Iniciativa IMDEA
Resumen: Based on a condensed version of the RuleML 2018’s tutorial, the talk will recap the relationship between logic and...
Resumen: Concurrent separation logics have had great success reasoning about concurrent data structures. This success stems from ...
Resumen: On August 2nd, 2016 “Tom Elvis Jedusor” posted an .onion link to a text file on IRC, titled MIMBLEWIMBLE and dated July ...
Resumen: Code-reuse is a double-edged sword. The ease in development often comes at the (hidden) cost of bugs or even security an...
Resumen: When software is deployed, there is always a conflict between deploying what "seems to work", and what "I would ideally like to deploy"
Resumen: Alternating automata have been widely used to model and verify systems that handle data from finite domains, such as com...
Resumen: We present Arbitrum, a cryptocurrency system that supports smart contracts without the limitations of scalability and pr...
Resumen: The use of TLS is rapidly spreading among malware families, since it makes possible for them to evade most used content-...
Resumen: In this talk I will present some results concerning the runtime monitoring of safety hyperproperties for deterministic p...
Resumen: Developers typically rely on log data to reason about the runtime behavior of distributed systems. Unfortunately, the in...
Resumen: Finite-precision representation and approximation of continuous and infinite real numbers causes unavoidable rounding to...
Resumen: Almost eight years ago we started working on JSFlow - an information flow aware interpreter for JavaScript written in Ja...
Resumen: In spite of being central to everything that is going on in IT security, the concept of “exploit” is surpris...
Resumen: Indexed Grammars (IG) are a formalism which generate Indexed Languages (IL) and can be recognized by nested stack automa...
Resumen: Zero-knowledge proofs allow a prover to convince a verifier of the validity of a statement without revealing anything el...
Resumen: In this talk, we present the design and implementation of a tool to construct faithful models of the latency, throughput...
Resumen: Automated verification has become an essential part in the security evaluation of cryptographic protocols. Recently, the...
Resumen: Developing software products and maintaining software versions for adding or modifying functionality and quality to soft...
Resumen: Secure multi-party computation (MPC) protocols allow a group of n parties to compute some function on the parties’...
Resumen: In this presentation we analyze the (in)famous microarchitectureal side-channel attacks known as Spectre and Meltdown. W...
Resumen: Optics provide rich abstractions and composition patterns to access and manipulate immutable data structures. However, t...
Resumen: Formal verification has been gaining the attention and resources of both the academic and the industrial world since it ...
Resumen: In this talk I will try give a flavour of my line of research by surveying some of my works. It will touch upon topics s...
Resumen: Several major classes of security analysis have to be performed on raw executable files, such as vulnerability analysis ...
Resumen: Succint Non-Interactive Arguments of Knowledge, or SNARKS, have received a lot of attention recently because of their ap...
Resumen: In a cyber-physical system digital computations (e.g., a hardware component or a program) interact with the physical env...
Resumen: Today’s Collaborative Economy has three challenges: It relies on centralized hubs, that in order to monetize use t...
Resumen: Mobile devices are now the most common way users handle digital information and interact with online services. Different...
Resumen: Databases often store and manage sensitive data. Regulating the access to databases is, therefore, essential. To this en...
Resumen: The success of software engineering projects is in a large part dependent on social and organization aspects of the deve...
Resumen: In the era of Big Data, datacenter and cloud architectures decouple compute and storage resources from each other for be...
Resumen: Conventional unsupervised data analytics techniques have largely focused on processing datasets of single-type data, e.g...
Resumen: In this talk we will present the adaptive cuckoo filter (ACF), a data structure for approximate set membership that exte...
Resumen: The problem of ensuring consistency in applications that manage replicated data is one of the main challenges of distrib...
Resumen: Deep neural nets have become in recent years a widespread practical technology, with impressive performance in computer ...