Software Seminar Series (S3)

Álvaro García Pérez

Tuesday, December 3, 2019

Álvaro García Pérez, Post-doctoral Researcher, IMDEA Software Institute

Deconstructing Stellar Consensus

Abstract: Some of the recent blockchain proposals, such as Stellar and Ripple, allow for open membership while using quorum-like s...


Niki Vazou

Tuesday, November 5, 2019

Niki Vazou, Assistant Research Professor, IMDEA Software Institute

Refinement Types 101

Abstract: In this talk I will briefly explain how refinement types can are used for program verification. Refinement types use the...


Fernando Macías

Tuesday, October 29, 2019

Fernando Macías, Post-doctoral Researcher, IMDEA Software Institute

Multilevel Modelling and Domain-Specific Languages

Abstract: Modern software engineering deals with demanding problems that yield large and complex software. The area of Model-Drive...


Anaïs Querol

Tuesday, October 22, 2019

Anaïs Querol, PhD Student, IMDEA Software Institute

STARKs in an eggshell

Abstract: The general idea of STARKs is to transform a claim on a certain computation to another claim on the low-degreeness of on...


Abstract: We consider the problem of proving in zero knowledge that an element of a public set satisfies a given property without ...


Luis Miguel Danielsson

Tuesday, September 24, 2019

Luis Miguel Danielsson, PhD Student, IMDEA Software Institute

Decentralized Stream Runtime Verification

Abstract: We study the problem of decentralized monitoring of stream runtime verification specifications. Decentralized monitoring...


Manuel Bravo

Tuesday, September 17, 2019

Manuel Bravo, Post-doctoral Researcher, IMDEA Software Institute

Reconfigurable Atomic Transaction Commit

Abstract: Modern data stores achieve scalability by partitioning data into shards and fault-tolerance by replicating each shard ac...


Maximiliano Klemen

Tuesday, July 16, 2019

Maximiliano Klemen, PhD Student, IMDEA Software Institute

Static Performance Guarantees for Programs with Run-time Checks

Abstract: Instrumenting programs for performing run-time checking of properties, such as regular shapes, is a common and useful te...


Avinash Sudhodanan

Tuesday, July 9, 2019

Avinash Sudhodanan, Post-doctoral Researcher, IMDEA Software Institute

Cross-Origin State Inference (COSI) Attacks: Your Browser is Leaking Your State

Abstract: In this talk, I will introduce you to Cross-Origin State Inference (COSI) attacks. In a COSI attack, an attacker convinc...


Abstract: Transient resources—resources with transient availability offered by cloud providers at a discounted price—present an op...


Panagiotis Bougoulias

Friday, June 14, 2019

Panagiotis Bougoulias, PhD Student, IMDEA Software Institute

Tail-call optimisation in lazy functional languages

Abstract: In this talk, I will present tail-call optimisation in a functional programming language in the presence of multiple eva...


Antonio Faonio

Tuesday, May 28, 2019

Antonio Faonio, Post-doctoral Researcher, IMDEA Software Institute

Rate-Optimizing Compilers for Continuously Non-Malleable Codes

Abstract: I’ll present a study of the rate for continuously non-malleable codes. Such codes allow to encode a message in a w...


Miguel Ambrona & Ignacio Fábregas

Tuesday, May 21, 2019

Miguel Ambrona & Ignacio Fábregas, Post-doctoral Researcher, IMDEA Software Institute

Quantum computers: invest wisely, invest in the future!

Abstract: Everyone has heard about quantum computers and that they will compromise the current Internet security. Quantum computer...


Pepe Vila

Thursday, May 16, 2019

Pepe Vila, PhD Student, IMDEA Software Institute

Theory and Practice of Finding Eviction Sets

Abstract: Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction sets: groups o...


Zsolt István

Tuesday, May 14, 2019

Zsolt István, Assistant Research Professor, IMDEA Software Institute

A Glass Half Full: Using Programmable Hardware Accelerators in Analytical Databases

Abstract: Even though there have been a large number of proposals to accelerate databases using specialized hardware, often the op...


Daniel Domínguez Álvarez

Tuesday, April 16, 2019

Daniel Domínguez Álvarez, PhD Student, IMDEA Software Institute

Fuzzing objects: Motivation and preliminary results

Abstract: Fuzzing has become a very interesting technique for finding bugs in computer programs. Since a few years back there is a...


Elena Gutiérrez Viedma

Monday, March 25, 2019

Elena Gutiérrez Viedma, PhD Student, IMDEA Software Institute

Undecidability and Context-Free Languages

Abstract: Starting from one of the most celebrated undecidable problem in CS, the Halting Problem, and using reductions as a bridg...


Ignacio Fábregas

Tuesday, March 5, 2019

Ignacio Fábregas, Post-doctoral Researcher, IMDEA Software Institute

Gauss' Theorema Egregium or: How I Learned to Stop Worrying and Love Pizza

Abstract: We all love eating pizza, but we don’t love so much using a fork and a knife for that. The problem is that the mom...


Pedro Valero

Tuesday, February 26, 2019

Pedro Valero, PhD Student, IMDEA Software Institute

Complete Abstractions for Checking Language Inclusion

Abstract: We study the language inclusion problem L1 ⊆ L2 where L1 is regular or context-free. Our approach relies on abstract int...


Marco Guarnieri

Tuesday, February 19, 2019

Marco Guarnieri, Post-doctoral Researcher, IMDEA Software Institute

Spectector: Principled detection of speculative information flows

Abstract: Since the advent of Spectre, a number of countermeasures have been proposed and deployed. Rigorously reasoning about the...


Abstract: Enterprises own a significant fraction of the hosts connected to the Internet and possess valuable assets, such as finan...


Miguel Ambrona

Thursday, February 7, 2019

Miguel Ambrona, PhD Student, IMDEA Software Institute

Zero-Knowledge Proofs

Abstract: Are you tired of having to reveal the solution to your sudoku in order to convince others that you have solved it? Are y...


Abstract: In this talk we’ll discuss the impact of CSS (or stylesheet) injection attacks on web security. For that, we&rsquo...