Iniciativa IMDEA
Resumen: The ongoing renaissance in artificial intelligence (AI) has led to the advent of data-driven machine learning (ML) metho...
Resumen: A counterfactual explanation refers to the problem of finding a minimum change to a given input instance that will resul...
Resumen: Unix / Linux shell scripting is ubiquitous, partly due to the simplicity in which it allows combining third-party compon...
Resumen: Low-level pointer-manipulating programs are hard to verify, requiring complex spatial program logics that support reason...
Resumen: In this talk we will demonstrate that not only vulnerabilities in exposed services can be dangerous, but also the issue ...
Resumen: We study abstraction correspondences between hybrid trajectory semantics for verification and refinement, including disc...
Resumen: Smart contracts running on blockchains have been hailed as trustless platforms for carrying out agreements between parti...
Resumen: Spectre vulnerabilities violate our fundamental assumptions about programming abstractions, allowing attackers to steal ...
Resumen: Machine learning is a popular tool for building state of the art software systems. It is more and more used also in safe...
Resumen: In this talk I will present some initial ideas (a first proposal) on how to define a framework to define missions for au...
Resumen: Dataflow languages have, as well as functional languages, immutable semantics, which is often implemented by copying val...
Resumen: In this talk I will present a paper published at TCC'21 together with Gianluca Brian and Daniele Venturi from Sapienza U...
Resumen: Microarchitectural attacks are side/covert channel attacks which enable leakage/communication as a direct result of hard...
Resumen: Secure messaging applications are used by billions of users every day. Applications like WhatsApp make use of the semina...
Resumen: In this talk I will touch on two results I achieved during my PhD and Postdoc in the area of logics for algorithmic veri...
Resumen: Serverless has emerged as the next dominant cloud architecture and paradigm due to its scalability and a flexible billin...
Resumen: The Cardano blockchain underlies one of the world’s top-ten cryptocurrencies, and supports smart contracts written...
Resumen: Despite significant efforts on cybersecurity, we are observing an increasing number of attacks in recent years. The reas...
Resumen: Multithreaded concurrency is an extremely challenging programming setting, with bugs manifesting themselves in resource ...
Resumen: Digital technology creates risks to people’s privacy in ways that did not exist before. I design end-to-end privat...
Resumen: We study the generalization properties of the popular stochastic optimization method known as stochastic gradient descen...
Resumen: Standard hybrid encryption schemes based on the KEM-DEM framework are hard to implement efficiently in a distributed man...
Resumen: Consider a distributed protocol whose n processes ensure some (distributed) safety and liveness properties, communicatin...
Resumen: We revisit the problem of designing light-client blockchain protocols from the perspective of classical proof-system the...