News and Events
Here we list the news of FMT
|December 12, 2012||
On Friday 30 November last, Tom van Dijk has won the second prize for his Master thesis, in the national M&I Informatics Thesis Competition 2012. See University website (in dutch), Technisch Weekblad website (in dutch), KHMW website (in dutch).
|December 12, 2012||
For the second year running, Arend Rensink of the FMT group was nominated by the Computer Science students as one of the potential recipients of the yearly award for the best teacher. The list of nominees, in alphabetical order, reads:
See also here.
|December 6, 2012||
On Thursday 29 November last, Dino Distefano, who in 2002 received his PhD degree at the FMT group of the Department of Computer Science (EWI), gave a honorary lecture at the official reception of the prestigious Roger Needham Award of the British Computer Society. The award is given annually for a distinguished research contribution in computer science by a UK based researcher who has completed up to 10 years of post-doctoral research.
Dino, who after his graduation went to work at the Queen Mary college in London (where he was appointed professor after winning this award), gave a presentation on “Memory Safety Proofs for the Masses”, in which he reported on recent successes in the automatic detection of certain types of errors in industrial-sized code bases (such as, among others, the 5M-lines Android operating system). See www.bcs.org/needham/2012 for more information.
The first picture shows Dino at his honorary lecture, the second shows him with his proud PhD supervisors, Joost-Pieter Katoen (right) and Arend Rensink (left).
|November 5, 2012||
Human behaviour key in protecting information assets
An information infrastructure may be protected by the best technical means possible, but in the end it is often human behaviour that leads to unwanted intrusion or to the theft of information. By themselves, technical solutions will not solve these problems. That’s why universities and companies all over Europe are getting involved in the TREsPASS project, which makes specific allowance for the human dimension. The aim is to develop a smart ‘attack navigator’, which will trace potential weak points within an organization or a given infrastructure. The 13.5 million € project, which is being coordinated by the University of Twente in the Netherlands, starts on 1 November.
Everyone is familiar with the yellow ‘Post-it’ memos, showing login details, that are often found stuck to computer monitors. The same goes for USB sticks found in car parks. However, few grasp the real impact of such actions on an organization’s business or brand. Both may eventually lead to data theft, not as a result of any technical failure, but as a result of the vagaries of human behaviour. The TREsPASS project’s `attack navigator’ combines technical and human aspects of security to identify weak points in organizations and their infrastructure. The tool can then help users to select the most effective countermeasures. To this end, the project combines knowledge from the technical sciences (how vulnerable are protocols and software?) and social sciences (how vulnerable are patterns of human behaviour and why?), as well as state-of-the-art industry processes and tools. Visualizing this information in a sufficiently expressive way is one of the challenges facing this project.
FMT members involved: Marielle Stoelinga (coordinator of WP3) and Florian Arnold (PhD student)
|October 18, 2012||
Jaco van de Pol won the first prize in the RERS challenge at the ISOLA conference at Crete. The assignment was to check 100 properties on 15 C-programs with a PLC-like flat control structure including integer arithmetic. The programs were up to 6 MB large, with state spaces over 1 billion states.
The winning strategy was to transform the programs to Promela and check the properties with the multi-core LTL engine developed by Alfons Laarman, on a cluster of machines including a 48-core machine with 148 GB internal shared memory.
This was a free-style challenge. Our high-performance exhaustive analysis with LTSmin had to compete with approaches using BDDs, static analysis, constraints and symbolic execution.
|October 12, 2012||
MuseumJeugdUniversiteit is an initiative by leading Dutch Museums to get primary school pupils interested in science.
Mariëlle Stoelinga will give a guest lecture about making and breaking secret codes in Museum Twentse Welle.
|October 12, 2012||
During his internship, MTV Student Jeroen Meijer has applied innovative model-based testing techniques at PANalytical, a high tech company producing Xray detectors. He will present his techniques at the 18th Dutch Testing Day, held at November 27th in Utrecht.
|October 1, 2012||
The paper titled Pattern-based Graph Abstraction received the best paper award for the Foundations Track of the Sixth International Conference on Graph Transformation (ICGT) held in Bremen, Germany during the last week of September 2012.
|September 19, 2012||
Danny Bergsma will present a poster about the paper Static Verification of Security Policies at the Student Research Conference, organised by the VSNU on November 21, 2012.
The paper describes the work he did in the context of his bachelor referaat. It describes improved algorithms to propagate pre- and postconditions that encode a security policy.
|June 21, 2012||
On June 21, 2012, the EU launched a new campaign 'Science it's a girl' to encourage girls to choose technical science-related studies, and to envisage a research career. As part of the campaign, profiles of several succesful women in science have been produced. Marieke Huisman is one of these role models. Her profile can be seen on science-girl-thing.eu.