Iniciativa IMDEA
Resumen: Internet-wide scanning techniques and services, like Zmap, Shodan, NMap, Masscan, etc. are heavily used for malicious ac...
Resumen: Although randomized algorithms have widely been used in distributed computing as a means to tackle impossibility results...
Resumen: The current consensus within the security industry is that high-assurance systems cannot tolerate the presence of compro...
Resumen: In this talk we present a number of techniques that allow for formal reasoning with nested and mutually inductive struct...
Resumen: Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditio...
Resumen: Although reliable distributed and cloud storage systems have attracted significant attention over the past decade, until...
Resumen: Signal Flow Graphs (SFGs) were introduced in the 1940s by Shannon as a formal circuit model of a class of simple analog ...
Resumen: Cloud computing is perceived as the “holy grail” to cope with the handling of tremendous amounts of data col...
Resumen: Dr. William Suski from the US Navy’s Office of Naval Research Global (ONRG) will be presenting a description of hi...
Resumen: The semantics of concurrent data structures is usually given by a sequential specification and a consistency condition. ...
Resumen: In the standard browser programming model, third-party scripts included in an application execute with the same privileg...
Resumen: The goal of unbounded program verification is to discover an inductive invariant that over-approximates all reachable pr...
Resumen: The Watson Libraries for Analysis (WALA) started life as analysis for Java bytecode, but soon grew to include JavaScript...
Resumen: Blockchain technology has become of great interest for major multinationals, creating a need to close the gap between th...
Resumen: Distributed systems play a crucial role in modern infrastructure, but are notoriously difficult to implement correctly. ...
Resumen: We present a modular framework for the design of efficient adaptively secure attribute-based encryption (ABE) schemes fo...
Resumen: In this talk I will present my research in developing local reasoning techniques in both concurrent and sequential setti...
Resumen: Website fingerprinting attacks aim to uncover which webpage a user is visiting by monitoring the incoming and outgoing p...
Resumen: The maturation of the Web platform has given rise to sophisticated and demanding Web applications such as interactive 3D...
Resumen: So far, formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on th...
Resumen: Research activities in design, often end up in complex software development tasks. Security related with User eXperience...
Resumen: In his talk, Daniel will go over the motivations that lead to this research, the protocol he has been following to measu...
Resumen: In the setting of the modal logic that characterizes modal refinement over modal transition systems, Boudol and Larsen s...
Resumen: Starting from a research paper of 2001, we show how OpenPGP encryption of emails is fundamentally broken. We show how an...
Resumen: We consider the following basic task in the testing of concurrent systems. The input to the task is a partial order of e...
Resumen: Probabilistic programming refers to the idea of using standard programming constructs for specifying probabilistic model...
Resumen: CPU caches introduce variations into the execution time of programs that can be exploited by adversaries to recover priv...
Resumen: Searching for the most similar images to a query image in a large database is a high-dimensional nearest-neighbour probl...