Skip to content (access key 's')
Logo of Technion
Logo of CS Department
Events

Colloquia and Seminars

To join the email distribution list of the cs colloquia, please visit the list subscription page.

Computer Science events calendar in HTTP ICS format for of Google calendars, and for Outlook.
Academic Calendar at Technion site.

Upcoming Colloquia & Seminars

event head separator Ambiguous Strategic Classification
event speaker icon
Ivri Hikri (M.Sc. Thesis Seminar)
event date icon
Monday, 23.02.2026, 10:00
event speaker icon
Advisor:  Dr. Nir Rosenfeld
A common assumption in strategic classification is that the classifier is made public knowledge. However, it remains unclear if, and why, a system would choose to commit to full disclosure. We study a setting in which regulation requires the system to share some, but not all, of the information. This entails a learning task in which the goal is to jointly learn a classifier and the uncertainty surrounding it. Towards this, we adopt from robust mechanism design the notion of ambiguity, which in our setting permits the learner to reveal a set or range of possible classifiers, and choose one to realize. We investigate how ambiguity affects the learning task, propose efficient algorithms for computing best-responses and training, and empirically explore strategic learning and its outcomes in this novel setting and using our approach.
event head separator Accurate Inference of Protocol State Machines from Binary Executables
event speaker icon
Hila Ziv (M.Sc. Thesis Seminar)
event date icon
Wednesday, 25.02.2026, 11:00
event location icon

Taub 601 & Zoom

event speaker icon
Advisor:  Dr. Yaniv David

Communication protocols define how systems exchange information and coordinate actions. In security contexts, understanding these protocols is crucial for tasks such as finding vulnerabilities and analyzing malware. In practice, protocol specifications are often missing, outdated, or incomplete, forcing analysts to reverse engineer protocol behavior. Manual protocol reverse engineering is slow and requires significant expertise, while current automatic approaches are ill-equipped to deal with real protocols, due to state explosion, long execution times, or limited code coverage.

In this seminar, we present PALI, an automated system for learning protocols directly from target systems. PALI employs LLM-driven hybrid analysis to create and expand protocol state machines. It then validates the state machines by combining path-level testing with a minimal consistent DFA inference algorithm, based on carefully selected positive and negative examples. This process yields a minimal and reliable state machine consistent with the target system. We evaluated PALI on a wide variety of real and novel protocols, used by benign systems (such as HTTP and SMTP) and malicious ones (the GH0ST malware), achieving accurate state machines while significantly reducing manual analysis effort.

event head separator Incremental Dominating Set
event speaker icon
Jonathan Gal (M.Sc. Thesis Seminar)
event date icon
Thursday, 26.02.2026, 11:30
event location icon

Taub 9 & Zoom

event speaker icon
Advisor:  Prof. Seffi Naor

Dominating Set is a fundamental problem in graph theory: given a graph, find a minimum-weight subset of vertices such that every vertex is either selected or shares an edge with a selected vertex.

In online settings where vertices arrive sequentially, comparing algorithms against an offline optimum with full knowledge of the input leads to extremely strong lower bounds, where even a simple star graph shows that any online algorithm must have competitive ratio Ω(n), with n being the number of vertices, matching the trivial strategy of selecting all vertices.

We study the incremental dominating set problem, where the optimal algorithm is constrained to the same choices available to online algorithms. This introduces a benchmark that enables a meaningful comparison between algorithms.

We present the first results for vertex-weighted graphs and randomized algorithms in this model. For incremental dominating set, we give an O(Δ)-competitive deterministic algorithm and an O(log²Δ)-competitive randomized algorithm, where Δ is the maximum degree in the graph.

We extend these results to the Connected Dominating Set problem, which requires the dominating set to be connected. When the neighborhood of each arriving vertex is known in advance, we can improve the competitive ratio of deterministic algorithms to be polylogarithmic.

Finally, we establish matching lower bounds, showing that all our results are optimal up to constant factors.

event head separator Delaying the Future
event speaker icon
Raissa Nataf (Ph.D. Thesis Seminar)
event date icon
Wednesday, 04.03.2026, 11:30
event location icon

Taub 601

event speaker icon
Advisor:  Prof. Yoram Moses

Distributed asynchronous systems often require explicit synchronization to ensure the correct implementation of shared objects. In this talk, I introduce the Delaying the Future approach for reasoning about the ordering of events in distributed executions. Its key idea is that, under certain conditions, events can be postponed without any process noticing the change.

I will show how this technique leads to characterizations of communication requirements in asynchronous message-passing systems and in shared-memory systems under the TSO memory model. The Delaying the Future approach provides a unified way to understand the synchronization required by linearizable implementations of common objects such as registers, stacks, and snapshots.