BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Memento EPFL//
BEGIN:VEVENT
SUMMARY:Inaugural Lecture – Prof. Mathias Payer
DTSTART:20230405T171500
DTEND:20230405T181000
DTSTAMP:20260408T071129Z
UID:f3800aa2a2c01cd1c05aed740e12c2663ed27b77aaa39ed13c89a4e9
CATEGORIES:Inaugural lectures - Honorary Lecture
DESCRIPTION:Prof. Mathias Payer\nDate: Wednesday 5 April 2023\n\nProgram:
  \n\n	17:15-17:25: Introduction by Prof. Rüdiger Urbanke\, Dean of the 
 IC School\n	17:25-17:55 Inaugural Lecture Prof. Mathias Payer\n	17:55-18:1
 0: Q & A\n	18:10-20:00: Apéritif in the hall outside CO2\n\nLocation:  C
 O2\n\nRegistration: Click here\n\n****************************************
 *******************\n\nProf. Mathias Payer\n\nTales of Program Crashes and
  Vulnerabilities\n\nAbstract\nSoftware will always have bugs. Some of thes
 e bugs are exploitable\, giving adversaries unintended access to private d
 ata and computation.\n\nWe improve security along three dimensions. First\
 , quickly discovering vulnerabilities helps developers fix bugs before cod
 e is deployed. Here\, we embrace incompleteness to scale to the massive si
 ze of current software. Second\, mitigating exploitation attempts of unkno
 wn bugs\, increasing the cost for adversaries. Third\, compartmentalizing 
 large monolithic systems into fault domains\, limiting adversaries.\n\nThi
 s talk gives an overview of the software security landscape in general\, a
 nd our three research dimensions in particular. We highlight why these foc
 us areas are important and how we increase security guarantees of software
  systems by fixing bugs early\, prohibiting adversaries form exploiting re
 maining bugs\, and isolating faults.\n\n \nAbout the speaker\nMathias Pay
 er is a security researcher and professor at EPFL\, leading the HexHive gr
 oup. His research protects applications in the presence of vulnerabilities
 \, with a focus on memory corruption and type violations. He is interested
  in software/system security with a focus (i) on automated testing to find
  bugs\, (ii) mitigation of exploitation attempts through unknown bugs\, an
 d (iii) compartmentalization to limit the impact of remaining issues. As a
  systems person\, his research impacts compilers\, operating systems\, and
  architectures. Since moving to EPFL\, he was awarded both the prestigious
  ERC Starting Grant and the SNSF Eccellenza award to foster research in so
 ftware security.\n 
LOCATION:CO2 https://plan.epfl.ch/?room=%3DCO%202&dim_floor=1&lang=en&dim_
 lang=en&tree_groups=centres_nevralgiques%2Cmobilite_acces_grp%2Censeigneme
 nt%2Ccommerces_et_services%2Cinfrastructure_plan_grp&tree_group_l
STATUS:CONFIRMED
END:VEVENT
END:VCALENDAR
