Iniciativa IMDEA
Resumen: Some weeks ago I found an interesting bug in Chrome and spent the weekend trying to come up with a clever exploit. In th...
Resumen: In this talk I will show you how to use standard playing cards in order to run cryptographic protocols in a visual and e...
Resumen: Software verification comes in two flavors: static and dynamic. Static program verification takes place during program a...
Resumen: For type checking of functional programming languages, it is fundamental to be able to check equality of types, or in ot...
Resumen: Attribute-based credentials are a privacy-enhancing technology that allow users to prove things about themselves in a pr...
Resumen: s(ASP) is a system which computes stable models of logic programs extended with negation (i.e., a logic program with no ...
Resumen: The Split State Model allows to obtain tamper and leakage resilience against a big class of attackers. In this model the...
Resumen: Attribute-based encryption (ABE) is a cryptographic primitive which supports fine-grained access control on encrypted da...
Resumen: Procedure specifications are useful in many software development tasks. As one example, in automatic test case generatio...
Resumen: Malware lineage studies the evolutionary relationships among malware and has important applications for malware analysis...
Resumen: Motivated by applications to security and high efficiency, we propose an automated methodology for validating on low-lev...
Resumen: Context-sensitive global analysis of large code bases can be expensive, which can be specially problematic in interactiv...
Resumen: Potentially unwanted programs (PUP) are a category of undesirable software which includes adware and rogueware. PUP is o...
Resumen: Proofs of computational effort were devised to control denial of service attacks. Dwork and Naor (CRYPTO ‘92), for...
Resumen: The Paxos algorithm of Lamport is a classic consensus protocol for state machine replication in environments that admit ...
Resumen: Untyped languages offer great flexibility in term creation and manipulation. To ensure correctness of data operations ex...
Resumen: We present a preliminary study to understand how apps evolve in their permission requests across different releases. We ...
Resumen: Relational program verification is a variant of program verification where one can reason about two programs and as a sp...
Resumen: Along with the conventional mathematic-driven approach of software security, 20 years of attacks harnessing the timing b...
Resumen: There exist two main formalisms to describe context-free languages: context-free grammars and pushdown automata. In fact...
Resumen: Arguments about correctness of a concurrent data structure are typically carried out by using the notion of linearizabil...
Resumen: A promising approach to defend against side channel attacks is to build programs that are leakage resilient, in a formal...
Resumen: In the last years we have witnessed a boom in the use of techniques and tools that provide anonymity. Such techniques an...
Resumen: Input validation is the first line of defense against malformed or malicious inputs. It is therefore critical that the v...
Resumen: The interest in reasoning over stream data is growing as quickly as the amount of data generated. Our intention is to ch...
Resumen: Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements m_1, … , m_t...