IMDEA initiative
Abstract: In this talk, we address the problem of the (reactive) realizability of specifications of theories richer than Booleans,...
Abstract: A key aspect of the adoption of blockchain technologies is their performance. Consequently, many techniques to improve t...
Abstract: Abstract interpretation provides an over-approximation of program behaviours that is used to prove the absence of bugs. ...
Abstract: Leakage contracts have recently been proposed as a new security abstraction at the Instruction Set Architecture (ISA) le...
Abstract: We study implementations of basic fault-tolerant primitives, such as consensus and registers, in message-passing systems...
Abstract: In this talk I will present two algorithms to decide the language inclusion problem between Büchi automata. Our approach...
Abstract: Microarchitectural attacks, such as Spectre and Meltdown, illustrate that artifacts of hardware implementations (like sp...
Abstract: Vector Commitments allow one to (concisely) commit to a vector of messages so that one can later (concisely) open the co...
Abstract: Cryptographic accumulators are a common solution to proving information about a large set . They allow to compute a shor...
Abstract: Programs that deal with heap-allocated inputs are difficult to analyze with symbolic execution (SE). Lazy Initialization...