Iniciativa IMDEA
Resumen: Predicate encodings are information-theoretic primitives that can be transformed generically into predicate encryption s...
Resumen: Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it is rapidly g...
Resumen: Modern computer architectures share physical resources between different programs in order to increase area-, energy-, a...
Resumen: Bridges are onion routers in the Tor Network whose IP addresses are not public. So far, no global security analysis of T...
Resumen: Linearizability is the commonly accepted notion of correctness for concurrent data structures. It requires that any exec...
Resumen: Modern constraint programming solvers incorporate SAT-style learning, where the decisions that lead to a failure are rec...
Resumen: In this talk, Bogdan will discuss his experience as an intern at Google. The first part of the talk is going to be about...
Resumen: Successful Horn clause derivations are finite trees and this leads to a straightforward correspondence between a set of ...
Resumen: Labeling a malicious executable as a variant of a known family is important for security applications such as triage, li...
Resumen: Potentially unwanted programs (PUP) such as adware and rogueware, while not outright malicious, exhibit intrusive behavi...
Resumen: We explore the effectiveness of abstract interpretation in detecting parts of program specifications that can be simplif...
Resumen: Programmers currently enjoy access to a very high number of code repositories and libraries of ever increasing size. The...
Resumen: The talk will be an overview of the state of the art in Attribute-Based Encryption. Attribute-based encryption (ABE) is ...
Resumen: What’s solvability? For some terms of the pure lambda calculus reduction does not terminate. But these non-termina...
Resumen: Arguments about linearizability of a concurrent data structure are typically carried out by specifying the linearization...
Resumen: Modern distributed systems often rely on databases that achieve scalability by providing only weak guarantees about the ...
Resumen: The security of cryptographic libraries relies on both the security of the underlying cryptographic primitives and their...
Resumen: In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize th...
Resumen: To boost performance, modern transactional systems provide weaker consistency guarantees than those defined by serialisa...
Resumen: I’ll report on a case study in secure programming, focusing on the design, implementation and auditing of programs...