jean-jacques lévy december 3, 2010 trento

37
Jean-Jacques Lévy December 3, 2010 Trento Proofs, Security, and Computational Sciences msr-inria.inria.fr

Upload: makara

Post on 24-Feb-2016

51 views

Category:

Documents


0 download

DESCRIPTION

Jean-Jacques Lévy December 3, 2010 Trento. Proofs, Security, and Computational Sciences. msr-inria.inria.fr. Plateau de Saclay. Localization. = long term investment. the plateau de Saclay. Paris. CEA. Polytechnique. INRIA. Supelec. RER B. LRI-Orsay. IHÉS. Campus. Bus 269-02 - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Jean-Jacques Lévy December 3, 2010 Trento

Jean-Jacques LévyDecember 3, 2010

Trento

Proofs, Security, and Computational Sciences

msr-inria.inria.fr

Page 2: Jean-Jacques Lévy December 3, 2010 Trento

Plateau de Saclay

Page 3: Jean-Jacques Lévy December 3, 2010 Trento

Localizationthe plateau de Saclay

IHÉS

LRI-Orsay

PolytechniqueINRIA

CEA

RER B

Paris

Supelec

= long term investment

Page 4: Jean-Jacques Lévy December 3, 2010 Trento

6mn

Bus 269-02 •super <=

10am•also bus 06-07

Paris >= 30mn

Campus

Page 5: Jean-Jacques Lévy December 3, 2010 Trento

Research1. Track A

– Math. Components (see Enrico Tassi’s talk)– Security– TLA+

2. Track B– DDMF (see Frédéric Chyzak’s talk)– ReActivity– Adaptative search– Image & video mining– Action Azure

Page 6: Jean-Jacques Lévy December 3, 2010 Trento
Page 7: Jean-Jacques Lévy December 3, 2010 Trento

Track A

Software SecurityTrustworthy Computing

Page 8: Jean-Jacques Lévy December 3, 2010 Trento

Mathematical componentsGeorges Gonthier, MSRC Assia Mahboubi, INRIA Saclay/LIX Y. Bertot, L. Rideau, L. Théry, INRIA SophiaIona Pasca, INRIA Sophia

François Garillot, MSR-INRIA (PhD) Cyril Cohen, ENS Cachan (PhD)Enrico Tassi, MSR-INRIA (postdoc)Benjamin Werner, INRIA Saclay/LIX

• formal proofs of math theorems with long proofs– 4 color theorem (3.5 Gonthier-years)

– Feit-Thompson theorem (3 MathComp-years – under progress)

– Hales theorem

• computational proofs– higher-order logic allows

programming within it

– Coq proof-assistant

now also Formath EU project (Chalmers, Bologna, etc.)

Page 9: Jean-Jacques Lévy December 3, 2010 Trento

??? correct

4 colors

Page 10: Jean-Jacques Lévy December 3, 2010 Trento

linear

algebra

Page 11: Jean-Jacques Lévy December 3, 2010 Trento

linear

algebra

Page 12: Jean-Jacques Lévy December 3, 2010 Trento

linear

algebra

Page 13: Jean-Jacques Lévy December 3, 2010 Trento

linear

algebra

Page 14: Jean-Jacques Lévy December 3, 2010 Trento

linear

algebra

Page 15: Jean-Jacques Lévy December 3, 2010 Trento

Secure Distributed Comp.Cédric Fournet, MSRCKarthik Bhargavan, INRIA Rocq.G. Barthe, IMDEA, Bruno Blanchet, INRIA/ENSB. Grégoire, S. Zanella, INRIA SophiaJames Leifer, INRIA Rocq.

Jean-Jacques Lévy, INRIA Rocq.Tamara Rezk, INRIA SophiaFrancesco Zappa Nardelli, INRIA Rocq.Nataliya Guts, MSR-INRIA (PhD)Jérémy Planul, MSR-INRIA (PhD)

– programming with secured communications

– certified compiler from high-level primitives to low-level crypto-protocols

– formal proofs of probabilistic protocols

Page 16: Jean-Jacques Lévy December 3, 2010 Trento

Specs, Code, and Formal Tools

TLS Kerberos

WS-SecurityIPsec

SSH

Protocol Standards

Protocol Implementations and Applications

C/C++Java

ML

C#

F#Ruby

Symbolic Analyses

ProVerif (’01)

Casper

Cryptyc

AVISPA

Computational Analyses

CryptoVerif (‘06)

Hand Proofs

NRLAthena

ScytherSecurify

F7 (’08)

General Verification

SMT Solvers

Theorem Provers Model

Checkers

Ocaml

Page 17: Jean-Jacques Lévy December 3, 2010 Trento

Secure Distributed Comp.- secure implementations for typed session abstractions (v1 and v2)

- cryptographic enforcement of information-flow security

- secure Audit Logs

- automated verifications of protocol implementations (TLS)

- CertiCrypt: Formal Proofs for Computational Cryptography

Page 18: Jean-Jacques Lévy December 3, 2010 Trento

Verification of TLS implementation

Firefox

– Firefox + Apache

– certified client CClient + certified server CServer

– Test functional features of Firefox + CServer and CClient + Apache

– Prove security property of CC + CS

– by translation to CryptoVerif [Bruno Blanchet]

– automatic translation from Caml + assertion to CryptoVerif (fs2cv)

Apache

CServerCClient

Page 19: Jean-Jacques Lévy December 3, 2010 Trento

Tools for Formal ProofsDamien Doligez, INRIA Rocq.Denis Cousineau, MSR-INRIA (postdoc)Leslie Lamport, MSRSVStephan Merz, INRIA Lorraine

• Natural proofs– First-order temporal logic

– specification/verification of concurrent programs

– tools for automatic theorem proving

Page 20: Jean-Jacques Lévy December 3, 2010 Trento
Page 21: Jean-Jacques Lévy December 3, 2010 Trento
Page 22: Jean-Jacques Lévy December 3, 2010 Trento

Track B

Computational SciencesScientific Information Interaction

Page 23: Jean-Jacques Lévy December 3, 2010 Trento

Dynamic Dictionary of math. functionsBruno Salvy, INRIA Rocq.,Alin Bostan, INRIA Rocq.,Frédéric Chyzak, INRIA Rocq.

Alexandre Benoit, MSR-INRIA (intern)Marc Mezzarobba, MSR-INRIA (intern)

Computer Algebra and Web for functions used by engineers

– easy interface

– dynamic tables of their properties

– generation of programs to compute them.

Page 24: Jean-Jacques Lévy December 3, 2010 Trento
Page 25: Jean-Jacques Lévy December 3, 2010 Trento
Page 26: Jean-Jacques Lévy December 3, 2010 Trento
Page 27: Jean-Jacques Lévy December 3, 2010 Trento
Page 28: Jean-Jacques Lévy December 3, 2010 Trento

ReActivityWendy Mackay, INRIA Saclay,J.-D. Fekete, INRIA Saclay,

Adaptive combinatorial Search Youssef Hamadi, MSRCMarc Schoenauer, INRIA-Saclay

– improve the usability of Combinatorial Search algorithms.– automate the fine tuning of solver parameters.– parallel solver: “disolver”

– logs of experiments for biologists, historians, other scientists

Page 29: Jean-Jacques Lévy December 3, 2010 Trento

Cloud computing action

• correlation between Neurospin MRI images and genomic data

– thousands of most precise images

– thousands of genomic variables

• with middleware of G. Antoniu– BlobSeer (a la Map-Reduce) for grid machines

• on top of Azure

Gabriel Antoniu (INRIA Rennes)

Bertrand Thirion (INRIA Saclay)

Page 30: Jean-Jacques Lévy December 3, 2010 Trento

Neuroimaging center at Saclay

Library and

conférence room

Clinical area (8 hospital bed, neuro

psy rooms, EEG / /MEG)

Pre-clinecal area (transgenic mice, primates,

operating bloc, labs)

17.65T/260mm

Future scanner

IRM 11.74T

IRM 7T

IRM 3T

logistic

Laboratories and

offices

Cloud computing action

Page 31: Jean-Jacques Lévy December 3, 2010 Trento

Image and Video mining

Computer vision and Machine learning for:

– archaeology and cultural heritage preservation: 3D object modeling and recognition from historical paintings and photographs

– environmental sciences: change detection in dynamic satellite imagery

– sociology: human activity modeling and recognition in video archives

Ivan Laptev, INRIA Rocq.Josef Sivic, INRIA Rocq.Rick Zelinsky, MSRR

Jean Ponce, ENS Andrew Blake, MSRCEtienne Mémin, INRIA RennesCordelia Schmid, INRIA Grenoble

Page 32: Jean-Jacques Lévy December 3, 2010 Trento

Image and Video mining– archaeology and cultural heritage preservation: 3D object

modeling and recognition from historical paintings and photographs

Page 33: Jean-Jacques Lévy December 3, 2010 Trento

Image and Video mining– sociology: human activity modeling and recognition in video

archives

Page 34: Jean-Jacques Lévy December 3, 2010 Trento

Conclusion

Page 35: Jean-Jacques Lévy December 3, 2010 Trento

Math. components Coq higher-order + reflection

Security PV/CV applied pi-calculus + stochastic

Spec. / Verif. TLA+ 1st order + ZF + temporal

Logics in track A

Page 36: Jean-Jacques Lévy December 3, 2010 Trento

DDMF computer algebra hard sciences

Adapt. search constraints, machine learning hard sciences, biology

Reactivity chi + visualisation soft sciences, biology

I.V. mining computer vision humanities, environment

Sciences in track B

Page 37: Jean-Jacques Lévy December 3, 2010 Trento