Faculty Presentations II

3:15 pm to 4:15 pm
3:15 - 3:35
"The Third Wave? Inclusive Privacy and Security"
Yang Wang, Assistant Professor, Syracuse University
Abstract:
In this talk, I will present my early work-in-progress on inclusive privacy and security, which challenges and complements the mainstream perspectives on privacy and security research that focus on predominately technical work (1st wave) and making technical designs usable (2nd wave). I propose inclusive privacy and security as the 3rd wave of research. This research is focused on designing privacy and security mechanisms that are inclusive to individuals with various characteristics, abilities, needs, and values.
 
Bio:

Yang Wang is an assistant professor and co-director of the Social Computing Systems (SALT) Lab in the School of Information Studies at Syracuse University. Yang’s research is centered around the human aspects of privacy and security, and social computing. He has won a NSF CAREER award, a Best Paper Honorable Mention at the ACM CHI Conference, and a Top Privacy Paper for Policy Makers selected by the Future of Privacy Forum. He and his work have appeared in news media such as the New York Times, Wall Street Journal, BBC and China Daily. His research has been supported by the National Science Foundation, Department of Health and Human Services, Google, Alcatel-Lucent, and The Privacy Projects. He received his Ph.D. in information and computer science from the University of California, Irvine.

 

3:35 - 3:55
"CDSChecker: Checking Concurrent Data Structures Written with C/C++ Atomics"
Brian Demsky, Professor, Electrical Engineering and Computer Science Department, UC Irvine
Abstract:
Writing low-level concurrent software has traditionally required intimate knowledge of the entire toolchain and often has involved coding in assembly. New language standards have extended C and C++ with support for low-level atomic operations and a weak memory model, enabling developers to write portable and efficient multithreaded code. Developing correct low-level concurrent code is well known to be especially difficult under a weak memory model, where code behavior can be surprising. Building reliable concurrent software using C/C++ low-level atomic operations will likely require tools that help developers discover unexpected program behaviors.
 
In this talk we present CDSCHECKER, a tool for exhaustively exploring the behaviors of concurrent code under the C/C++ memory model. We develop several novel techniques for modeling the relaxed behaviors allowed by the memory model and for minimizing the number of execution behaviors that CDSCHECKER must explore. We have used CDSCHECKER to exhaustively unit test several concurrent data structure implementations on specific inputs and have discovered errors in both a recently published C11 implementation of a work-stealing queue and a single producer, single consumer queue implementation.
 
Bio:
Brian Demsky is a Professor in the Electrical Engineering and Computer Science Department at the University of California, Irvine. His current research interests include programming languages, software engineering, security, compilation, parallel software, program analysis, and program understanding. He received his B.S. degrees in Physics and Electrical Engineering from the University of Texas, Austin in 1998, his M.S. degree in Computer Science from MIT in 2001, and his Ph.D. degree in Computer Science from MIT in 2006.
 

 

<

3:55 - 4:15
"Missteps in Framework Design: Consequences and Solutions"
Sam Malek, Associate Professor, UC Irvine
Abstract:
The majority of today’s software systems, be it web programs or mobile apps, are developed on top of some kind of a software development framework. Development frameworks tend to determine many properties of the software that is built upon them. For instance, many development frameworks heavily constrain the architecture of the resulting software. It is thus paramount to get the design of such frameworks “right”. In this talk, I will first explore the difficulties of designing frameworks using Android as an example. I will then describe how certain design decisions in Android induce the security and energy flaws that are commonly encountered in Android apps. I will then provide an overview of research in my group that has attempted to deal with such flaws.
 
Bio:

Sam Malek is an Associate Professor in the Informatics Department within the School of Information and Computer Sciences at the University of California, Irvine. He is also a member of the Institute for Software Research and the director of Software Engineering and Analysis Laboratory. Malek's general research interests are in the field of software engineering, and to date his focus has spanned the areas of software architecture, autonomic computing, mobile computing, security, and software analysis and testing. The underlying theme of his research has been to devise techniques and tools that aid with the construction, analysis, and maintenance of large-scale software systems. Malek received his Ph.D. and M.S. degrees in Computer Science from the University of Southern California and his B.S. degree in Information and Computer Science from the University of California, Irvine. He has received numerous awards for his research contributions, including the National Science Foundation CAREER award (2013), GMU Emerging Researcher/Scholar/Creator award (2013), and GMU Computer Science Department Outstanding Faculty Research Award (2011). Malek is on the editorial board of IEEE Transactions on Software Engineering , ACM Transactions on Autonomous and Adaptive Systems, and the Springer Journal of Computing . He provides software expert witness consulting through Quandary Peak Research. Malek is a member of the Association for Computing Machinery (ACM), ACM Special Interest Group on Software Engineering (SIGSOFT), and the Institute of Electrical and Electronics Engineers (IEEE).