IMDEA initiative
Abstract: Internet-wide scanning techniques and services, like Zmap, Shodan, NMap, Masscan, etc. are heavily used for malicious ac...
Abstract: Although randomized algorithms have widely been used in distributed computing as a means to tackle impossibility results...
Abstract: The current consensus within the security industry is that high-assurance systems cannot tolerate the presence of compro...
Abstract: In this talk we present a number of techniques that allow for formal reasoning with nested and mutually inductive struct...
Abstract: Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditio...
Abstract: Although reliable distributed and cloud storage systems have attracted significant attention over the past decade, until...
Abstract: Signal Flow Graphs (SFGs) were introduced in the 1940s by Shannon as a formal circuit model of a class of simple analog ...
Abstract: Cloud computing is perceived as the “holy grail” to cope with the handling of tremendous amounts of data col...
Abstract: Dr. William Suski from the US Navy’s Office of Naval Research Global (ONRG) will be presenting a description of hi...
Abstract: The semantics of concurrent data structures is usually given by a sequential specification and a consistency condition. ...
Abstract: In the standard browser programming model, third-party scripts included in an application execute with the same privileg...
Abstract: The goal of unbounded program verification is to discover an inductive invariant that over-approximates all reachable pr...
Abstract: The Watson Libraries for Analysis (WALA) started life as analysis for Java bytecode, but soon grew to include JavaScript...
Abstract: Blockchain technology has become of great interest for major multinationals, creating a need to close the gap between th...
Abstract: Distributed systems play a crucial role in modern infrastructure, but are notoriously difficult to implement correctly. ...
Abstract: We present a modular framework for the design of efficient adaptively secure attribute-based encryption (ABE) schemes fo...
Abstract: In this talk I will present my research in developing local reasoning techniques in both concurrent and sequential setti...
Abstract: Website fingerprinting attacks aim to uncover which webpage a user is visiting by monitoring the incoming and outgoing p...
Abstract: The maturation of the Web platform has given rise to sophisticated and demanding Web applications such as interactive 3D...
Abstract: So far, formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on th...
Abstract: Research activities in design, often end up in complex software development tasks. Security related with User eXperience...
Abstract: In his talk, Daniel will go over the motivations that lead to this research, the protocol he has been following to measu...
Abstract: In the setting of the modal logic that characterizes modal refinement over modal transition systems, Boudol and Larsen s...
Abstract: Starting from a research paper of 2001, we show how OpenPGP encryption of emails is fundamentally broken. We show how an...
Abstract: We consider the following basic task in the testing of concurrent systems. The input to the task is a partial order of e...
Abstract: Probabilistic programming refers to the idea of using standard programming constructs for specifying probabilistic model...
Abstract: CPU caches introduce variations into the execution time of programs that can be exploited by adversaries to recover priv...
Abstract: Searching for the most similar images to a query image in a large database is a high-dimensional nearest-neighbour probl...