Iniciativa IMDEA
Resumen: Some of the recent blockchain proposals, such as Stellar and Ripple, allow for open membership while using quorum-like s...
Resumen: In this talk I will briefly explain how refinement types can are used for program verification. Refinement types use the...
Resumen: Modern software engineering deals with demanding problems that yield large and complex software. The area of Model-Drive...
Resumen: The general idea of STARKs is to transform a claim on a certain computation to another claim on the low-degreeness of on...
Resumen: We consider the problem of proving in zero knowledge that an element of a public set satisfies a given property without ...
Resumen: We study the problem of decentralized monitoring of stream runtime verification specifications. Decentralized monitoring...
Resumen: Modern data stores achieve scalability by partitioning data into shards and fault-tolerance by replicating each shard ac...
Resumen: Instrumenting programs for performing run-time checking of properties, such as regular shapes, is a common and useful te...
Resumen: In this talk, I will introduce you to Cross-Origin State Inference (COSI) attacks. In a COSI attack, an attacker convinc...
Resumen: Transient resources—resources with transient availability offered by cloud providers at a discounted price—present an op...
Resumen: In this talk, I will present tail-call optimisation in a functional programming language in the presence of multiple eva...
Resumen: I’ll present a study of the rate for continuously non-malleable codes. Such codes allow to encode a message in a w...
Resumen: Everyone has heard about quantum computers and that they will compromise the current Internet security. Quantum computer...
Resumen: Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction sets: groups o...
Resumen: Even though there have been a large number of proposals to accelerate databases using specialized hardware, often the op...
Resumen: Fuzzing has become a very interesting technique for finding bugs in computer programs. Since a few years back there is a...
Resumen: Starting from one of the most celebrated undecidable problem in CS, the Halting Problem, and using reductions as a bridg...
Resumen: We all love eating pizza, but we don’t love so much using a fork and a knife for that. The problem is that the mom...
Resumen: We study the language inclusion problem L1 ⊆ L2 where L1 is regular or context-free. Our approach relies on abstract int...
Resumen: Since the advent of Spectre, a number of countermeasures have been proposed and deployed. Rigorously reasoning about the...
Resumen: Enterprises own a significant fraction of the hosts connected to the Internet and possess valuable assets, such as finan...
Resumen: Are you tired of having to reveal the solution to your sudoku in order to convince others that you have solved it? Are y...
Resumen: In this talk we'll discuss the impact of CSS (or stylesheet) injection attacks on web security