IMDEA initiative
Abstract: Based on a condensed version of the RuleML 2018’s tutorial, the talk will recap the relationship between logic and...
Abstract: Concurrent separation logics have had great success reasoning about concurrent data structures. This success stems from ...
Abstract: On August 2nd, 2016 “Tom Elvis Jedusor” posted an .onion link to a text file on IRC, titled MIMBLEWIMBLE and dated July ...
Abstract: Code-reuse is a double-edged sword. The ease in development often comes at the (hidden) cost of bugs or even security an...
Abstract: When software is deployed, there is always a conflict between deploying what "seems to work", and what "I would ideally like to deploy"
Abstract: Alternating automata have been widely used to model and verify systems that handle data from finite domains, such as com...
Abstract: We present Arbitrum, a cryptocurrency system that supports smart contracts without the limitations of scalability and pr...
Abstract: The use of TLS is rapidly spreading among malware families, since it makes possible for them to evade most used content-...
Abstract: In this talk I will present some results concerning the runtime monitoring of safety hyperproperties for deterministic p...
Abstract: Developers typically rely on log data to reason about the runtime behavior of distributed systems. Unfortunately, the in...
Abstract: Finite-precision representation and approximation of continuous and infinite real numbers causes unavoidable rounding to...
Abstract: Almost eight years ago we started working on JSFlow - an information flow aware interpreter for JavaScript written in Ja...
Abstract: In spite of being central to everything that is going on in IT security, the concept of “exploit” is surpris...
Abstract: Indexed Grammars (IG) are a formalism which generate Indexed Languages (IL) and can be recognized by nested stack automa...
Abstract: Zero-knowledge proofs allow a prover to convince a verifier of the validity of a statement without revealing anything el...
Abstract: In this talk, we present the design and implementation of a tool to construct faithful models of the latency, throughput...
Abstract: Automated verification has become an essential part in the security evaluation of cryptographic protocols. Recently, the...
Abstract: Developing software products and maintaining software versions for adding or modifying functionality and quality to soft...
Abstract: Secure multi-party computation (MPC) protocols allow a group of n parties to compute some function on the parties’...
Abstract: In this presentation we analyze the (in)famous microarchitectureal side-channel attacks known as Spectre and Meltdown. W...
Abstract: Optics provide rich abstractions and composition patterns to access and manipulate immutable data structures. However, t...
Abstract: Formal verification has been gaining the attention and resources of both the academic and the industrial world since it ...
Abstract: In this talk I will try give a flavour of my line of research by surveying some of my works. It will touch upon topics s...
Abstract: Several major classes of security analysis have to be performed on raw executable files, such as vulnerability analysis ...
Abstract: Succint Non-Interactive Arguments of Knowledge, or SNARKS, have received a lot of attention recently because of their ap...
Abstract: In a cyber-physical system digital computations (e.g., a hardware component or a program) interact with the physical env...
Abstract: Today’s Collaborative Economy has three challenges: It relies on centralized hubs, that in order to monetize use t...
Abstract: Mobile devices are now the most common way users handle digital information and interact with online services. Different...
Abstract: Databases often store and manage sensitive data. Regulating the access to databases is, therefore, essential. To this en...
Abstract: The success of software engineering projects is in a large part dependent on social and organization aspects of the deve...
Abstract: In the era of Big Data, datacenter and cloud architectures decouple compute and storage resources from each other for be...
Abstract: Conventional unsupervised data analytics techniques have largely focused on processing datasets of single-type data, e.g...
Abstract: In this talk we will present the adaptive cuckoo filter (ACF), a data structure for approximate set membership that exte...
Abstract: The problem of ensuring consistency in applications that manage replicated data is one of the main challenges of distrib...
Abstract: Deep neural nets have become in recent years a widespread practical technology, with impressive performance in computer ...