Privacy-preserving runtime verification

Abstract 
Runtime verification offers scalable solutions to improve the safety and reliability of systems. However, systems that require verification or monitoring by a third party to ensure compliance with a specification might contain sensitive information, causing privacy concerns when usual runtime verification approaches are used. Privacy is compromised if protected information about the system, or sensitive data that is processed by the system, is revealed. In addition, revealing the specification being monitored may undermine the essence of third-party verification. 

In this work, we propose a novel protocol for the privacy-preserving runtime verification of systems against formal sequential specifications, which ensures that the system remains oblivious to the monitored specification, while the monitor learns only whether the system satisfies the specification and nothing more. Our protocol adapts and improves existing techniques used in cryptography, and more specifically, two-party computation.



Bio 
Mahyar is a PhD student at IST Austria, supervised by Tom Henzinger. His research focus is on the intersection of runtime verification and private computing; specifically, his work is on designing private schemes for runtime verification, using techniques from cryptography. Before starting his graduate studies, Mahyar got his BSc in computer engineering from the University of Tehran, in 2023. 

More: https://mahykari.github.io
Photo provided by speaker

Realizing Leibniz’s Dream – Automating Legal Reasoning

Abstract

In the 17th Century, the philosopher, mathematician and lawyer Gottlieb Leibniz envisioned the creation of a characteristica universalis and calculus ratiocinator that would enable reasoning in law and morals as systematically as in geometry and analysis. His goal was to resolve legal disputes with the precision and clarity with which accountants settle financial discrepancies. We are now, for the first time in history, positioned to realize Leibniz’s dream of automating legal reasoning.
The crucial step in this process is the alignment of sophisticated computer science techniques with appropriate types of legal problems. Automating code-based legal reasoning, which relies on explicit statutes and regulations, differs fundamentally from automating case-based reasoning, which depends on precedents and interpretations. We will discuss how formal methods and Large Language Models (LLMs) can be utilized to achieve what Leibniz envisioned three centuries ago, effectively transforming the landscape of legal reasoning through the power of modern computational technology.



Bio 
Ruzica Piskac is a Professor of Computer Science at Yale University, where she leads the Rigorous Software Engineering (ROSE) group. Her research interests span the areas of software verification, security and applied cryptography, automated reasoning, and code synthesis. Much of her research has focused on using formal techniques to improve software reliability and trustworthiness. Piskac joined Yale’s Department of Computer Science in 2013.
She was previously an Independent Research Group Leader at the Max Planck Institute for Software Systems in Germany. Her research has received a range of professional honors, including multiple Amazon Research Awards, Yale University’s Ackerman Award for Teaching and Mentoring, the Facebook Communications and Networking Award, and the Microsoft Research Award for the Software Engineering Innovation Foundation (SEIF). In 2019, Yale named Piskac the Donna L. Dubinsky Associate Professor of Computer Science.
Piskac holds a Ph.D. from the Swiss Federal Institute of Technology (EPFL), where her dissertation won the Patrick Denantes Prize. Her current and recent professional activities include service as Program Chair of the 37th International Conference on Computer Aided Verification and the Steering Committee of the Formal Methods in Computer-Aided Design conference. Piskac has graduated five PhD students, four of them are currently holding a position of an assistant professor of computer science.




Photo provided by speaker

Continual Model Adaptation: Methods & Applications

Abstract
Machine learning is becoming ubiquitous, influencing critical decisions across multiple sectors. However, most ML systems are one-model-fits-all solutions that are trained once with occasional updates, limiting their adaptability and performance over time. Continual ML approaches provide an adaptable solution that can handle distribution shifts, cater to rare events, and maintain robustness against adversarial attacks.

This talk explores the methodologies and applications of continual learning, emphasizing its importance in various domains such as automotive, robotics, and natural language processing (NLP). In the automotive domain, we explore incremental learning approaches for adapting gesture recognition systems to individual drivers, enhancing human-vehicle interaction. In robotics, we combine reinforcement and imitation learning to develop a curriculum learning approach to create a surgeon-in-the-loop ophthalmic robotic apprentice. In the NLP domain, we teach LLM agents to learn from their mistakes, adapt to contextually valid changes, and protect against privacy, security, and social engineering attacks.



Bio 
Amr Gomaa is a final-year Ph.D. candidate in Human-centered AI & Applied ML at the German Research Center for Artificial Intelligence (DFKI). He is also a Visiting Researcher at the University of Cambridge, focusing on feasible ML (specifically LLMs) solutions for HCI design processes and interfaces, and ensuring the robustness of contextual LLM agents in collaboration with Microsoft Cambridge. His work focuses on developing adaptable machine learning systems, including incremental learning, reinforcement learning, and imitation learning, applied to domains such as automotive, robotics, health, and LLM agents.

His work is published in top-tier conferences such as NeurIPS, IROS, and IUI. Amr has led multiple research projects in collaboration with industry partners such as BMW and Zeiss, and secured multiple research grants for several projects such as “Secure Language Models for Knowledge Management” and “Hybrid Reinforcement Learning and Imitation Learnin



More: amrgomaaelhady.github.io




Photo provided by speaker

HabilTalk: “Implementation Aspects of Lattice-based Cryptography”

Dr. Sujoy Sinha Roy is an Associate Professor at TU Graz, specializing in secure and efficient cryptographic algorithms on hardware and software platforms. He is known for his work in post-quantum cryptography (SABER KEM design, efficient software and hardware implementations, and side-channel security assessment) and Fully Homomorphic Encryption (FHE design, hardware acceleration, and application). Sujoy earned his PhD in 2017 from KU Leuven, receiving the IBM Innovation Award for his thesis. Before TU Graz, he was an assistant professor at the University of Birmingham.

Internship Talk: Bringing private SCT auditing into practice

Abstract

PhD student Lena Heimberger visited Cloudflare in Lisbon from July to October. Now that she is back, she will talk about Transparency, the Certificate ecosystem, Merkle Tree Certificates, fallback strategies, protocols and why Portugese coffee culture is better than Italian. More concretely, she studied the certificate ecosystem in the context of post-quantum certificates, trying to sketch the design space for fallback mechanisms for so-called slow-issuance certificates. The result is an upper bound for fallback probabilities that can be used to study methods for fallbacks. As a part of this study, Lena and her colleagues found that SCT auditing is on the brink of being practical when using Private Information Retrieval methods.

Parts of the talk have already been presented at transparency.dev in London last month, and will be submitted in form of a paper soon.

The talk is aimed at Master’s students, but anybody is welcome. Questions, also about the internship, are explicitly encouraged.

 

Automatically Uncovering Hardware Side-Channels in Processor RTL with Multi-μPATH Synthesis

Abstract

Modern hardware side-channel defenses are designed with respect to microarchitectural leakage contracts, which characterize microarchitectures’ hardware side-channels. Numerous leakage contracts have been proposed in the literature and by industry (e.g., Arm DIT, Intel DOIT, RISC-V Zkt) to support a variety of hardware side-channel defenses, implemented in hardware or software. Yet, no automated nor scalable approach exists for formally verifying hardware adherence to any of them.

In this talk, I will present SynthLC, an automated approach/tool for synthesizing (“uncovering”) a variety of formally verified leakage contracts — which collectively support ten state-of-the-art hardware side-channel defense — from a SystemVerilog processor design, assuming an attacker that monitors program execution time or resource contention. SynthLC is built on top of another automated approach/tool, called RTL2MμPATH, for synthesizing (“uncovering”) a complete set of formally verified microarchitectural execution paths (μPATHs) for each instruction from processor RTL. This deign choice exploits our key observation: μPATH variability (>1 μPATH) for an instruction strongly indicates there is a hardware side-channel in the input design.



Bio
Caroline Trippel is an Assistant Professor in the Computer Science and Electrical Engineering Departments at Stanford University working in the area of computer architecture. A central theme of her work is leveraging formal methods techniques to design and verify hardware systems in order to ensure that they can provide correctness and security guarantees for the applications they intend to support. Trippel’s research has been recognized with and NSF CAREER Award, IEEE Top Picks distinctions, the 2024 Intel Rising Star Award, the 2023 Intel Outstanding Researcher Award, the 2020 ACM SIGARCH/IEEE CS TCCA Outstanding Dissertation Award, and the 2020 CGS/ProQuest® Distinguished Dissertation Award in Mathematics, Physical Sciences, & Engineering. She was also awarded an NVIDIA Graduate Fellowship (2017-2018) and selected to attend the 2018 MIT Rising Stars in EECS Workshop.

If you want to join, contact socialmedia@iaik.tugraz.at until 13th of Nov, 15:00 for the invite link!

Bachelor@IAIK 2024/25

At the event we present our new open bachelor’s thesis (and master’s thesis) topics and award prizes to excellent students.  

If you’re interested in joining us for your bachelor’s thesis in security, this is the best way to get an impression of our topics as well as how a bachelor’s thesis at IAIK works: You’ll hear about our research areas and current hot topics, our Bachelor@IAIK program where you can work on your thesis together with your fellow students in one of our offices if you like, and maybe you’ll get to know your supervisor while chatting along.

THE AWARDS:

IAIK Student Research Excellence Award: Students at IAIK who became co-authors of a scientific publication in the context of a thesis or project receive this award.

IAIK Bachelor Excellence Award: This award is for students majoring in “Information Security” at TU Graz and who have completed their bachelor’s degree with distinction at TU Graz. Application deadline: Oct 9th 2024!

The event will also be the kick-off lecture in Introduction to Scientific Working (ISW) where you will be able to choose your preferred topic!   

We are looking forward to meeting you!

 

Security in a World of Software Supply-Chain Vulnerabilities

Abstract
Modern software incorporates thousands of third-party components. Bugs or security vulnerabilities in these components can seriously compromise the integrity of incorporating applications. Because of their widespread use, and the difficulty of vetting the enormous number of integrated components for vulnerabilities, they comprise a compelling target for attackers, who purposefully insert vulnerabilities into widely used components with the goal of compromising the integrity of entire software ecosystems.

I will present a series of systems that leverage component boundaries to offer automated solutions to vulnerabilities that appear in the software component supply chain. These solutions leverage system- and language-level containment techniques to prevent different classes of attacks from affecting these applications and the broader system in which they execute. Combined, they provide a holistic and in-depth transformation-based approach to securing software ecosystems.

Bio
Nikos Vasilakis is an Assistant Professor of Computer Science at Brown University. His research encompasses systems, programming languages, and security — and has been recognized by several distinguished paper awards. His current focus is on automatically transforming systems to add new capabilities such as parallelism, distribution, and security — against a variety of threat models. Nikos is also the chair of the Technical Steering Committee behind PaSh, a shell-script optimization system hosted by the Linux Foundation.

More: https://nikos.vasilak.is




Photo provided by speaker

Auction-Based Scheduling: A Modular Framework for Multi-Objective Decision-Making

Abstract
Sequential decision-making tasks often require satisfaction of multiple, partially-contradictory objectives. Existing approaches are monolithic, where a single policy fulfills all objectives. I will present auction-based scheduling, a new modular framework for multi-objective sequential decision-making. In this framework, each objective is fulfilled using a separate and independent policy. The policies are then composed through a novel run-time composition mechanism, where at each step, they need to bid from pre-allocated budgets for the privilege of choosing the next action. The bidding encourages the policies to adjust their bids according to their urgencies to act, and whoever bids the highest gets scheduled first. We study the following decentralized synthesis problem: How to compute bidding-equipped policies whose composition will simultaneously fulfill all objectives? I will present solutions of the decentralized synthesis problem for path planning on finite graphs with two temporal objectives.

Bio
Kaushik Mallik is a postdoctoral researcher at the Institute of Science and Technology Austria (ISTA). His research interests are broadly in formal verification and synthesis of reactive software. He received the 2023 ETAPS Doctoral Dissertation Award, nominations for best paper awards in HSCC and TACAS, and a number of merit-based fellowships during his bachelor’s and master’s studies. He holds B. Tech (2012) in Electrical Engineering from Meghnad Saha Institute of Technology (India), M. Tech (2015) in System and Control from IIT Roorkee (India), and Dr. rer. nat. (PhD, 2022) in Computer Science from RPTU Kaiserslautern (Germany).




Photo provided by speaker

Guiding Function Synthesis with Machine Learning

Abstract
Syntax-Guided Synthesis describes a format for function synthesis problems within a first-order theory. In addition to conventional semantic constraints stated in a first-order theory, SyGuS also allows for the posing of syntactic constraints through the use of a grammar. Most SyGuS solvers can be classified as enumerative solvers that systematically search the space through the space of functions that adhere to the syntactic constraint. However, these strategies suffer from the combinatorial explosion of the solution space.
In this talk I will present machine learning based methods to guide a search through this large search space. In the first part of this talk I will present how we utilize Monte-Carlo tree search with reinforcement learning. This method is inspired by AlphaZero. In the second part, I will present our most recent work on using LLMs to guide the search. We use LLMs to calculate probabilities for the production rules of the grammar and subsequently generate functions according to those probabilities. We evaluate and compare two different prompting methods to obtain the probabilities.

Bio
I recently finished my PhD at the University of Oxford under the supervision of Daniel Kroening and Tom Melham with a thesis titled “Machine Learning for Function Synthesis”. Generally, I am interested in automated reasoning or computer-aided verification of mathematical proofs, software, and hardware (in no particular order). Apart from my PhD I worked at the University of Edinburgh and the University of Innsbruck as a research associate where I also worked on computational logic, theorem proving, and term rewriting. I lived in Innsbruck, Austria most of my life and also obtained my Undergrad and Masters at the University of Innsbruck.




Photo provided by speaker