Software Seminar Series (S3)
Thursday, December 19, 2013
Antonio Nappa, PhD Student, IMDEA Software InstituteCyberProbe: Towards Internet-Scale Active Detection of Malicious Servers
Abstract: Cybercriminals use different types of geographically distributed servers to run their operations such as C&C servers...
Tuesday, December 10, 2013
Michael Emmi, Researcher, IMDEA Software InstituteVerification of Observational Refinement by Counting
Abstract: Observational refinement between software library implementations is key to modular reasoning: knowing that any program ...
Tuesday, December 3, 2013
Dario Fiore, Assistant Research Professor, IMDEA Software InstituteVerifiable Delegation of Computation on Outsourced Data
Abstract: We address the problem in which a client stores a large amount of data with an untrusted server in such a way that, at a...
Tuesday, November 26, 2013
Goran Doychev, PhD Student, IMDEA Software InstituteResolving Security Trade-Offs: Side-Channel Leakage vs. Cost
Abstract: Side-channels can often be easily eliminated, however rarely are, as the cost for this is considerable. In practice, use...
Tuesday, November 19, 2013
Federico Olmedo, PhD Student, IMDEA Software InstituteApproximate Relational Reasoning for Probabilistic Programs
Abstract: The “verified security” methodology is an emerging approach to build high assurance proofs about security pr...
Tuesday, November 12, 2013
Ilya Sergey, Post-doctoral Researcher, IMDEA Software InstituteModular, Higher-Order Cardinality Analysis in Theory and Practice
Abstract: Since the mid ’80s, compiler writers for functional languages (especially lazy ones) have been writing papers abou...
Tuesday, November 5, 2013
Miriam Garcia, PhD Student, IMDEA Software InstituteQuantitative Predicate Abstraction for Stability Analysis of Hybrid Systems
Abstract: It will be presented a general framework for a quantitative predicate abstraction for stability analysis of hybrid syste...
Tuesday, October 29, 2013
Benedikt Schmidt, Post-doctoral Researcher, IMDEA Software InstituteFully Automated Analysis of Padding-Based Encryption in the Computational Model
Abstract: Computer-aided verification provides effective means of analyzing the security of cryptographic primitives. However, it ...
Tuesday, October 22, 2013
Francois Dupressoir, Post-doctoral Researcher, IMDEA Software InstituteEfficient provably secure machine code from high-level implementations
Abstract: We present a computer-aided framework for proving concrete security bounds for cryptographic machine code implementation...
Tuesday, October 8, 2013
Francesco Alberti, PhD Student, Università della Svizzera Italiana, Lugano, SwitzerlandTackling divergence: abstraction and acceleration in array programs
Abstract: Abstraction (in its various forms) is a powerful established technique in model-checking; still, when unbounded data-str...
Tuesday, October 1, 2013
Umer Liqat, PhD Student, IMDEA Software InstituteEnergy Consumption Analysis of Programs based on XMOS ISA-Level Models
Abstract: Energy consumption analysis of embedded programs requires the analysis of low-level program representations. This is cha...
Tuesday, September 24, 2013
Boris Köpf, Assistant Research Professor, IMDEA Software InstituteStatic Analysis of Cache Side Channels
Abstract: Side-channel attacks recover secret inputs to programs from physical characteristics of computations, such as execution ...
Tuesday, June 18, 2013
Alvaro Garcia, PhD Student, IMDEA Software InstituteInterderiving Semantic Artefacts for the Gradually-Typed Lambda Calculus
Abstract: Gradual typing aims at combining static and dynamic type checking by introducing a dynamic type and cast expressions. Th...
Tuesday, June 11, 2013
Miriam García, PhD Student, IMDEA Software InstituteAbstraction based Model Checking of Stability of Hybrid Systems
Abstract: This talk will introduce a novel abstraction technique and a model checking algorithm for analysing stability of a parti...
Tuesday, June 4, 2013
Juan Manuel Crespo, PhD Student, IMDEA Software InstituteA gentle introduction to Easycrypt
Abstract: EasyCrypt is a toolset for reasoning about relational properties of probabilistic computations with adversarial code. It...
Tuesday, May 14, 2013
Dragan Ivanović, Post-doctoral Researcher, IMDEA Software InstituteConstraint (Handling) Rules in Java Spirit and Form
Abstract: Constraint and logic programming languages offer programmers powerful, declarative ways to go about solving complex comp...
Tuesday, May 7, 2013
Germán Delbianco, PhD Student, IMDEA Software InstituteHoare-Style Reasoning with (Algebraic) Continuations
Abstract: Continuations are programming abstractions that allow for manipulating the “future” of a computation. Amongs...
Tuesday, April 30, 2013
Anindya Banerjee, Research Professor, IMDEA Software InstituteReasoning about Representation Independence
Abstract: When the representation of a data structure changes we would expect that the behaviour of clients using the data structu...
Wednesday, April 24, 2013
Murdoch Gabbay, Researcher, Heriot-Watt University, United KingdomAn informal survey of nominal techniques
Abstract: By my understanding, IMDEA works a lot on verification and checking. Iwill sketchnominal techniques and recent activity ...
Tuesday, April 23, 2013
Murdoch Gabbay, Researcher, Heriot-Watt University, United KingdomDenotation of Contextual Modal Type Theory
Abstract: Nanevski in his PhD thesis introduced and studied Contextual Modal Theory Theory. This is a lambda-calculus based via th...
Tuesday, April 16, 2013
Zhoulai Fu, PhD Student, INRIAPicking up your targets — aggressive strong update of static numerical analysis in the presence of pointers
Abstract: Strong update — the assignments overwrite the contents of the target property, is essential for precise static analysis ...
Wednesday, April 10, 2013
Alejandro Serrano, PhD Student, IMDEA Software InstituteResource Consumption and Size Analysis
Abstract: Resource analysis aims to derive tight bounds on the usage of some numerical property. It is instrumental in a wide rang...
Tuesday, April 2, 2013
Pavithra Prabhakar, Assistant Research Professor, IMDEA Software InstituteTowards Scalable Verification of Stability of Hybrid Systems
Abstract: Hybrid systems refer to systems exhibiting mixed discrete-continuous behaviors and arise as a natural byproduct of the i...
Tuesday, March 26, 2013
Shiva Shabaninejad, Research Intern, IMDEA Software InstituteValuation: Developer Support for By-Reference to By-Value Type Conversion
Abstract: Modern object oriented languages like C# and JAVA enable developers to build complex application in less time. These lan...
Abstract: In many software projects quality assurance relies largely on testing. Often, this activity is performed in a crafty way...
Tuesday, March 12, 2013
Ilya Sergey, Post-doctoral Researcher, IMDEA Software InstituteTheory and Practice of Control-Flow Analysis of Higher Order Languages by Systematic Abstraction of Abstract Machines
Abstract: In this informal two-part talk I will present recent studies on systematic construction of control-flow analyses for hig...
Tuesday, March 5, 2013
Zhoulai Fu, PhD Student, INRIALifting Numerical Abstract Domains to Heap-manipulating Programs
Abstract: In 1978, Cousot and Halbwachs showed how to determine at compile-time linear relations among program variables. Various ...
Tuesday, February 26, 2013
Cesar Sanchez, Assistant Research Professor, IMDEA Software InstituteVisibly Regular Expressions
Abstract: Regular Expressions (RE) are an algebraic formalism for expressing regular languages, widely used in string search and a...
Tuesday, February 19, 2013
Alejandro Sanchez, PhD Student, IMDEA Software InstituteAssisted Verification of Invariance for Parametrized Systems
Abstract: We study the verification of safety properties over symmetric parametrized systems. These systems consist on an arbitrar...
Tuesday, February 12, 2013
Alexey Gotsman, Assistant Research Professor, IMDEA Software InstituteUnderstanding Eventual Consistency
Abstract: Modern geo-replicated databases underlying large-scale Internet services guarantee immediate availability and tolerate n...