Unless otherwise noted, all talks are in Klaus 1116E and are from 11 a.m. to Noon.
Refreshments will be served at 10:45 a.m.
Date | Speaker | Affiliation | Title |
---|---|---|---|
26 Feb 2008 | Maxwell Krohn | MIT | Securing Servers With Decentralized Information Flow Control |
4 Mar 2008 | Feng Chen | UIUC | Runtime Monitoring for Reliable Software |
6 Mar 2008 | David Brumley | CMU | Analysis and Defense of Vulnerabilities in Binary Code |
10 Mar 2008 | Jure Leskovec | CMU | Dynamics of real networks: patterns and algorithms |
13 Mar 2008 | Charles Killian | UCSD | Mace: Systems and Language Support for Building Correct, High-Performance Networked Services |
27 Mar 2008 | Nickolai Zeldovich | Stanford | Building Secure Systems From Buggy Code with Information Flow Control |
10 Apr 2008 | Shan Lu | UIUC | TBD |
15 Apr 2008 | Bryan Ford | MIT | Intuitive Global Connectivity for Personal Mobile Devices |
Last updated: Fri Feb 29 00:56:21 -0500 2008 [validate xhtml]
Please contact Nick Feamster with updates and corrections.