Distinguished Lectures
With the SnT Distinguished Lectures, we bring eminent researchers and practitioners from academia and industry to Luxembourg to speak on topics of broad interest.
Contact: Dr. Gabriele Lenzini
|
Mind the Gap: Promises, Pitfalls, and Opportunities of Hardware-Assisted Security - 13 March, 2019 |
![]() |
It is our pleasure to host this distinguished lecture by Ahmad-Reza Sadeghi, TU Darmstadt. Date: 13 March, 2019 |
|
A System of Systems Engineering Perspective on IoT - 6 December, 2018 |
![]() |
It is our pleasure to host this distinguished lecture by François Coallier, École de technologie supérieure, Canada. The lecture will be followed by a reception. Date: 6 December, 2018 |
|
Coins, Clubs, and Crowds - 5 December, 2018 |
![]() |
It is our pleasure to host this distinguished lecture by Bryan Ford, Swiss Federal Institute of Technology in Lausanne. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: 5 December, 2018 |
|
Convex Optimisation - 22 June, 2018 |
![]() |
It is our pleasure to host this distinguished lecture by Stephen Boyd, Stanford University. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: 22 June, 2018 |
|
Don't bet on your random number generator - 31 March, 2017 |
![]() |
It is our pleasure to host this distinguished lecture by Philip B. Stark, University of California, Berkeley. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: 31 March, 2017 |
|
Analysis of Program Binaries for Vulnerability Detection and Patching - January 6, 2017 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Abhik Roychoudhury, National University of Singapore. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: January 6, 2017 |
|
Dynamic Analyses and Their Security Applications - November 30, 2016 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Xiangyu Zhang, Purdue University. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: November 30, 2016 |
|
Engineering in Cyber Resiliency: A Pragmatic but Not Perfect Approach - November 11, 2016 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. William H. Sanders, University of Illinois at Urbana-Champaign. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: November 11, 2016 |
|
String Analysis for Vulnerability Detection and Repair - July 21, 2016 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Tevfik Bultan from University of California, Santa Barbara. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: July 21, 2016 |
|
Analytics on Graphs with Trillions of Edges - February 5, 2016 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Will Zwaenepoel from the School of Computer and Communication Sciences EPFL. The lecture will be followed by a reception. Please, feel free to forward this invitation. Date: February 5, 2015 |
|
Effective Reuse across Many Variants of Software Systems - a new Paradigm for Evolvable Product Lines - November 26, 2015 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Alexander Egyed, Johannes Kepler University (JKU) Linz, Austria. The lecture will be followed by a reception. Please, feel free to forward this invitation. Date: November 26, 2015 |
|
Recent Advances in Search Based Software Testing and Genetic Improvement - October 8, 2015 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Mark Harman from the University College London. The lecture will be followed by a reception. Please, feel free to forward this invitation. Date: October 8, 2015 |
|
Post-Snowden Cryptography - June 11, 2015 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Adi Shamir, Weizmann Institute. Please feel free to forward this invitation. Date: June 11, 2015 |
|
What's in a game of cards? Options for programming mobile systems in CSP - June 9, 2015 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Bill Roscoe, Oxford University. Please feel free to forward this invitation. Date: June 9, 2015 |
|
Towards Effective Software and Systems Traceability - March 20, 2015 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Jane Cleland-Huang, DePaul University. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: March 20, 2015 |
|
Serious Data, Serious Mining - February 24, 2015 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Bart De Moor, ESAT-STADIUS KU Leuven. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: February 24, 2015 |
|
Monitoring Policy Compliance - April 28, 2015 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. David Basin, ETH Zurich. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: April 28, 2015 |
|
On Software Engineering for Privacy in Ubiquitous Computing - February 10, 2015 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Bashar Nuseibeh, Open University. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: February 10, 2015 |
|
Privacy in Tomorrow's Internet - January 20, 2015 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Michael Backes, University of Saarland. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: January 20, 2015 |
|
Building dependable situation-aware software: how to self-adapt to environment changes - October 7, 2014 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Carlo Ghezzi, Politecnico di Milano. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: October 7, 2014 |
|
Automated Debugging: Are We There Yet? - June 30, 2014 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Alex Orso, Georgia Institute of Technology. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: June 30, 2014 |
|
Model-based Testing in the Era of Web 2.0 - June 13, 2014 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Paolo Tonella, Fondazione Bruno Kessler (FBK),Trento. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: June 13, 2014 |
|
Exploiting intrinsic redundancy to increase software reliability - May 7, 2014 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Mauro Pezzè, University of Lugano. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: May 7, 2014 |
|
Big Data, Big Brother, and Social Science - February 20, 2014 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Ralph Schroeder, Oxford Internet Institute. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: February 20, 2014 |
|
The Secrets of Automated Reasoning - November 28, 2013 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Christoph Weidenbach, Max Planck Institute for Informatics, Saarbruecken. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: November 28, 2013 |
|
Infinite Capacity? - November 18, 2013 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Rahim Tafazolli, University of Surrey. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: November 18, 2013 |
|
Privacy, Europe, Law. Choose two out of three? - December 12, 2013 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Nikolaus Forgó, University of Hanover. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: December 12, 2013 |
|
Can we protect protocols against attacks that have not been invented yet? - April 11, 2013 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. David Naccache, Pantheon-Assas University. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: April 11, 2013 |
|
Electronic Voting: Danger and Opportunity - March 21, 2013 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. J. Alex Halderman, University of Michigan. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: March 21, 2013 |
|
Security and Dependability Risks of Critical Information Infrastructures (or why Bang! is different from Crash) - February 28, 2013 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Paulo Veríssimo, Univ. Lisboa, Faculdade de Ciências, LaSIGE Lisbon - Portugal. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: February 28, 2013 |
|
Learning to improve Software Engineering methods, techniques, and tools and through their application - January 23, 2013 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Victor R. Basili, Professor Emeritus of Computer Science, University of Maryland. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: January 23, 2013 |
|
Abstraction as a Unifying Link for Formal Approaches to Concurrency - November 22, 2012 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Cliff Jones, Newcastle University. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: November 22, 2012 |
|
Subterfuge in Decentralized Authorization Systems - October 18, 2012 |
![]() |
It is our pleasure to host this distinguished lecture by Dr. Simon Foley, University College Cork. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: October 18, 2012 |
|
The Effectiveness of Internet Content Filters - July 13, 2012 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Philip B Stark, University of California, Berkeley. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: July 13, 2012 |
|
TLS and DTLS: A Tale of Two Protocols - September 20, 2012 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Kenny Paterson, Royal Holloway University. The lecture will be followed by a reception. Please feel free to forward this invitation. Date: September 20, 2012 |
|
Semantics for noninterference security: Rhyme and Reason - November 17, 2011 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Carroll Morgan, University of New South Wales. The lecture will be followed by a reception. Please feel free to forward this invitation Date: November 17, 2011 |
|
Adventures in Electronic Voting Research - July 18, 2011 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Dan Wallach, Rice University, Houston. The lecture will be followed by a reception. Please feel free to forward this invitation Date: July 18, 2011 |
|
Current Research Issues in Legal Informatics - June 30, 2011 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Maximilian Herberger, University of Saarland. The lecture will be followed by a reception. Please feel free to forward this invitation |
|
Satcoms 2020 R&D Challenges - May 10, 2011 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Riccardo De Gaudenzi, European Space Research and Technology Centre (ESTEC). The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Automated Validation of Trust and Security of Service-oriented Architectures - June 16, 2011 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Luca Vigano, University of Verona. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Implementing Prêt à Voter - March 16, 2011 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Steve Schneider, University of Surrey. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Attestation: Trying to decipher what it is - February 28, 2011 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Nigel Smart, University of Bristol. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Automatic verification of security and privacy properties - January 24, 2011 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Dr. Mark D. Ryan from the University of Birmingham. The lecture will be followed by a reception.Please feel free to forward this invitation. |
|
Privacy and confidentiality in the future Internet - January 21, 2010 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Johannes A. Buchmann, Technical University of Darmstadt. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
The Computational Way to Argue - November 9, 2010 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Dr. Jürg Kohlas, University of Fribourg. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Banks versus Trojans: a tour of the battlegrounds - October 1, 2009 |
![]() |
It is our pleasure to host this distinguished Lecture by Dr. Jan Joris Vereijken, Global Security Architect for ING Direct. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
The Role of Science in Cybercrime Prevention and Computer Security - July 14, 2010 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Aad Van Moorsel, Professor in Computer Science at Newcastle University, UK. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Faultless Systems: Yes we Can - July 1, 2010 |
![]() |
It is our pleasure to host this distinguished lecture by J-R Abrial, Professor at ETH Zurich in Switzerland. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Security of Voting Systems - May 19, 2010 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Ronald L. Rivest, Professor of Computer Science in MIT's Department of Electrical Engineering and Computer Science. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Information Ethics - May 4, 2010 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Dr. Rafael Capurro, Distinguished Researcher in Information Ethics, School of Information Studies, University of Wisconsin-Milwaukee, USA. The lecture will be followed by a reception. |
|
Smart cards in public transport: the Mifare Classic Case - February 18, 2010 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Dr. Bart Jacobs, Professor at the Technical University Eindhoven. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Reliability with Uncertainties: Stochastic Model of Robust Resource Management for Computing Systems - January 13, 2010 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. H.J. Siegel, Distinguished Professor of Electrical and Computer Engineering at Colorado State University and Director of the CSU Information Science and Technology Center( ISTeC). The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
The Anatomy of a Crypto Protocol - November 17, 2009 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Joshua Guttman, Professor of Computer Science at the Worcester Polytechnic Institute. The lecture will be followed by a reception.Please feel free to forward this invitation. |
|
Energy-Aware Scheduling and Resources Allocation for Large-Scale Distributed Systems - July 2, 2009 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. Albert Y. Zomaya, Chair Professor of High Performance Computing and Networking in the School of Information Technologies, Sydney University. The lecture will be followed by a reception. Please feel free to forward this invitation. |
|
Characterizing Very Low Frequency Internet Traffic - May 15, 2009 |
![]() |
It is our pleasure to host this distinguished lecture by Prof. John Mc Hugh from the Canada Research Chair in Privacy and Security at Dalhousie University in Halifax. The lecture will be followed by a reception. Please, feel free to forward this invitation. |
|