Iniciativa IMDEA
Resumen: Optimising programs is hard. Not only one must preserve semantics, but also one needs to ensure that an optimisation rea...
Resumen: Vector commitments with subvector openings (SVC) [Lai-Malavolta, Boneh-Bunz-Fisch; CRYPTO’19] allow one to open a commit...
Resumen: Transport Layer Security (TLS) is utilized by several applications to secure network communication through encryption. M...
Resumen: We introduce REST, a rewrite technique for SMT-based verifiers that supports user-defined terminating functions. Our tec...
Resumen: Permissioned blockchains can offer a mechanism for transacting across several, not necessarily trusting, entities but th...
Resumen: Getting the deterministic finite-state automaton with the least possible number of states is an essential question in ma...
Resumen: To obtain scalability, software model checkers often employ modular analysis techniques that analyze each of the procedu...
Resumen: This talk will be a rehearsal of my Network and Distributed System Security Symposium (NDSS) 2020 paper presentation. I ...
Resumen: This talk is a combination of what I have learned about grammar-based compression while developing our tool -zearch- for...
Resumen: We show how to infer deterministic cache replacement policies using off-the-shelf automata learning and program synthesi...