IMDEA initiative
Abstract: The ongoing renaissance in artificial intelligence (AI) has led to the advent of data-driven machine learning (ML) metho...
Abstract: A counterfactual explanation refers to the problem of finding a minimum change to a given input instance that will resul...
Abstract: Unix / Linux shell scripting is ubiquitous, partly due to the simplicity in which it allows combining third-party compon...
Abstract: Low-level pointer-manipulating programs are hard to verify, requiring complex spatial program logics that support reason...
Abstract: In this talk we will demonstrate that not only vulnerabilities in exposed services can be dangerous, but also the issue ...
Abstract: We study abstraction correspondences between hybrid trajectory semantics for verification and refinement, including disc...
Abstract: Smart contracts running on blockchains have been hailed as trustless platforms for carrying out agreements between parti...
Abstract: Spectre vulnerabilities violate our fundamental assumptions about programming abstractions, allowing attackers to steal ...
Abstract: Machine learning is a popular tool for building state of the art software systems. It is more and more used also in safe...
Abstract: In this talk I will present some initial ideas (a first proposal) on how to define a framework to define missions for au...
Abstract: Dataflow languages have, as well as functional languages, immutable semantics, which is often implemented by copying val...
Abstract: In this talk I will present a paper published at TCC'21 together with Gianluca Brian and Daniele Venturi from Sapienza U...
Abstract: Microarchitectural attacks are side/covert channel attacks which enable leakage/communication as a direct result of hard...
Abstract: Secure messaging applications are used by billions of users every day. Applications like WhatsApp make use of the semina...
Abstract: In this talk I will touch on two results I achieved during my PhD and Postdoc in the area of logics for algorithmic veri...
Abstract: Serverless has emerged as the next dominant cloud architecture and paradigm due to its scalability and a flexible billin...
Abstract: The Cardano blockchain underlies one of the world’s top-ten cryptocurrencies, and supports smart contracts written...
Abstract: Despite significant efforts on cybersecurity, we are observing an increasing number of attacks in recent years. The reas...
Abstract: Multithreaded concurrency is an extremely challenging programming setting, with bugs manifesting themselves in resource ...
Abstract: Digital technology creates risks to people’s privacy in ways that did not exist before. I design end-to-end privat...
Abstract: We study the generalization properties of the popular stochastic optimization method known as stochastic gradient descen...
Abstract: Standard hybrid encryption schemes based on the KEM-DEM framework are hard to implement efficiently in a distributed man...
Abstract: Consider a distributed protocol whose n processes ensure some (distributed) safety and liveness properties, communicatin...
Abstract: We revisit the problem of designing light-client blockchain protocols from the perspective of classical proof-system the...