Automata learning algorithms such as the L* algorithm are a family of active
learning algorithms. They are used to automatically build a model of a system, in
the form of automata or transducers, by querying the target system and then
refining the model using counterexamples. In this talk, I will discuss new
systems, based on novel and classical automata learning algorithms, for testing
a variety of security and correctness properties in a black-box manner, i.e.
given only the ability to query the target program and without access to the
Abstract: Computers are now ubiquitous. However, computers and digital content have remained largely separate from the physical world – users explicitly interact with computers through small screens and input devices, and the “virtual world” of digital content has had very little overlap with the immediate, physical world. My work aims to help computing escape the confines of screens and devices, and spill information- and computationally-rich digital content out into the familiar world around us.
The City of Madison's Information Technology Department has an exciting career opportunity. We are currently looking for a highly adaptable I.T. professional to provide primary application development and support for City software. This type of work typically involves application programming, scripting, report writing, and application configuration against a Microsoft SQL database.
Building industrial Internet-scale systems isn't easy. It requires solving major technological challenges and making many decisions balancing technical, product, and organizational requirements. Often times when research and abstract ideas meet reality, the results can be messy and the problems only become evident as the system grows.
We are looking for talented and motivated software engineers to join our development staff in building our next generation of trading infrastructure and applications. These distributed real-time systems will require you to have a deep understanding of computer science concepts, strong software development skills and methodology, and effective communication and teamwork abilities. The design and implementation of these systems will be a significant challenge to even the most talented developers and we hope you are up for the task.
The NSF REU program at Oklahoma State University (OSU) is a ten-week summer program for undergraduate students. Participants in the program will contribute to research projects in big data analytics, including computer vision, visualization, social media data analytics, anonymity, and machine learning. Field trips, talks by external speakers, and workshops are included.
Undergraduate students from 2-year and 4-year colleges
Abstract: The security of any system relies on models and assumptions that attempt to capture potential adversarial behavior. Unfortunately, when faced with real world adversaries, these assumptions often become flaky, inaccurate or even completely incorrect. In this talk, I will show several examples of this gap between theoretical and real-world security. First, I will present Spectre and Meltdown, two microarchitectural attacks that read protected OS kernel memory by exploiting speculative execution, a performance optimization typically performed by all modern CPUs.
At HOVER (https://hover.to/) we are building the future of property data with a platform that lets anyone generate accurate 3D buildings by simply taking a few photos with their smartphone.
HOVER is backed by a number of investors including: Google Ventures, Home Depot, and Standard Industries.
We are growing quickly and hiring for a number of roles spanning the spectrum of positions. We are looking to hire undergraduates and/or graduate students, for both full-time positions and internships.