '''Thursday, 2016-Nov-03, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Alysson Bessani ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Dependable Storage and Computing using Multiple Cloud Providers '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Túlio Ribeiro ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Floodlight Tracing, Durable and Fault Tolerant '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161020 NavTalk], When: '''Thursday, 2016-Oct-20, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''' Fernando Ramos ''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''No more excuses: it’s time to secure BGP! '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Miguel Garcia''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' On the Origin of Diversity, by Means of Cluster Selection, or the Preservation of Favoured OSes in the Struggle for Dependability '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20161006 NavTalk], When: '''Thursday, 2016-Oct-06, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '''Eric Vial''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Packet Manipulation Tools for Linux '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Ricardo Fonseca''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Securing SDN-based monitoring - obstacles and learned insights '''<br />
|}<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160617 NavTalk], When: '''Friday, 2016-Jun-17, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '''Bruno Vavala''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Secure Identification of Actively Executed Code on a Generic Trusted Component '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''André Nogueira''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Making the SCADA System Intrusion Tolerant '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '''Georg Jäger''' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' Safety Dependent Sensor Data Processing in Dynamic Composed Systems '''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160603 NavTalk], When: '''Friday, 2016-Jun-03, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Antonio Casimiro''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' ''' Open challenges for dependable autonomous and cooperative cars ''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Max Alaluna''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''' (Literally) above the clouds: virtualizing the network over multiple clouds '''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160520 NavTalk], When: '''Friday, 2016-May-20, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Alysson Bessani ''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''The DiSIEM (Diversity-enhancements for SIEMs) Project''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Tiago Santos''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Intrusion detection and response on mobile devices'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160506 NavTalk], When: '''Friday, 2016-May-06, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Nuno Ferreira''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''Securing OEM controllers in a SDN environment''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Fernando Ramos''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Blending photons with electrons to reduce the energy footprint of IPTV networks'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160422 NavTalk], When: '''Friday, 2016-Apr-22, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''Sebastian Zug''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '' '''GNSS Quality Forecasting for UAV Trajectory Planning in Urban Environments''' ''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | '' '''André Correia''' '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Discovering security threats in social networks'''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160408 NavTalk], When: '''Friday, 2016-Apr-08, 12pm-2pm''', Where: '''room C6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Costa'' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Medusa: An Efficient Cloud Fault-Tolerant MapReduce''<br />
|}<br />
<br />
''(Friday, 2016-Mar-25 '''Easter break -- No Navtalk''')''<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160311 NavTalk], '''When''': Friday, 2016-Mar-11, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Frederico Brito'' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Towards Resilient Segment Routing''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Joel Alcantara'' || style="vertical-align: top;" | presents || ''Low-cost Cloud-based Disaster Recovery for Transactional Databases''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160226 NavTalk], '''When''': Friday, 2016-Feb-26, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Fabien Charmet <br/> (Telecom Sud Paris) '' || style="vertical-align: top;" | presents || style="vertical-align: top;" | ''Implementation of security policy in SDN environment''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Luis Ferrolho'' || style="vertical-align: top;" | presents || ''Secure and Dependable Virtual Network Embedding''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160212 NavTalk], '''When''': Friday, 2016-Feb-12, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Ferreira'' || style="vertical-align: top;" | presents || ''Entropy based unsupervised selection of data sets for improved model fitting''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''José Soares '' || style="vertical-align: top;" | presents || ''Live migration of networks in a multi-cloud environment''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160129 NavTalk], '''When''': Friday, 2016-Jan-29, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Diogo Duarte'' || style="vertical-align: top;" | presents || ''Vulnerability Detection in SDN Switches''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Tiago Oliveira'' || style="vertical-align: top;" | presents || ''Exploring Key-Value Stores in register emulations''<br />
|}<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] <br />
'''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks#slNT20160115 NavTalk], '''When''': Friday, 2016-Jan-15, 12pm-2pm, '''Where''': room C6.3.38 <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | ''Nuno Neves'' || style="vertical-align: top;" | presents || ''Making WAP Really Discover 0-day Vulnerabilities with Less Errors''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | ''Pedro Maia'' || style="vertical-align: top;" | presents || ''Resilient Communications in Smart Grids''<br />
|}<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] '''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks NavTalk], '''When''': Friday, 2015-Dec-18, 12h00-14h00, '''Where''': room C6.3.38 <br/><br />
:Title: ''' Vulnerability discovery in powerline communication ''' <br/><br />
:Speaker: '''Fernando Alves''' <br/><br />
:Title: '''Distribution, fault tolerance & consistency in SDN control: Pick three''' <br/><br />
:Speaker: '''Andre Mantas''' <br/><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalks] '''What''': [http://www.navigators.di.fc.ul.pt/wiki/Navtalks</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T10:12:55Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2021-Dec-16, 2:00pm''', Where: '''room 6.3.27''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Maria_Fidalgo | Maria Fidalgo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''The Meritocracy Myth: A Gender Perspective'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Allan_Espindola | Allan Espindola]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Methodology for preparing a survey '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Alysson_Bessani | Alysson Bessani]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''How to Research in Navigators '''<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T10:10:49Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2018-Sep-20, 12:00am''', Where: '''room 6.3.38''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Maria_Fidalgo | Maria Fidalgo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''The Meritocracy Myth: A Gender Perspective'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Allan_Espindola | Allan Espindola]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Methodology for preparing a survey '''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Alysson_Bessani | Alysson Bessani]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''How to Research in Navigators '''<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T10:09:34Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2018-Sep-20, 12:00am''', Where: '''room 6.3.38''' <br/><br />
<br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Maria_Fidalgo | Maria Fidalgo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''The Meritocracy Myth: A Gender Perspective'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Allan_Espindola | Allan Espindola]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Methodology for preparing a survey '''<br />
|-<br />
style="vertical-align: top;white-space: nowrap;" | [[Alysson_Bessani | Alysson Bessani]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''How to Research in Navigators '''<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T10:08:44Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2018-Sep-20, 12:00am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Maria_Fidalgo | Maria Fidalgo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''The Meritocracy Myth: A Gender Perspective'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Allan_Espindola | Allan Espindola]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Methodology for preparing a survey '''<br />
|-<br />
style="vertical-align: top;white-space: nowrap;" | [[Alysson_Bessani | Alysson Bessani]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''How to Research in Navigators '''<br />
|}<br />
<br />
<br />
<!--''('''Summer break -- No Navtalk''')''--><br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Main_PageMain Page2021-12-09T10:07:24Z<p>Jcecilio: /* Events */</p>
<hr />
<div>We are the Navigators, a research team on distributed systems, their architectures, their algorithms, in their several skins: fault tolerance, real-time, security, and combinations thereof. <br />
<br />
We also pursue the quest for [[Brief Resume: The Navigators team today|the right balance]] between science and technology. Some people say that Informatics (a.k.a. computer science and<br />
engineering) belongs to a new breed, of what are called techno-sciences.<br />
We believe that techno-scientists should accompany theoretical mastery with a deep knowledge of their environment — computer technology — as well as astro-physicists know the sky, or marine biologists know the sea.<br />
<br />
We study new theories to explain distributed systems, and new algorithms to take advantage from them. But we also like to do [[Software|proof-of-concept experiments]] about the theory we work on. We try that our [[Publications|papers and theses]] tell a good story as clearly as possible. We work hard for our demonstrations to be convincing and captivating. Because we believe [[The_Navigators_Research_Book_of_Style|science is made for others]]. <br />
<br />
Our greatest riches are our [[The_Navigators_Research_Book_of_Style|culture]], and our [[People|researchers and students]]. If you believe in the former, you can become one of the latter. Welcome!<br />
<br />
<div class="homepagebigbox"><br />
==Announcements==<br />
<br />
* (Nov/2019) The Doctoral Fellowships “la Caixa” INPhINIT have opened with three themes for PhD proposals from the Navigators professors!<br />
* (Oct/2019) The final demonstration and review of the DISIEM EU project, which we have lead for the past three years, went extremely well with praise for the outstanding results that were achieved!<br />
* (Apr/2018) Based on the final demonstration of the Supercloud EU project last month, here is a video about [https://www.youtube.com/watch?v=vygTlX7oTEY Sirius], the multi-cloud network virtualization platform.<br />
<br />
<!--<br />
Exemplos de anuncio de novo projeto:<br />
* (1/Oct/2018) The (FCT-funded) research project AQUAMON -- Dependable Monitoring with Wireless Sensor Networks in Water Environments -- started today. During the next 3 years we will develop a dependable monitoring platform for application in aquatic environments using wireless sensor networks. <br />
--><br />
<br />
<br />
</div><div class="homepagebox"><br />
<br />
==Latest publications==<br />
{{#ask:[[Category:Publication]]<br />
|?#=Pagename<br />
|mainlabel=Pagename<br />
|?author<br />
|?abstract<br />
|?address<br />
|?award<br />
|?booktitle<br />
|?chapter<br />
|?doi<br />
|?edition<br />
|?editor<br />
|?institution<br />
|?intype<br />
|?journal<br />
|?key<br />
|?month<br />
|?number<br />
|?pages<br />
|?publisher<br />
|?school<br />
|?series<br />
|?title<br />
|?type<br />
|?url<br />
|?volume<br />
|?year<br />
|limit=10<br />
|format=template<br />
|template=PublicationRef<br />
|sort=NumPubDate<br />
|order=descending<br />
|headers=show<br />
|named args=yes<br />
|link=none<br />
|searchlabel=<br />
}}<br />
</div><div class="homepagebox"><br />
<br />
==Events==<br />
<br />
<!--<br />
What: '''Invited talk by XXX: "TITLE"''' <br/> <br />
When: '''Thu 2020-Jan-30, 3pm''' <br/><br />
Where: '''Room 6.3.26 @ FCUL'''<br/><br />
Sponsor: '''XXX'''<br/><br />
--><br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/NavTalks] <br />
What: [http://www.navigators.di.fc.ul.pt/wiki/NavTalks#slNT20171024 NavTalk], When: '''Thu 2018-Sep-20, 12:00am''', Where: '''room 6.3.38''' <br/><br />
{| style="border-spacing: 5px; text-align: left; "<br />
| style="vertical-align: top;white-space: nowrap;" | [[Maria_Fidalgo | Maria Fidalgo]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''The Meritocracy Myth: A Gender Perspective'''<br />
|-<br />
| style="vertical-align: top;white-space: nowrap;" | [[Allan_Espindola | Allan Espindola]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''Methodology for preparing a survey '''<br />
style="vertical-align: top;white-space: nowrap;" | [[Alysson_Bessani | Alysson Bessani]] || style="vertical-align: top;" | presents || style="vertical-align: top;" | '''How to Research in Navigators '''<br />
|}<br />
<br />
<br />
''('''Summer break -- No Navtalk''')''<br />
<br />
<br />
<br />
[http://www.navigators.di.fc.ul.pt/wiki/Navtalk_Events Past Navtalk Events]</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Pedro_RosaPedro Rosa2021-09-23T19:06:34Z<p>Jcecilio: Created page with "{{Person |name=Pedro Rosa |role=MSc student |advisor=José Cecílio, André Souto }}"</p>
<hr />
<div>{{Person<br />
|name=Pedro Rosa<br />
|role=MSc student<br />
|advisor=José Cecílio, André Souto<br />
}}</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/David_SilvaDavid Silva2021-09-23T19:05:20Z<p>Jcecilio: Created page with "{{Person |name=David Silva |role=MSc student |advisor=José Cecílio, }}"</p>
<hr />
<div>{{Person<br />
|name=David Silva<br />
|role=MSc student<br />
|advisor=José Cecílio, <br />
}}</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/In%C3%AAs_SousaInês Sousa2021-09-23T19:02:51Z<p>Jcecilio: Created page with "{{Person |name=Inês Sousa |email=isousa@lasige.di.fc.ul.pt |role=MSc student |advisor=José Cecílio, António Casimiro, }}"</p>
<hr />
<div>{{Person<br />
|name=Inês Sousa<br />
|email=isousa@lasige.di.fc.ul.pt<br />
|role=MSc student<br />
|advisor=José Cecílio, António Casimiro, <br />
}}</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Project:VEDLIoTProject:VEDLIoT2021-09-23T18:55:33Z<p>Jcecilio: </p>
<hr />
<div>{{Project<br />
|Acronym=VEDLIoT<br />
|Title=Very Efficient Deep Learning in IOT<br />
|Past Project=no<br />
|Sponsor=EU H2020 program<br />
|Project Number=957197<br />
|Total award amount=8000000<br />
|Coordinator=Univ. of Bielefeld<br />
|Partners=EMBEDL AB (SE), Chalmers (SE), Siemens (DE), Christmann (DE), Université de Neuchâtel (CH), Universität Osnabrück (DE), VEONEER (SE), Göteborgs Universitet (SE), RISE Research Institutes of Sweden (SE), FCiências.ID (PT), Antmicro (PL)<br />
|month=nov<br />
|year=2020<br />
|Duration months=36<br />
|Keywords=Machine learning, Distributed AI, Internet of Things, Embedded computing, Sensor networks, Interoperability, Heterogeneous computing, Cognitive edge computing<br />
|Summary=The ever increasing performance of computer systems in general and IoT systems, in particular, delivers the capability to solve increasingly challenging problems, pushing automation to improve the quality of our life. This triggers the need for a next-generation IoT architecture, satisfying the demand for key sectors like transportation (e.g. self-driving cars), industry (e.g. robotization or predictive maintenance), and our homes (e.g. assisted living). Such applications require building systems of enormous complexity, so that traditional approaches start to fail. The amount of data collected and processed is huge, the computational power required is very high, and the algorithms are too complex allowing for the computation of solutions within the tight time constraints. In addition, security, privacy, or robustness for such systems becomes a critical challenge.<br />
An enabler that aims at delivering the required keystone is VEDLIoT, a Very Efficient Deep Learning IoT platform. Instead of traditional algorithms, artificial intelligence (AI) and deep learning (DL) are used to handle the large complexity. Due to the distributed approach, VEDLIoT allows dividing the application into smaller and more efficient components and work together in large collaborative systems in the Internet of Things (IoT), enabling AI-based algorithms that are distributed over IoT devices from edge to cloud.<br />
In terms of hardware, VEDLIoT offers a platform, the Cognitive IoT platform, leveraging European technology, which can be easily configured to be placed at any level of the compute continuum starting from the sensor nodes and then edge to cloud. Driven by use cases in the key sectors of automotive, industrial, and smart homes, the platform is supported by cross-cutting aspects satisfying security and robustness. Overall, VEDLIoT offers a framework for the Next Generation Internet based on IoT devices required for collaboratively solving complex DL applications across a distributed system.<br />
|Team Size=3<br />
|Researchers=António Casimiro, Pedro M. Ferreira, Nuno Ferreira Neves, José Cecílio, <br />
}}</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Project:ADMORPHProject:ADMORPH2021-09-23T18:54:30Z<p>Jcecilio: </p>
<hr />
<div>{{Project<br />
|Acronym=ADMORPH<br />
|Title=Towards Adaptively Morphing Embedded Systems<br />
|Past Project=no<br />
|ResearchLine=Fault and Intrusion Tolerance in Open Distributed Systems (FIT), Timeliness and Adaptation in Dependable Systems (TADS)<br />
|Url=http://admorph.eu<br />
|Sponsor=EU H2020 program<br />
|Project Number=871259<br />
|Total award amount=4499000<br />
|Coordinator=Univ. of Amsterdam (NL)<br />
|Partners=Thales Netherland (NL), Sysgo S.A.S (FR), Univ. Luxembourg (LU), Lunds Univ. (SE), UTRC (IE), Q-Media (CZ), FCUL (PT)<br />
|month=jan<br />
|year=2020<br />
|Duration months=36<br />
|Keywords=System of systems, Embedded systems, Monitoring and control systems, Systems engineering, sensorics, actorics, automation<br />
|Summary=Due to the increasing performance demands of mission- and safety-critical Cyber Physical Systems (of Systems) – after this referred to as CPS(oS) – these systems exhibit a rapidly growing complexity, manifested by an increasing number of (distributed) computational cores and application components connected via complex networks. However, with the growing complexity and interconnectivity of these systems, the chances of hardware failures as well as disruptions due to cyber-attacks will also quickly increase. System adaptivity, foremost in terms of dynamically remapping of application components to processing cores, represents a promising technique to fuse fault- and intrusion tolerance with the increasing performance requirements of these mission- and safety-critical CPS(oS). In the ADMORPH project, we evaluate this hypothesis using a novel, holistic approach to the specification, design, analysis and runtime deployment of adaptive, i.e., dynamically morphing, mission- and safety-critical CPS(oS) that are robust against both component failures and cyber-attacks. To this end, we will address four aspects that are instrumental for the realization of these adaptively morphing systems: (i) the formal specification of adaptive systems; (ii) adaptivity methods like strategies for maintaining safe and secure control of CPS(oS); (iii) analysis techniques for adaptive systems to, e.g., perform timing verification of adaptive systems to avoid timing violations after system reconfigurations; and (iv) run-time systems for adaptive systems that realize the actual run-time system reconfigurations to achieve fault and intrusion tolerance. The developed methodologies, methods and tools will be evaluated using three industrial use cases taken from the radar surveillance systems, autonomous operations for aircrafts, and transport management systems domains.<br />
|NavigatorsSite=FCUL<br />
|Team Size=4<br />
|Researchers=António Casimiro, Pedro M. Ferreira, Alysson Bessani, Nuno Ferreira Neves, José Cecílio, <br />
}}</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/File:Photo.pngFile:Photo.png2021-09-23T18:51:34Z<p>Jcecilio: </p>
<hr />
<div></div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/Jos%C3%A9_Cec%C3%ADlioJosé Cecílio2021-09-23T18:50:04Z<p>Jcecilio: </p>
<hr />
<div>{{Person<br />
|name=José Cecílio<br />
|email=jmcecilio@ciencias.ulisboa.pt<br />
|url=https://ciencias.ulisboa.pt/pt/perfil/jmcecilio<br />
|role=Faculty<br />
}}</div>Jceciliohttps://navigators.di.fc.ul.pt/wiki/NavTalksNavTalks2021-07-27T15:49:28Z<p>Jcecilio: </p>
<hr />
<div><p>The NavTalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.</p><br />
<br />
<p><i>Leave mouse over title's presentation to read the abstract.</i></p><br />
<!--<span style="border-bottom: dashed 1px #000" title="">Title Here</span>--><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<h3><strong>July 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">14</td><br />
<td style="width:300px">André Gil</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Tools used to assess energy utilization in buildings are inadequate. Real-life energy consumption often exceeds design expectations. The SATO platform aims to reduce this gap by allowing efficient management of buildings energy resources.<br />
In this talk we will describe our approach in creating an event-driven system in the context of the world of IoT, we will also describe the way to deploy and manage these complex systems, while also going into detail in some of their components.">Platform Architecture and data management for cloud-based buildings energy self-assessment and optimization</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">28</td><br />
<td style="width:300px">João Valente</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="">TBD</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
</div><br />
<br />
<br />
<br />
<!-- <br />
###########################################################<br />
############## PAST PRESENTATIONS #########################<br />
########################################################### --><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h2><strong>Past presentations</strong></h2><br />
<h3><strong>September 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Alysson Bessani</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The blockchain has emerged as a disruptive paradigm to build decentralized transactional applications such as cryptocurrencies. The core of the technology is the consensus algorithm used to order blocks of transactions in a Byzantine fault-tolerant (BFT) way. There are two basic classes of such algorithms: Nakamoto consensus (employed in Bitcoin and other permissionless systems), which requires peers to solve a cryptographic puzzle to propose new blocks and eventually converge to a single chain; and “traditional” BFT consensus (used in permissioned systems), which employs well-known protocols for reaching agreement in a closed set of known processes. The former scales to 10000s of nodes but can process only a few transactions/s with a latency of hours, while the latter performs much better, but only with a few dozens of nodes. Recently, many hybrid consensus protocols have been proposed. They merge these two classes to achieve both scalability and performance. Although promising, they are still subject to limitations coming from their building blocks (e.g., high latency and power consumption). SMaRtChain aims to devise a set of radically different consensus protocols for both permissioned and permissionless blockchains. First, we plan to extend the Consensus with Unknown Participants paradigm to adapt it for open blockchains, aiming to overcome the limitations described above. Second, we want to design new scalable and high-performance BFT consensus algorithms based on solid theoretical building blocks for 1000s of nodes (enough for hybrid and permissioned blockchains) and capable of processing 1000s of transactions/s with sub-second latency. We will implement and integrate these contributions into existing open-source blockchain platforms (e.g., Fabric, Corda) for maximum impact. Finally, we will investigate and address the limitations of existing blockchains to support applications requiring big data, machine learning, and integration with the internet of things."><br />
SMaRtChain: A Principled Design for a New Generation of Blockchains</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">20</td><br />
<td style="width:300px">Rui Miguel</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of enabling communication between endpoints. As a response to this change, Named Data Networking (NDN) is a new architecture rooted on the concept of naming data, in contrast to the original paradigm based on naming hosts. This radical architectural shift results in packet processing in NDN to differ substantially from IP. As a consequence, current network equipment cannot be seamlessly extended to offer NDN data-plane functions. To address this challenge, available NDN router solutions are usually software-based, and even the highly-optimised designs tailored to specific hardware platforms present limited performance, hindering adoption. In addition, these tailor-made solutions are hardly reusable in research and production networks. The emergence of programmable switching chips and of languages to program them, like P4, brings hope for the state of affairs to change. In this presentation, we present the design of an NDN router written in P4. We improve over the state-of-the-art solution by extending the NDN functionality, and by addressing its scalability limitations. A preliminary evaluation of our open-source solution running on a software target demonstrates its feasibility."><br />
Named Data Networking with Programmable Switches</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>October 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Bruno Vavala (Research Scientist in Intel Labs) </td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="I will present Private Data Objects (PDOs), a technology that enables mutually untrusted parties to run smart contracts over private data. PDOs result from the integration of a distributed ledger and Intel Software Guard Extensions (SGX). In particular, contracts run off-ledger in secure enclaves using Intel SGX, which preserves data confidentiality, execution integrity and enforces data access policies (as opposed to raw data access). A distributed ledger verifies and records transactions produced by PDOs, in order to provide a single authoritative instance of such objects. This allows contracting parties to retrieve and check data related to contract and enclave instances, as well as to serialize and commit contract state updates. The design and the development of PDOs is an ongoing research effort, and open source code is available and hosted by Hyperledger Labs (Linux Foundation).">Private Data Objects</span></td> <br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">4</td><br />
<td style="width:300px">Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="As you are well aware, many practical concerns in systems aiming at Byzantine fault and intrusion tolerance require reaching consensus in difficult situations. For example, to remain exhaustion safe, replacing permanently damaged replicas requires relocating the replicated functionality to a fresh set of spares, necessitating conensus on the new group of active replicas. While group membership protocols exists for this task, we are also aware of their limitations (faults in the adaptation infrastructure (recurring the problem in the servers implementing it), operation modes that cannot reach consensus (aka Cheap / ReBFT minimal mode), etc.) that make it extremely difficult (if not impossible) to perform these reconfigurations in a reliable manner. In this talk, I would like to give you an overview over some of the current (unsolved) research problems we work on in CritiX and which I would like to discuss with you while here. I would like to share my view on our hinge that in some of the above settings, there is still hidden an impossibility result, possibly rendering CheapBFT (or at least generalizations of it to arbitrary quorums) incorrect, but motivating a novel design principle, which we call reflective consensus: Rather than solving the difficult, but naturally arising consensus problem (e.g., consensus on group membership in case of exhaustion failure due to an increasing threat level), we reflect consensus to the same set of replicas where it will occur, but in a simpler version that is possibly even executed at a different time (e.g., proactively when the system is not yet exhaustion failed)."><br />
Reflective Consensus</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">18</td><br />
<td style="width:300px">Yair Amir (Professor, Johns Hopkins University) </td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Emerging applications such as remote manipulation, collaborative virtual reality, or remote robotic surgery require communication that is both timely and reliable, but the Internet natively supports only communication that is either completely reliable with no timeliness guarantees (e.g. TCP) or timely with only best-effort reliability (e.g. UDP). We present an overlay transport service that can provide highly reliable communication while meeting stringent timeliness guarantees (e.g. 130ms round-trip latency across the US) over the Internet.<br />
<br />
To enable routing schemes that can support the necessary timeliness and reliability, we introduce dissemination graphs, providing a unified framework for specifying routing schemes ranging from a single path, to multiple disjoint paths, to arbitrary graphs. Based on an extensive analysis of real-world network data, we develop a timely dissemination-graph-based routing method that can add targeted redundancy in problematic areas of the network. We show that this approach can cover close to 99% of the performance gap between a traditional single-path approach and an optimal (but prohibitively expensive) scheme."><br />
Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>November 2018</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">13</td><br />
<td style="width:300px">Salvatore Signorello</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."><br />
The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">13</td><br />
<td>Tiago Oliveira</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. <br />
To respond to this, we have developed Vawlt, an innovative technology for secure and private data storage in the cloud that eliminates all the aforementioned limitations by combining a multi-cloud environment with a serverless design, while employing zero-knowledge encryption mechanism and being full customizable. In this talk I will present our MVP (Minimum Viable Product) that we have launched in the beginning of October."><br />
Vawlt - Privacy-Centered Cloud Storage</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
<tr><br />
<td align="center">27</td><br />
<td>Nuno Neves</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Usaremos um cenário de uma Casa Inteligente para encontrarmos uma vulnerabilidade de software, e compreendermos o impacto que poderia ter nas nossas vidas. Seguidamente, iremos recorrer a algumas técnicas, que incluem a aprendizagem máquina, para descobrir e corrigir automaticamente o software destas vulnerabilidades. Terminaremos com desafios futuros na área de blockchain e software crítico multi-versão.">Segurança de Software - Como Encontrar uma Agulha num Palheiro?</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center">27</td><br />
<td>Ricardo Mendes</td><br />
<td><span style="border-bottom: dashed 1px #000" title="When building Vawlt, our goal was to create the most secure and private cloud storage service available. To achieve this, we created a Zero-knowledge End-to-end Encryption protocol that ensures the data clients store is private and only accessible them. It makes it impossible for both clouds or Vawlt to have functional access to the data stored or shared among clients. All of this without compromising the multicloud and serverless nature of Vawlt. In this talk, I will present this protocol, our strategies, and the techniques used.">Vawlt - The Zero-knowledge End-to-end Encryption Protocol</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>December 2018</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">11/12</td><br />
<td style="width:300px">Ant&oacute;nio Casimiro</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk we introduce the AQUAMON project. The project is about environmental monitoring in large physical areas and in harsh conditions. This requires the use of wireless communication networks for quasi-real-time provision of monitoring data, as well as dependability concerning the quality ofthe collected monitoring data. The challenge is to ensure that these requirements are satisfied despite the harsh operaitonal conditions. The presentation will introduce the project, explain what we intend to do, what are the main challenges and how do we plan to address them.">AQUAMON: Dependable Monitoring with Wireless Sensor Networks in Water Environments</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>11/12</td><br />
<td>Carlos Nascimento</td><br />
<td><span style="border-bottom: dashed 1px #000" title="This presentation will present a comparative review of a set of existing wireless communication technologies that are specially targeted to support the IoT paradigm, and which may form the basis of the network layer in the AQUAMON project. The aim of this initial work performed in the scope of AQUAMON, is to understand and evaluat these technologies, such that the solution to be defined will be adequate to achieve the requirements for real-time environmental monitoring in harsh environments.">Review of wireless technology for AQUAMON: Lora, sigfox, nb-iot</span></td><br />
<td>&nbsp;</td><br />
</tr> <br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<br />
<h3><strong>January 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">15/01</td><br />
<td style="width:300px">Fernando Alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Vulnerability databases (such as the NVD) are considered one of the main venues for vulnerability awareness. However, these sources only publish content that has been verified, i.e., vulnerabilities that have been confirmed by the affected software vendor and that have undergone analysis by the database management (for example, to calculate the CVSS score). On the other hand, since Open Source Intelligence encompasses information from multivariate origins, it is possible that some vulnerability data is available on the Internet before it is indexed in vulnerability databases. In this Navtalk I will present some preliminary results of a comparative study between the publishing of some vulnerabilities in OSINT and in vulnerability databases.">A comparison between vulnerability publishing in OSINT and Vulnerability Databases</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>15/01</td><br />
<td>Ib&eacute;ria Medeiros</td> <br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk, we present the SEAL project. The project is about the detection of vulnerabilities and implementation of software security in web applications written in different server-side languages (e.g., PHP, Hack, Java, ASP). To handle different languages, an intermediate language capable of representing server-side language aspects and secure code features is needed to be defined. In addition, tools to process this language to identify vulnerabilities are required as well as tools able to remove vulnerabilities in the source code of web applications. In the first instance, the presentation will introduce the project, its goals, what are the main challenges and the expected results. Next, we present the ongoing work related to the most main challenge.">SEAL: SEcurity progrAmming of web appLications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Fernando Ramos</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this talk I will motivate the need for a change of paradigm in networking: towards self-driving networks. But, most importantly, I will try to convince you that the prospect for this new generation of networks is, at the moment of writing, excruciatingly poor. The talk will include demos and quizzes, to try to move your thoughts away from the yummy pizza that follows.">Networks that drive themselves…of the cliff</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>29/01</td><br />
<td>Miguel Garcia</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In 1983, two SOSP Program Committee members published: An Evaluation of the Ninth SOSP Submissions -or- How (and How Not) to Write a Good Systems Paper, ACM SIGOPS Operating Systems Review (available in SOSP and OSDI websites). In this talk, I will present most of their recommendations in a concise way. This article and talk should be useful for anyone that wants to submit a paper on a (systems) top-conference.">Some tips before rushing into LaTeX (adapted from: How (and How Not) to Write a Good Systems Paper)</span></td><br />
<td>&nbsp;</td> <br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>February 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">19/02</td> <br />
<td style="width:300px">Ana Fidalgo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will introduce a type of graphical models called Conditional Random Fields, and motivate why it has a good application in finding software vulnerabilities. I will specifically explore vulnerabilities in web applications due to their increasing relevance and damage dimension. This work intends to facilitate the developers’ task of identifying vulnerabilities in the code.">Conditional Random Fields and Vulnerability Detection in Web Applications</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>19/02</td> <br />
<td>Jo&atilde;o Sousa</td><br />
<td><span style="border-bottom: dashed 1px #000" title="The recent popularization of permissioned blockchains systems lead to a resurgence of interest in the Byzantine fault-tolerant (BFT) state machine replication technique. Such interest is the prime motivation behind kickstarting development on version 2.0 of BFT-SMaRt, a BFT state machine replication library created by the Navigators group. Specifically, BFT-SMaRt v2 will provide a new state management layer dubbed SMaRtChain, which creates and maintains a ledger, effectively rendering the library a blockchain platform. This talk aims at presenting the current status of BFT-SMaRt v2, focusing in the aforementioned SMaRtChain layer, as well as in a recently implemented mechanism to enforce flow control in respect to excessive workloads, a scenario that can affect quality of service as observed by clients.">Towards BFT-SMaRt v2: Blockchains and Flow Control</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">13/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="We all have to give research talks once in a while -- like when we do a Navtalk -- so I think it’s good to share experiences and identify techniques that work, and give advice on those that usually do not. I was personally very much influenced by a superb talk by Simon Peyton Jones on this topic, so in this talk my goal is to share his own talk. I hope this talk to be highly interactive, so I hoping many will also share your own experiences and opinions.">How to give a great -- OK, at least a good -- research talk</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>13/03</td> <td>Ricardo Morgado</td><br />
<td><span style="border-bottom: dashed 1px #000" title="Web applications are an important part of our everyday lives and, like any other software, they are prone to vulnerabilities. Given that they are accessible for many users, it is of the utmost importance to ensure that vulnerabilities are removed from them. Unfortunately, many developers are unaware of the correct way of fixing certain vulnerabilities. For this reason, a tool capable of automatically correcting these applications would be greatly beneficial for their security. In this talk, I will show some of the reasons why vulnerabilities are introduced, and why developers are misinformed about them. I will also present the current status and main challenges of the work I am currently performing.">Automatically correcting PHP web applications</span></td><br />
<td>&nbsp;</td><br />
</tr><br />
<br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>March 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td style="width:100px">27/03</td><br />
<td style="width:300px">Nuno Dion&iacute;sio</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="To be prepared against cyber-attacks, most organizations resort to security information and event management systems to monitor their infrastructures. These systems depend on the timeliness and relevance of the latest updates, patches and threats provided by cyberthreat intelligence feeds.<br />
Open source intelligence platforms, namely social media networks such as Twitter, are capable of aggregating a vast amount of cybersecurity-related sources. To process such information streams, we require scalable and efficient tools capable of identifying and summarizing relevant information for specified assets.<br />
In this talk, I will present a processing pipeline based on deep learning algorithms to identify and extract relevant information from tweets. The contents of this talk are based on a paper recently accepted for the conference IJCNN (International Joint Conference on Neural Networks).<br />
">Cyberthreat Detection from Twitter using Deep Neural Networks</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">27/03</td> <br />
<td style="width:300px">Fernando Ramos</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk I will argue in favour of introducing contests (think “The Voice”, for instance) into the programming assignments (PAs) of our courses. I will discuss how they can help both teaching and research, by promoting reproducibility and (potentially) even provide lasting advances! I will introduce the congestion control contest: the second PA of our “advanced computer networks” (PRD) MSc course. And it will include a demo, as usual!">My network protocol is better than yours!</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>April 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">10/04</td><br />
<td style="width:300px">Adriano Serckumecka</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="SIEMs are powerful systems that can improve a company's security by reducing incident response time, neutralizing threats, and centralizing much information about its infrastructure and devices.<br />
However, since most SIEM systems are deployed locally for security purposes, their events are stored for short periods due to limited local storage capacity, discarding them after 12 months, sometimes less.<br />
Cloud storage could be a cheap option for storing these old events as they can help solve many persistent incidents such as zero-day threats, which can take years to discover. The main problem in using cloud storage for sensitive data is that providers are exposed to security leaks and attacks, which pushes away this category of users.<br />
In this talk, I will introduce the SLiCER system, a low cost solution that combines event processing, storage and retrieval in a safe and inexpensive way. It can work as a background system to extend the storage capacity of SIEMs for long periods.<br />
">SIEMs</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>10/04</td> <td>Tulio Ribeiro</td><br />
<td><span style="border-bottom: dashed 1px #000" title="In this NavTalk I will speak a little bit about classical consensus and Proof-of-Work consensus, what is it, its premises and how they work,<br />
some challenges regarding the approaches and a brief comparison about them.<br />
I will bring some works which try to scale the classical BFT consensus and improve PoW performance. ">BFT Consensus & PoW Consensus (blockchain). </span></td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>May 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">08/05</td><br />
<td style="width:300px">Miguel Garcia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will make a dry-run of my PhD defense, therefore I am hoping to receive (most of) the harsh comments before the D-day!<br />
My PhD thesis addresses a long-standing open problem of managing Byzantine Fault Tolerance (BFT) systems. This is a fundamental problem because BFT protocols assume that replicas fail independently. In this thesis we investigated how this assumption can be substantiated in practice by exploring diversity when managing the configurations of replicas.<br />
">Diverse Intrusion-tolerant Systems</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Pedro Ferreira</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The Digital Security call of the Horizon 2020 Work Programme 2018-2020 includes a topic focusing the digital security and privacy of Small and Medium Enterprises and Micro Enterprises (SME&ME). By realising that SME&MEs are easy targets of cyber-attacks when compared to large organisations, the European Commission proposed a specific topic in the digital security call to develop targeted solutions for the distinct needs and resources of SMEs&MEs. This talk will reveal the concept and first ideas supporting an application to this H2020 call.<br />
">The concept of the next navigators cybersecurity H2020 project</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">29/05</td><br />
<td style="width:300px">Vinicius Cogo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="In this talk, I will describe the idea of auditing who has effectively read data in secure storage systems and the additional requirements it entails to these systems. This work was submitted last week (thanks for the feedback) and is available on arXiv (https://arxiv.org/abs/1905.08637).<br />
">Auditable Register Emulations</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>June 2019</strong></h3><br />
<table border="0" cellspacing="0" style="background:#89B085" ><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Diogo Gon&ccedil;alves</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Network coding is a technique that can be used to improve a network’s throughput and resilience. The idea is for nodes in the network to mix the information content in the packets received before forwarding them, enabling gains in capacity and resilience. Existing network coding prototypes and systems have been mainly host-based implementations in software. However, recent advances in switch design have enabled the emergence of programmable switches, opening the possibility to making network coding practical in the network.<br />
In this talk, I will present the design, implementation and preliminary evaluation of a network coding switch using the latest version of P4 (a high level language to program switches). We will describe the various options we have considered in our design, focusing on its main challenges.<br />
">Network coding switch</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">05/06</td><br />
<td style="width:300px">Francisco Ara&uacute;jo</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products, like vehicles and trains, integrate embedded systems implementing diverse and complicated functionalities. Such functionalities are programmable by software containing a multitude of parameters necessary for their configuration, which have been increasing due to the market diversification and customer demand. However, the increasing functionality and complexity of such systems makes the validation and testing of the software highly complex. The complexity inherent to software nowadays has a direct relationship with the rising number of vulnerabilities found in the software itself due to the increased attack surface. Where a vulnerability is defined as a hole or weakness in the application. Products with such variability need to be tested adequately, looking by security flaws to be able to guarantee public safety and quality assurance of the application. While efficient automated system testing already exists, such as fuzzing, there is no tool that is able to use results of a previous testable programme in order to more efficiently test the next piece of software that shares certain functionalities. The objective of this dissertation is to implement such a tool that can ignore already covered functionalities that have been seen before in a previously tested program and give more importance to block codes that have yet to been tested, detect security vulnerabilities and to avoid repeating work when it's not necessary, hence increasing the speed and the coverage in the new program. After the initial development of the prototype of the tool, we will follow with an evaluation that will take into consideration the effectiveness at finding bugs and the performance it shows. <br />
">Generating Software Tests To Check For Flaws and Functionalities</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Joao Pinto</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Ever since its introduction, the car has fundamentally changed our society and it is nearly ubiquitous today. However, there are several problems related to automobiles, one of the major ones being road congestion. Automated driving systems currently rely on their own sensors to gather<br />
information from the real-world, and make informed decisions to keep its passengers safe. But sensors may not be sufficiently accurate during all conditions and can even fail, so systems take this into consideration when controlling the car. Vehicle-to-Vehicle communication can enable cooperation between vehicles, which in turn opens the door for complex vehicular applications such as road-trains (or platooning) and virtual traffic lights. We will implement a vehicular cooperation algorithm backed by both vehicle-to-vehicle communication and a cloud membership service provided by a separate project.<br />
<br />
">Implementation of a Protocol for Safe Cooperation Between Autonomous Vehicles</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Personal vehicles are the transportation method chosen by most individuals, which means our cities are built around them and have roads that can go anywhere. Given the amount of vehicles, life in cities is hard, and pollution and traffic congestion are higher than ever.<br />
Nowadays, the first autonomous vehicles are starting to appear, and consequently, bringing the opportunity to once again, try to solve this problem. Although the current ones are still not viable for daily transportation, they already help substantially with traffic and pollution, but sadly, they won’t be enough in the long run and another solution is needed. Existing solutions base their decisions solely on their own sensors and that is the only view they have of the external world, but there is still a subject that was not well explored: cooperation between vehicles.<br />
Vehicle coordination is the next big step, and an essential missing factor that has to be considered for the next generation of autonomous vehicles. Giving vehicles communication capabilities allows them not only to communicate with other vehicles, but also communicate with external services that can aid their cooperation while sharing useful data about their own decisions or the outside environment. This is exactly our approach, we built a cloud based membership service with a global view of every vehicle that can aid each one of them by providing useful information and predictions.<br />
">Design and Implementation of a Cloud-based Membership System for Vehicular Cooperation</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Robin Vassantlal</td><br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="State Machine Replication is a classical approach used to implement consistent fault-tolerant services, this approach can also be used to implement intrusion tolerant services - which maintain integrity and availability in the presence of Byzantine faults. In order to guarantee confidentiality, the Secret Sharing mechanism can be used to store shares of the data between servers. Of the few works that explore this mechanism, none consider the long-running services, therefore give the adversary unlimited time to collect enough shares to get access to the service state. In this talk, I will present the design and the preliminary evaluation of the implementation of a framework that solves this problem using share renewal protocol. <br />
">Confidential BFT State Machine Replication</span></td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<br />
</table><br />
<br />
<br />
<h3><strong>March 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">24</td><br />
<td style="width:300px">Ana Fidalgo</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Machine Learning approaches on vulnerability detection have been gaining popularity due to their capability to predict and/or detect an attack in early stages, without the laborous human effort of other techniques. However, there is not a public dataset for web vulnerabilities based on real web applications, which would help the research community to improve their knowledge and algorithms. This talk aims to present the initial work done on such a dataset, and how it will address the common issues, such as integrating the labelling of opensource tools with the labelling of human experts.">Machine Learning approaches for vulnerability detection</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>April 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">7</td><br />
<td style="width:300px">Vasco Leitão</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Industrial products integrate highly configurable safety-critical systems which must be intensively tested before being delivered to customers. This process is highly time-consuming and may require associations between product features and requirements demanded by customers. Machine Learning (ML) has proven to help engineers in this task, through automation of associations between features and requirements, where the latter are prioritized first.<br />
<br />
However, ML application can be more difficult when requirements are written in natural language (NL), and if it does not exist a ground truth dataset with them. This work presents SRXCRM, a Natural Language Processing-based model able to extract and associate components from product design specifications and customer requirements, written in NL, of safety-critical systems. The model has a Weight Association Rule Mining framework that defines associations between components, generating visualizations that can help engineers in prioritization of the most impactful features. Preliminary results of the use of SRXCRM show that it can extract such associations and visualizations.">Discovering Association Rules Between Software System Requirements and Product Specifications</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">21</td><br />
<td style="width:300px">João Caseirito</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Fuzzing is a software testing technique to find vulnerabilities by providing invalid and unexpected inputs to a target and monitoring exceptions such as crashes, memory leaks or information disclosure.<br />
This talk aims to present an ensemble fuzzing approach that checks the correctness of web applications by combining multiple web application fuzzers, improving the coverage and precision in detecting the vulnerabilities and performing better than the fuzzers individually.">Improving Web Application Vulnerability Detection Leveraging Ensemble Fuzzing</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
<h3><strong>May 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">5</td><br />
<td style="width:300px">Paulo Antunes</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Web applications play a pivotal role in modern society. They have become a prime target for attackers, who exploit a variety of vulnerabilities to access private data and corrupt systems. This work aims to develop novel approaches to detect and remove vulnerabilities in PHP programs. Instead of processing PHP code directly and analyzing the full application at once, we leverage an intermediate language representation of the code and use a guided analysis to find bugs with increased precision. The guided analysis will avoid common approximations of traditional static analysis, resulting in a more accurate emulation of program states.">Web Vulnerability Discovery at an Intermediate Language Level</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">19</td><br />
<td style="width:300px">Frederico Apolónia</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="The levels of energy consumption in the European Union continues to grow above the expected values and buildings are one of the largest consumers, in front of the sectors of industry and transportation. Since buildings can be used for different goals with different requirements, in order to do an appropriate control, it is necessary to design and develop approaches for real-time assessment. In this talk we will present the concept of indoor location using Bluetooth and WiFi scanners to monitor surrounding devices. This information will be used to determine the number of different users inside a building/space, which is later used by control systems in order to improve the efficiency of buildings, keeping certain levels of comfort for the users.">Building Occupancy Assessment</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<h3><strong>June 2021</strong></h3><br />
<table border="0.5" cellspacing="0" style="background:#89B085"><br />
<tr><br />
<td align="center" style="width:100px">2</td><br />
<td style="width:300px">Bernardo Portela</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Conflict-free Replicated Data Types (CRDTs) are abstract data types that support developers when designing and reasoning about distributed systems with eventual consistency guarantees. In their core they solve the problem of how to deal with concurrent operations, in a way that is transparent for developers. However in the real world, distributed systems also suffer from other relevant problems, including security and privacy issues and especially when participants can be untrusted. In this paper we present the first formal cryptographic treatment of CRDTs, as well as proposals for secure implementations. We start by presenting a security notion that is compatible with standard definitions in cryptography. We then describe new privacy-preserving CRDT protocols that can be used to help secure distributed cloud-backed applications, including NoSQL geo-replicated databases. Our proposals are based on standard CRDTs, such as sets and counters, augmented with cryptographic mechanisms that allow operations to be performed on encrypted data. Our proposals are accompanied with formal security proofs and implement and integrate them in AntidoteDB, a geo-replicated NoSQL database that leverages CRDTs for its operations. Experimental evaluations based on the Danish Shared Medication Record dataset (FMK) exhibit the tradeoffs that our different proposals make and show that they are ready to be used in practical applications.">Secure Conflict-free Replicated Data Types</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">16</td><br />
<td style="width:300px">Žygimantas Jasiūnas and Vasco Ferreira</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Nowadays there is a focus on energy efficiency and flexible energy where IoT devices can introduce some advantages due to their monitoring and remote control capabilities. There are multiple IoT platforms and systems developed allowing the integration of multiple devices offering monitoring and remote control capabilities and even the usage of triggers, where if something is reached then some action will be performed. However, a simple integration of IoT devices in current solutions is not enough to achieve the levels of desired efficiency, for that, new solutions that integrates legacy appliances with new ones are needed. In order to achieve this goal the SATO (Self Assessment Towards Optimization) platform was designed. The SATO platform aims to integrate existing IoT energy focused platforms (e.g., EDP re:dy and Siemens Navigator) with existing IoT smart systems, such as Google Nest. Supported by Machine Learning algorithms and IoT capabilities, the SATO platform wants to be an autonomous management system for buildings where energy efficiency is a priority. However, the integration of different parts of building management systems is a common issue due to the existence of diverse appliances, devices and technologies that must be integrated. The most common solution to solve this problem is based on middleware solutions, which allows to hide platform specification. In this thesis we will design, implement and test a middleware component that abstracts the specification of different components and exposes generic APIs to deal with a large number of appliances. Supported by the proposed set of API, the services available can easily be used without the complexity of knowing each of the underlying details.">Monitoring and Integration of heterogeneous building IoT platforms and smart systems</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td align="center" style="width:100px">30</td><br />
<td style="width:300px">João Inácio</td> <br />
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Currently, embedded systems are present in a myriad of devices, such as IoT, drones, cyberphysical systems. The security these devices can be critical, depending the context they are integrated and the role they play (e.g., water plant, car). C is the main language used to develop the software for these devices and is known for missing the bounds of its data types, which lead to vulnerabilities, like buffer and integer overflows. These flaws when exploited cause severe damage and can put human life in dangerous. Therefore, it is important the software of these devices be secure.<br />
One of the utmost importance with C programs is how to fix its code automatically, employing the right secure code that can remove the existent vulnerabilities and avoid attacks. However, such task faces some challenges. For example, how to remove vulnerabilities, what is the right secure code needed to remove them, and where to insert this code. Another challenge is how to maintain the correct behavior of the application, after applying the code correction.">Automatic Removal of Flaws in Embedded System Software</span></td> <br />
<td style="width:30px">&nbsp;</td><br />
</tr><br />
</table><br />
<br />
<br />
</div><br />
<br />
<!--<br />
###########################################################<br />
###########################################################<br />
############## UPCOMING PRESENTATIONS#####################<br />
########################################################### <br />
<br />
<br />
<h2><strong>Upcoming presentations</strong></h2><br />
<br />
<br />
<br />
<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>July 2019</strong></h3><br />
<table border=0 cellspacing=0 > <br />
<tr><br />
<td style="width:100px">26/06</td><br />
<td style="width:300px">Tiago Correia</td><br />
<td style="width:600px">&nbsp;</td><br />
<td style="width:100px">&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td><br />
<td>Jo&atilde;o Pinto</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
<tr><br />
<td>26/06</td> <td>Robin Vassantlal</td><br />
<td>&nbsp;</td><br />
<td>&nbsp;</td><br />
</tr><br />
</table><br />
</div><br />
--><br />
<br />
<br />
<br />
<br />
<!--<br />
<div style="background:#FFFFFF; border:1px solid #FFFFFF; padding:5px 10px"><br />
<h3><strong>Not Scheduled</strong></h3><br />
<table border=1 background=#DA4848 style="width:20%"> <br />
<tr><br />
<td>Bruno Louren&ccedil;o</td> <br />
</tr><br />
<br />
<tr><br />
<td>Cl&aacute;udio Martins</td> <br />
</tr><br />
<tr><br />
<td>Diogo Edgar Sousa</td> <br />
</tr><br />
<tr><br />
<td>Gon&ccedil;alo Jesus</td> <br />
</tr><br />
<tr><br />
<td>Hugo Amieira</td><br />
</tr><br />
<tr><br />
<td>Lu&iacute;z Marques</td> <br />
</tr><br />
<tr><br />
<td>Paulo Antunes</td> <br />
</tr><br />
<tr><br />
<td>Rui Azevedo</td> <br />
</tr><br />
</table><br />
</div><br />
--></div>Jcecilio