Send email Copy Email Address

Short Bio

I am a faculty at the CISPA Helmholtz Center for Information Security, where I lead the Rigorous Analysis and Design group. From 2014 until 2018, I led a research group within the Reactive Systems Group at Saarland University. Before that, I was a postdoctoral researcher at TU Graz (with Roderick Bloem) and at EPFL (with Viktor Kuncak), and was a visiting professor at the University of Ljubljana. I obtained my doctorate from Saarland University in 2010, based on work I did at the Max Planck Institute for Informatics.

CV: Last four stations

Since 2018
Faculty at CISPA
Research group leader at Saarland University
Postdoctoral researcher at TU Graz
Visiting professor at University of Ljubljana, Slovenia

Publications by Swen Jacobs

Year 2020

Conference / Medium

Computer Aided Verification - 32nd International ConferenceComputer Aided Verification - 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21-24, 2020, Proceedings, Part I

Year 2019

Conference / Medium

ATVA 2019, International Symposium on Automated Technology for Verification and Analysis

Year 2018

Conference / Medium

22nd International Conference on Principles of Distributed Systems, OPODIS 2018, December 17-19, 2018, Hong Kong, China

Conference / Medium

International Symposium on Automated Technology for Verification and Analysis (ATVA)

Conference / Medium

IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2018, Verona, Italy, October 8-10, 2018

Teaching by Swen Jacobs

Winter 2019/20

Advanced Lecture: Reactive Synthesis

This course is aimed at students that are interested in reactive synthesis in its full breadth, ranging from its theoretical formalization as an infinite game to efficient algorithms and data structures to solve the synthesis problem, and in the implementation of state-of-the-art algorithms for practically relevant and challenging problems.

Winter 2019/20

Seminar: Formal Methods for Security

Engineering of secure systems is an arms race between attackers and system designers. In recent years, hardly a week goes by without the discovery of a new attack, and system designers scrambling to plug the holes. Formal methods are a means to break out of this arms race by ruling out entire classes of attacks once and for all.