Dr. Cristian Staicu ist Tenure-Track Faculty am CISPA. Er hat in der Software Lab Gruppe der TU Darmstadt, unter Betreuung von Michael Pradel promoviert. Davor hat Christian seinen Master vom EIT Digital, einem europäischen Masterstudiengang mit Doppelabschluss, erhalten. Zudem hat er ein Jahr an der Universität von Twente den Niederlanden und ein Jahr an der Universität von Trento in Italien studiert. Seinen Bachelorabschluss in Computer Engineering hat Cristian von der Politehnica Universität in Timișoara, Rumänien, erhalten. Sein Hauptforschungsinteressen sind Systemsicherheit an der Schnittstelle von Software-und Web-Sicherheit, Softwaretechnik und Programmiersprachen. Eines der zentralen Ziele seiner Forschungsgruppe ist direkt zum Open-Source-Ökosystem beizutragen: Entweder durch die Entwicklung von Werkzeugen, die von Anwendern verwendet werden können oder durch die Aufdeckung von Sicherheitsschwachstellen in realen Systemen/Projekten.
USENIX-Security
USENIX Security Symposium 2023USENIX Security Symposium 2023
USENIX-Security
USENIX Security Symposium 2023USENIX Security Symposium 2023
USENIX-Security
USENIX Security Symposium 2023USENIX Security Symposium 2023
ICSE
International Conference on Software Engineering (ICSE)ICSE 2023
CCS
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security28th ACM Conference on Computer and Communications Security (CCS 2021)
UNSPECIFIED
Proceedings of the 1st International Workshop on Machine Learning in Software EngineeringInternational Workshop on Machine Learning in Software Engineering in conjuncture with ECML PKDD
UNSPECIFIED
SampleFix: Learning to Generate Functionally Diverse Fixes1st International Workshop on Machine Learning in Software Engineering
Program Analysis for Vulnerability Detection
For registration, please apply for this seminar through the central seminar assignment system.
Program analysis is a mature research area at the intersection of programming languages, formal methods, and software engineering. One of its main applications is automatic vulnerability detection. However, the complexity of modern systems is overwhelming and the vulnerabilities to be detected are increasingly sophisticated. To account for these particularities, many recent approaches advocate for lightweight program analysis techniques or hybrid methods, i.e., static and dynamic analysis. This seminar explores the trade-offs involved in designing a program analysis that scales to analyzing the security of real systems. In this seminar, we will discuss recent research papers in the area in a reading group format. Each week, one student will present papers covering a given topic, followed by a discussion. All participants are expected to actively participate in the discussion by asking questions.
Instructor: Cristian-Alexandru Staicu
Time: To be decided
Location: Zoom (Disclaimer).
To be decided.
The final grade is an aggregate of the following parts, both presentation and final report are mandatory:
Please find below a set of useful materials for the seminar:
Joint Advances in Web Security
For registration, please apply for this seminar through the central seminar assignment system.
In this seminar, students will learn to present, discuss, and summarize papers in different areas of Web security. The seminar is taught as a combination of a reading group with weekly meetings and a regular seminar, where you have to write a seminar paper. Specifically, each student will get a single topic assigned to them, consisting of two papers (a lead and follow-up paper).
For the weekly meetings, all students have to have read the lead paper and must state at least three questions before the meeting. In the meeting, the assigned student will present the follow-up paper (20 minute presentation + 10 minute Q/A). Afterward, the entire group will discuss both papers.
Moreover, each student will write a seminar paper on the topic assigned to them, for which the two papers on the topic serve as the starting point.
Each seminar paper is meant to provide a summary/categorization of research papers in the associated area. Depending on the topic, the paper should be structured in a logical fashion. For example, assume the topic of Service Workers. One might classify the seminar paper based on security considerations for Service Workers, attacks against Service Workers, and attacks enabled through Service Workers. Each section should demonstrate the state of the art in the area. Finally, the paper should, where possible, discuss limitations and open issues given the previously conducted work.
All seminar papers are due on February 11, 2022. Based on your submission, you will receive feedback within one week and have until March 4, 2022 to improve your paper. The paper grading will be on the final version. Note that the first submission must already be sufficient to pass. If you submit a half-baked version of the paper, you will flunk the course.
Each paper must use the provided template. It must not be longer than 8 pages, not counting references and appendices. Note that appendices are not meant to provide information that is absolutely necessary to understand the paper, but rather to provide auxiliary material. Papers can be shorter, but in general the provided page limit is a good indicator of how long a paper should be.
The list of topics, papers, and dates for the respective meetings can be found here.