IMDEA initiative
Abstract: Optimising programs is hard. Not only one must preserve semantics, but also one needs to ensure that an optimisation rea...
Abstract: Vector commitments with subvector openings (SVC) [Lai-Malavolta, Boneh-Bunz-Fisch; CRYPTO’19] allow one to open a commit...
Abstract: Transport Layer Security (TLS) is utilized by several applications to secure network communication through encryption. M...
Abstract: We introduce REST, a rewrite technique for SMT-based verifiers that supports user-defined terminating functions. Our tec...
Abstract: Permissioned blockchains can offer a mechanism for transacting across several, not necessarily trusting, entities but th...
Abstract: Getting the deterministic finite-state automaton with the least possible number of states is an essential question in ma...
Abstract: To obtain scalability, software model checkers often employ modular analysis techniques that analyze each of the procedu...
Abstract: This talk will be a rehearsal of my Network and Distributed System Security Symposium (NDSS) 2020 paper presentation. I ...
Abstract: This talk is a combination of what I have learned about grammar-based compression while developing our tool -zearch- for...
Abstract: We show how to infer deterministic cache replacement policies using off-the-shelf automata learning and program synthesi...