Miercuri 5.06, ora 9.00, sala 201.
Colocviu practica anul I sem. II
Miercuri 5.06, ora 9.00, sali: 201, 204. Repartitia pe comisii este afisata pe moodle.
Protocols in Dynamic Epistemic Logic
Speaker: Alexandru Dragomir (University of Bucharest)
Abstract: Dynamic epistemic logics are useful in reasoning about knowledge and certain acts of learning (epistemic actions). However, not all epistemic actions are allowed to be executed in an initial epistemic model, and this is where the concept of a protocol comes in: a protocol stipulates what epistemic actions are allowed to be performed in a model. The aim of my presentation is to introduce the audience to two accounts of protocols in DEL: one based on [1], and the second on [2].
References:
[1] T. Hoshi, Epistemic dynamics and protocol information, PhD thesis, Stanford University, 2009.
[2] Y. Wang, Y. Epistemic Modelling and Protocol Dynamics, PhD thesis, University of Amsterdam, 2010.
Dynamic Code Analysis
Speaker: Radu Velea (BitDefender)
Abstract: Static code analysis methods have the advantage of providing deterministic and reliable results. Malware has evolved beyond the point where simple pattern matching algorithms or signatures can provide adequate levels of protection. To respond to new threats we have to look at other hidden aspects such as execution behavior and fight evasive techniques by performing dynamic code analysis. This presentation discusses how to do this using runtime emulation and describes the existing challenges for the most popular architectures and executable file formats.
COLOCVIU PRACTICA Sem. II
Colocviul de practica va avea loc Miercuri, 5.06, ora 9.00. Repartitia pe comisii va fi anuntata ulterior. Studentii au obligatia sa incarce prezentarea (fisier pdf) pana la data de 1.06.2019 (ora 24.00), folosind linkul urmator: https://tinyurl.com/y6f2mvp4
De asemenea, studentii trebuie sa depuna la secretariat adeverinta de practica pana luni, 3.06.2019 (ora 14.00).
House of clouds – sau cum sa auditezi un sistem in cloud
Speaker: Georgel Gheorghe este absolvent al facultatii de Electronica, Telecomunicatii si Tehnologia a informatiei. Este membru ISACA si detine certificari precum CISA (Certified Information Systems Auditor), CGEIT (Certified in the Governance of Enterprise IT) si CRISC (Certified in Risk and Information Systems Control).
Are o experienta de peste 11 ani in audit si consultanta in industrii de tipologii diferite (servicii financiare, retail, productie, telecomunicatii, energie) cu proiecte precum: evaluari ale mediilor IT&IS, audituri de conformitate, evaluari ale configurarilor de securitate, managementul vulnerabilitatilor, managementul continuitatii afacerii, managementul schimbarilor.
Dupa mai multi ani petrecuti in Deloitte, Ericson si Mazars, s-a alaturat unei noi echipe unde cunostintele si experienta sa sunt o baza solida pentru identificarea unor solutii potrivite pentru noile provocari digitale.
Abstract: Prezentarea propusa, House of clouds – sau cum sa auditezi un sistem in cloud, va aborda aspecte relevante ce tin de intelegerea si delimitarea sistemelor in scop, identificarea riscurilor si selectarea masurilor de control necesare.
In introducere, Gratiela Magdalinoiu (presedinte ISACA Romania) va face o scurta prezentare ISACA Romania.
An introduction to hybrid-dynamic first-order logic
Speaker: Ionuţ Ţuţu (Royal Holloway, University of London)
Abstract: We propose a hybrid-dynamic first-order logic as a formal
foundation for specifying and reasoning about reconfigurable
systems. As the name suggests, the formalism we develop extends
(many-sorted) first-order logic with features that are common to
hybrid and to dynamic logics. This provides certain key advantages for
dealing with reconfiguration, such as: (a) a signature of nominals,
including operation and relation symbols, that allows references to
specific possible worlds / system configurations – as in the case of
hybrid logics; (b) distinguished signatures of rigid and flexible
symbols, where the rigid symbols are interpreted uniformly across
possible worlds – this supports a rigid form of quantification, which
ensures that variables have the same interpretation regardless of the
possible world where they are evaluated; (c) hybrid terms, which
increase the expressive power of the logic in the context of rigid
symbols; and (d) modal operators over dynamic-logic actions, which are
defined as regular expressions over binary nominal relations. In this
context, we advance a notion of hybrid-dynamic Horn clause and develop
a series of results that lead to an initial-semantics theorem for the
Horn-clause fragment of hybrid-dynamic first-order logic.
Blockchain – Intro
Speaker: Ruxandra Olimid (University of Bucharest)
Abstract: Short (crypto) introduction in Blockchain. Mostly a reading group, discussing the original bitcoin paper: https://bitcoin.org/bitcoin.pdf
Around Hilbert’s Tenth Problem
Speaker: Mihai Prunescu (University of Bucharest)
Abstract: We discuss different implications of the negative answer of Hilbert’s Tenth Problem: the exponential Diophantine equation over ℕ and ℚ, the minimal number of variables which lead to an undecidable problem over ℤ, the homogeneous Diophantine problem over ℤ.
Verifying security protocols using BAN logic – Part 2
Speaker: Alexandru Dragomir (University of Bucharest)
Abstract: Epistemic logics – logics aimed at reasoning about knowledge and belief – are widely considered to be suitable for modelling, analyzing and predicting vulnerabilities of security protocols. One of the first and most discussed logical approaches to the problem of verifying security protocols is the one proposed in BAN logic (Burrows, Abadi & Needham 1989), a many-sorted epistemic logic used for its intuitive and compelling set of inference rules devised for reasoning about an agent’s beliefs, trust and message exchange. I will assume knowledge of the basics of BAN logic and focus on presenting and analyzing the Needham-Schroeder and Kerberos protocols using this particular logical framework. Consequently, I will highlight some of the pros and cons of using BAN logic in verifying security protocols.

