IMDEA initiative
Abstract: Many important system properties, particularly in security and privacy, cannot be verified statically. Therefore, runtim...
Abstract: This talk is concerned with the combination of monitoring techniques and reactive synthesis based on temporal logic (LTL...
Abstract: A significant proportion of classes in modern software introduce or use object protocols, prescriptions on the temporal ...
Abstract: The Kleene theorem establishes a fundamental link between automata and expressions over the free monoid. Numerous genera...
Abstract: Petri nets are a popular and well-studied formal model for the representation and verification of parallel processes. Th...
Abstract: The past ten years have seen an increasing presence of deep learning algorithms to perform a diverse set of tasks thanks...
Abstract: Software developers make pervasive use of third-party software supply chains to reduce costs and accelerate release cycl...
Abstract: The hardware security crisis brought on by recent speculative execution attacks has shown that it is crucial to adopt a ...
Abstract: Cramer, Damgård, and Schoenmakers (CDS) built a proof system to demonstrate the possession of subsets of witnesses for a...
Abstract: Computing platforms increasingly incorporate heterogeneous hardware technologies, as a way to scale application performa...
Abstract: Analyzing large and heterogeneous data is a recurrent problem for analysts and researchers. For example, a dataset of ne...
Abstract: Nowadays, attackers have large amount of resources (e.g., computational and space capabilities) that are used for malici...
Abstract: The blockchain offered a distributed way to provide security guarantees for financial transactions that avoid the single...
Abstract: The pervasiveness of cell phones, mobile applications and social media generates vast amounts of digital traces that can...
Abstract: When collecting information, local differential privacy (LDP) relieves users’ privacy concerns, as it adds noise t...
Abstract: The slowdown in transistor scaling and the end of Moore’s law indicate a need to invest in new computing paradigms...
Abstract: The multi-scale programmability of modern computer systems, including network fabrics and systems-on-chip, presents unpr...
Abstract: Data is eating the world. Systems for storing and processing data, such as Database Management Systems (DBMSs), are thus...
Abstract: Online services play a major role in our everyday life for communication, entertainment, socializing, e-commerce, etc. T...
Abstract: I will talk about two fairly different but representative lines of my work. The first line of work is about reachability...
Abstract: Efficient and effective fuzzing requires the availability of the input specification for the program under test. However...