WebNotice

Please note: This master’s thesis presentation will take place in DC 3317 and online.

Peter Cai, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Martin Karsten

Please note: This PhD seminar will take place in DC 1304 and virtually.

Yiwei Lu, PhD candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Yaoliang Yu

Indiscriminate data poisoning attacks aim to decrease a model’s test accuracy by injecting a small amount of corrupted training data. Despite significant interest, existing attacks remain relatively ineffective against modern machine learning (ML) architectures.

Please note: This master’s thesis presentation will take place in DC 1331 and online.

Yue Lyu, Master’s candidate
David R. Cheriton School of Computer Science

Supervisors: Professors Jian Zhao, Keiko Katsuragawa

Please note: This PhD defence will take place in DC 1331 and online.

Yen-Ting (Allen) Yeh, PhD candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Daniel Vogel

Please note: This master’s thesis presentation will take place in DC 1304 and virtually.

Zhili Zeng, Master’s candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Shane McIntosh

Continuous Integration (CI) is a popular software development practice that allows developers to quickly verify modifications to their projects. To cope with the ever-increasing demand for faster software releases, CI acceleration approaches have been proposed to expedite the feedback that CI provides.

Please note: This master’s thesis presentation will take place online.

Owura Asare, Master’s candidate
David R. Cheriton School of Computer Science

Supervisors: Professors Mei Nagappan, N. Asokan

In this thesis, we perform two security evaluations of GitHub’s Copilot with the aim of better understanding the strengths and weaknesses with of Code Generation Tools.

Please note: This talk will take place in DC 3317 and online over Zoom.

Joel Reardon, Associate Professor
Department of Computer Science, University of Calgary

Mozilla curates a set of root certificate authorities to validate hostnames for TLS in the Firefox browser. Many other software projects, such as Tor Browser and ca-certificates simply follow Mozilla’s list; other entities, such as Apple and Microsoft, make their own decisions for inclusion with considerations for Mozilla’s decisions and the associated public discussion.