Jean-Jacques Lévy December 3, 2010 Trento Proofs, Security, and Computational Sciences msr-inria.inria.fr.

Slides:



Advertisements
Similar presentations
Destination Europe Virginie van Wassenhove, PhD
Advertisements

Applying Machine Learning to Automatic Theorem Proving The Nature of the Research The aim of my research is to use machine learning techniques to detect.
The ideal of program correctness Tony Hoare CAVSeattleAugust 2006.
Jean-Jacques Lévy September 15, 2010 the MSR-INRIA Joint Centre msr-inria.inria.fr.
Kensington Oracle Edition: Open Discovery Workflow Meets Oracle 10g Professor Yike Guo.
Software Engineering & Automated Deduction Willem Visser Stellenbosch University With Nikolaj Bjorner (Microsoft Research, Redmond) Natarajan Shankar (SRI.
© Chinese University, CSE Dept. Software Engineering / Software Engineering Topic 1: Software Engineering: A Preview Your Name: ____________________.
The ideal of program correctness Tony Hoare BudapestSeptember 2006.
Deeper Security Analysis of Web-based Identity Federation Apurva Kumar IBM Research – India.
Jean-Jacques Lévy IKI, June 11, 2008 the MSR-INRIA Joint Centre.
Software Reliability CIS 640 Adapted from the lecture notes by Doron Pelel (
1 Formal Methods in SE Qaisar Javaid Assistant Professor Lecture 05.
Automated creation of verification models for C-programs Yury Yusupov Saint-Petersburg State Polytechnic University The Second Spring Young Researchers.
Mathematical Modeling Carsten Schürmann DemTech April 8, 2015 IEEE-SA VSSC
C van Ingen, D Agarwal, M Goode, J Gupchup, J Hunt, R Leonardson, M Rodriguez, N Li Berkeley Water Center John Hopkins University Lawrence Berkeley Laboratory.
SysMA S OFTWARE E NGINEERING FOR S ERVICE - O RIENTED AND A UTONOMIC S YSTEMS - I NTRODUCTION TO A UTONOMIC S YSTEMS - Lucca (Italy) – October, 2014 Francesco.
May 11, ACL2 Panel: What is the Future of Theorem Proving? Arvind Computer Science & Artificial Intelligence Laboratory.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 11 Prof. Crista Lopes.
AGVI Automatic Generation, Verification, and Implementation of security protocols By: Dawn Song, Adrian Perrig, and Doantam Phan. In: 13 th Conference.
FACULTY OF COMPUTER SCIENCE OUTPUT DD  annual event from students for students with contact to industry (~800 visitors)  live demonstrations  research.
Formal verification Marco A. Peña Universitat Politècnica de Catalunya.
Automatic Implementation of provable cryptography for confidentiality and integrity Presented by Tamara Rezk – INDES project - INRIA Joint work with: Cédric.
Overview of grid / cloud research in France Michel DAYDÉ Scientific Delegate at INS2/CNRS in charge of HPC / Grid / cloud Université de Toulouse - IRIT.
Mathematics throughout the CS Curriculum Support by NSF #
Jason Hallstrom (Clemson), Joan Krone (Denison), Joseph E. Hollingsworth (IU Southeast), and Murali Sitaraman(Clemson) This workshop is funded in part.
WEEK 1 CS 361: ADVANCED DATA STRUCTURES AND ALGORITHMS Dong Si Dept. of Computer Science 1.
F. Gava, HLPP 2005 Frédéric Gava A Modular Implementation of Parallel Data Structures in Bulk-Synchronous Parallel ML.
Introduction to Computer and Programming CS-101 Lecture 6 By : Lecturer : Omer Salih Dawood Department of Computer Science College of Arts and Science.
Relevance of Maths for CS John Barnden School of Computer Science University of Birmingham Intro to Maths for CS 2013/14.
Structure of Study Programmes
USING METADATA TO FACILITATE UNDERSTANDING AND CERTIFICATION ABOUT THE PRESERVATION PROPERTIES OF A PRESERVATION SYSTEM Jewel H. Ward, Hao Xu, Mike C.
Service-enabling Legacy Applications for the GENIE Project Sofia Panagiotidi, Jeremy Cohen, John Darlington, Marko Krznarić and Eleftheria Katsiri.
Structure of Study Programmes Bachelor of Computer Science Bachelor of Information Technology Master of Computer Science Master of Information Technology.
ZQL ZQL a cryptographic compiler for processing private data George Danezis Cédric Fournet Markulf Kohlweiss Zhengqin Luo & Alfredo Rial CraigMu’s review,
Proof Carrying Code Zhiwei Lin. Outline Proof-Carrying Code The Design and Implementation of a Certifying Compiler A Proof – Carrying Code Architecture.
Outline Announcements: –Homework I on web, due Fri., 5PM by –Small error on homework –Wed and Fri in ACCEL, Attendance required –LAST DAY TO ADD/DROP!
Formal Verification Lecture 9. Formal Verification Formal verification relies on Descriptions of the properties or requirements Descriptions of systems.
An overview of Coq Xinyu Feng USTC Erasmus Mundus NordSecMob Scholar at DTU.
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
Asynchronous Components with Futures: Semantics, Specification, and Proofs in a Theorem Prover Components (Distributed) Futures Formalisations (and proofs)
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Master’s Degree in Computer Science. Why? Acquire Credentials Learn Skills –Existing software: Unix, languages,... –General software development techniques.
University of California Irvine Department of Computer Science UCI Computer Science Department 7 majors 1860 undergraduates 322 graduate students ~42 faculty/lecturers.
Verification & Validation By: Amir Masoud Gharehbaghi
HACNet Simulation-based Validation of Security Protocols Vinay Venkataraghavan Advisors: S.Nair, P.-M. Seidel HACNet Lab Computer Science and Engineering.
1 Introduction to Cognitive systems Perception, indexing and communication for images and video Marc Berthod.
Adapting the Electronic Laboratory Notebook for the Semantic Era Tara Talbott, Michael Peterson, Jens Schwidder, James D. Myers 2005 International Symposium.
Advanced Software Development applied to (Symbolic) Systems Biology Karl Lieberherr.
OGCE Workflow and LEAD Overview Suresh Marru, Marlon Pierce September 2009.
CS223: Software Engineering
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
September 1999Compaq Computer CorporationSlide 1 of 16 Verification of cache-coherence protocols with TLA+ Homayoon Akhiani, Damien Doligez, Paul Harter,
URL: by Wishnu Prasetya Course on Program Verification 2015/2016.
Frederico Araujo CS6362 – Fall 2010 Automated Theorem Proving.
Mathematical Models and Proof/Analysis Methods for Timing-Based Systems And… Their Application to Communication, Fault-Tolerant Distributed Computing,
PARALLEL AND DISTRIBUTED PROGRAMMING MODELS U. Jhashuva 1 Asst. Prof Dept. of CSE om.
IS 2620: Developing Secure Systems Formal Verification/Methods Lecture 9 March 15, 2012.
서울대한양대 ( 안 산 ) 충남대 1년1년 컴퓨터기초 (C) 컴퓨터프로그래밍 (C, Java) 컴퓨터프로그래밍 (C) 2. 봄 프로그래밍 원리 (Scheme, ML) Structure & Interpretation of Computer Programs 프로그래밍 방법론.
Data Grids, Digital Libraries and Persistent Archives: An Integrated Approach to Publishing, Sharing and Archiving Data. Written By: R. Moore, A. Rajasekar,
Sub-fields of computer science. Sub-fields of computer science.
Computer Science Courses
Formal Verification/Methods
Program Verification Using
* 312 Foundations II 332 Data Abstractions 311 I 351 Hw/Sw Interface
IS 2935: Developing Secure Systems
An overview of Coq Xinyu Feng USTC.
Computer Science Courses in the Major
Rich Model Toolkit – An Infrastructure for Reliable Computer Systems
An overview of Coq.
Presentation transcript:

Jean-Jacques Lévy December 3, 2010 Trento Proofs, Security, and Computational Sciences msr-inria.inria.fr

Plateau de Saclay

Localization the plateau de Saclay IHÉS LRI-Orsay Polytechnique INRIA CEA RER B Paris Supelec = long term investment

6mn Bus super <= 10am also bus Paris >= 30mn Campus

Research 1. Track A – Math. Components (see Enrico Tassi’s talk) – Security – TLA+ 2. Track B – DDMF (see Frédéric Chyzak’s talk) – ReActivity – Adaptative search – Image & video mining – Action Azure

Track A Software Security Trustworthy Computing

Mathematical components Georges Gonthier, MSRC Assia Mahboubi, INRIA Saclay/LIX Y. Bertot, L. Rideau, L. Théry, INRIA Sophia Iona Pasca, INRIA Sophia François Garillot, MSR-INRIA (PhD) Cyril Cohen, ENS Cachan (PhD) Enrico Tassi, MSR-INRIA (postdoc) Benjamin Werner, INRIA Saclay/LIX formal proofs of math theorems with long proofs –4 color theorem (3.5 Gonthier-years) –Feit-Thompson theorem (3 MathComp-years – under progress)progress –Hales theorem computational proofs –higher-order logic allows programming within it –Coq proof-assistant now also Formath EU project (Chalmers, Bologna, etc.)

???correct 4colors4colors

li n e a r algebraalgebra

algebraalgebra

algebraalgebra

algebraalgebra

algebraalgebra

Secure Distributed Comp. Cédric Fournet, MSRC Karthik Bhargavan, INRIA Rocq. G. Barthe, IMDEA, Bruno Blanchet, INRIA/ENS B. Grégoire, S. Zanella, INRIA Sophia James Leifer, INRIA Rocq. Jean-Jacques Lévy, INRIA Rocq. Tamara Rezk, INRIA Sophia Francesco Zappa Nardelli, INRIA Rocq. Nataliya Guts, MSR-INRIA (PhD) Jérémy Planul, MSR-INRIA (PhD) –programming with secured communications –certified compiler from high-level primitives to low-level crypto- protocols –formal proofs of probabilistic protocols

Specs, Code, and Formal Tools TLS Kerberos WS-Security IPsec SSH Protocol Standards Protocol Implementations and Applications C/C++ Java ML C# F# Ruby Symbolic Analyses ProVerif (’01) Casper Cryptyc AVISPA Computational Analyses CryptoVerif (‘06) Hand Proofs NRL Athena Scyther Securify F7 (’08) General Verification SMT Solvers Theorem Provers Model Checkers Ocaml

Secure Distributed Comp. -secure implementations for typed session abstractions (v1 and v2) -cryptographic enforcement of information-flow security -secure Audit Logs -automated verifications of protocol implementations (TLS) -CertiCrypt: Formal Proofs for Computational Cryptography

Verification of TLS implementation Firefox –Firefox + Apache –certified client CClient + certified server CServer –Test functional features of Firefox + CServer and CClient + Apache –Prove security property of CC + CS –by translation to CryptoVerif [ Bruno Blanchet ] –automatic translation from Caml + assertion to CryptoVerif (fs2cv) ApacheCServerCClient

Tools for Formal Proofs Damien Doligez, INRIA Rocq. Denis Cousineau, MSR-INRIA (postdoc) Leslie Lamport, MSRSV Stephan Merz, INRIA Lorraine Natural proofs –First- order temporal logic –specification/verification of concurrent programs –tools for automatic theorem proving

Track B Computational Sciences Scientific Information Interaction

Dynamic Dictionary of math. functions Bruno Salvy, INRIA Rocq., Alin Bostan, INRIA Rocq., Frédéric Chyzak, INRIA Rocq. Alexandre Benoit, MSR-INRIA (intern) Marc Mezzarobba, MSR-INRIA (intern) Computer Algebra and Web for functions used by engineers –easy interface –dynamic tables of their properties –generation of programs to compute them.

ReActivity Wendy Mackay, INRIA Saclay, J.-D. Fekete, INRIA Saclay, Adaptive combinatorial Search Youssef Hamadi, MSRC Marc Schoenauer, INRIA-Saclay –improve the usability of Combinatorial Search algorithms. –automate the fine tuning of solver parameters. –parallel solver: “disolver” –logs of experiments for biologists, historians, other scientists

Cloud computing action correlation between Neurospin MRI images and genomic data –thousands of most precise images –thousands of genomic variables with middleware of G. Antoniu –BlobSeer (a la Map-Reduce) for grid machines on top of Azure Gabriel Antoniu (INRIA Rennes) Bertrand Thirion (INRIA Saclay)

Neuroimaging center at Saclay Library and conférenc e room Clinical area (8 hospital bed, neuro psy rooms, EEG / /MEG) Pre-clinecal area (transgenic mice, primates, operating bloc, labs) 17.65T/260mm Future scanner IRM 11.74T IRM 7T IRM 3T logistic Laboratorie s and offices Cloud computing action

Image and Video mining Computer vision and Machine learning for: –archaeology and cultural heritage preservation: 3D object modeling and recognition from historical paintings and photographs –environmental sciences: change detection in dynamic satellite imagery –sociology: human activity modeling and recognition in video archives Ivan Laptev, INRIA Rocq. Josef Sivic, INRIA Rocq. Rick Zelinsky, MSRR Jean Ponce, ENS Andrew Blake, MSRC Etienne Mémin, INRIA Rennes Cordelia Schmid, INRIA Grenoble

Image and Video mining –archaeology and cultural heritage preservation: 3D object modeling and recognition from historical paintings and photographs

Image and Video mining –sociology: human activity modeling and recognition in video archives

Conclusion

Math. componentsCoqhigher-order + reflection SecurityPV/CVapplied pi-calculus + stochastic Spec. / Verif.TLA+1st order + ZF + temporal Logics in track A

DDMFcomputer algebrahard sciences Adapt. searchconstraints, machine learninghard sciences, biology Reactivitychi + visualisationsoft sciences, biology I.V. miningcomputer visionhumanities, environment Sciences in track B