כדי להצטרף לרשימת תפוצה של קולוקוויום מדעי המחשב, אנא בקר ב דף מנויים של הרשימה.
Computer Science events calendar in HTTP ICS format for of Google calendars, and for Outlook.
Academic Calendar at Technion site.
Communication protocols define how systems exchange information and coordinate actions. In security contexts, understanding these protocols is crucial for tasks such as finding vulnerabilities and analyzing malware. In practice, protocol specifications are often missing, outdated, or incomplete, forcing analysts to reverse engineer protocol behavior. Manual protocol reverse engineering is slow and requires significant expertise, while current automatic approaches are ill-equipped to deal with real protocols, due to state explosion, long execution times, or limited code coverage.
In this seminar, we present PALI, an automated system for learning protocols directly from target systems. PALI employs LLM-driven hybrid analysis to create and expand protocol state machines. It then validates the state machines by combining path-level testing with a minimal consistent DFA inference algorithm, based on carefully selected positive and negative examples. This process yields a minimal and reliable state machine consistent with the target system. We evaluated PALI on a wide variety of real and novel protocols, used by benign systems (such as HTTP and SMTP) and malicious ones (the GH0ST malware), achieving accurate state machines while significantly reducing manual analysis effort.
Dominating Set is a fundamental problem in graph theory: given a graph, find a minimum-weight subset of vertices such that every vertex is either selected or shares an edge with a selected vertex.
In online settings where vertices arrive sequentially, comparing algorithms against an offline optimum with full knowledge of the input leads to extremely strong lower bounds, where even a simple star graph shows that any online algorithm must have competitive ratio Ω(n), with n being the number of vertices, matching the trivial strategy of selecting all vertices.
We study the incremental dominating set problem, where the optimal algorithm is constrained to the same choices available to online algorithms. This introduces a benchmark that enables a meaningful comparison between algorithms.
We present the first results for vertex-weighted graphs and randomized algorithms in this model. For incremental dominating set, we give an O(Δ)-competitive deterministic algorithm and an O(log²Δ)-competitive randomized algorithm, where Δ is the maximum degree in the graph.
We extend these results to the Connected Dominating Set problem, which requires the dominating set to be connected. When the neighborhood of each arriving vertex is known in advance, we can improve the competitive ratio of deterministic algorithms to be polylogarithmic.
Finally, we establish matching lower bounds, showing that all our results are optimal up to constant factors.
טאוב 601
Distributed asynchronous systems often require explicit synchronization to ensure the correct implementation of shared objects. In this talk, I introduce the Delaying the Future approach for reasoning about the ordering of events in distributed executions. Its key idea is that, under certain conditions, events can be postponed without any process noticing the change.
I will show how this technique leads to characterizations of communication requirements in asynchronous message-passing systems and in shared-memory systems under the TSO memory model. The Delaying the Future approach provides a unified way to understand the synchronization required by linearizable implementations of common objects such as registers, stacks, and snapshots.