IMDEA initiative
Abstract: Predicate encodings are information-theoretic primitives that can be transformed generically into predicate encryption s...
Abstract: Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it is rapidly g...
Abstract: Modern computer architectures share physical resources between different programs in order to increase area-, energy-, a...
Abstract: Bridges are onion routers in the Tor Network whose IP addresses are not public. So far, no global security analysis of T...
Abstract: Linearizability is the commonly accepted notion of correctness for concurrent data structures. It requires that any exec...
Abstract: Modern constraint programming solvers incorporate SAT-style learning, where the decisions that lead to a failure are rec...
Abstract: In this talk, Bogdan will discuss his experience as an intern at Google. The first part of the talk is going to be about...
Abstract: Successful Horn clause derivations are finite trees and this leads to a straightforward correspondence between a set of ...
Abstract: Labeling a malicious executable as a variant of a known family is important for security applications such as triage, li...
Abstract: Potentially unwanted programs (PUP) such as adware and rogueware, while not outright malicious, exhibit intrusive behavi...
Abstract: We explore the effectiveness of abstract interpretation in detecting parts of program specifications that can be simplif...
Abstract: Programmers currently enjoy access to a very high number of code repositories and libraries of ever increasing size. The...
Abstract: The talk will be an overview of the state of the art in Attribute-Based Encryption. Attribute-based encryption (ABE) is ...
Abstract: What’s solvability? For some terms of the pure lambda calculus reduction does not terminate. But these non-termina...
Abstract: Arguments about linearizability of a concurrent data structure are typically carried out by specifying the linearization...
Abstract: Modern distributed systems often rely on databases that achieve scalability by providing only weak guarantees about the ...
Abstract: The security of cryptographic libraries relies on both the security of the underlying cryptographic primitives and their...
Abstract: In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize th...
Abstract: To boost performance, modern transactional systems provide weaker consistency guarantees than those defined by serialisa...
Abstract: I’ll report on a case study in secure programming, focusing on the design, implementation and auditing of programs...