Software Seminar Series (S3)
Tuesday, December 13, 2016
Miguel Ambrona, PhD Student, IMDEA Software InstituteGeneric Transformations of Predicate Encodings: Constructions and Applications
Abstract: Predicate encodings are information-theoretic primitives that can be transformed generically into predicate encryption s...
Tuesday, November 22, 2016
Pepe Vila, PhD Student, IMDEA Software InstituteLoophole: Timing Attacks on Shared Event Loops in Chrome
Abstract: Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it is rapidly g...
Tuesday, November 15, 2016
Pablo Cañones, PhD Student, IMDEA Software InstituteTo Share or Not to Share: Security Analysis of Cache Replacement Policies
Abstract: Modern computer architectures share physical resources between different programs in order to increase area-, energy-, a...
Tuesday, November 8, 2016
Srdjan Matic, PhD Student, IMDEA Software InstituteDissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
Abstract: Bridges are onion routers in the Tor Network whose IP addresses are not public. So far, no global security analysis of T...
Thursday, November 3, 2016
Artem Khyzha, PhD Student, IMDEA Software InstituteProving linearizability using partial orders
Abstract: Linearizability is the commonly accepted notion of correctness for concurrent data structures. It requires that any exec...
Tuesday, October 25, 2016
Maria Garcia De La Banda, Visiting Faculty Professor, IMDEA Software InstituteLearning from learning solvers
Abstract: Modern constraint programming solvers incorporate SAT-style learning, where the decisions that lead to a failure are rec...
Tuesday, October 18, 2016
Bogdan Kulynych, Predoctoral Researcher, IMDEA Software InstitutePrivacy-preserving statistics and machine learning
Abstract: In this talk, Bogdan will discuss his experience as an intern at Google. The first part of the talk is going to be about...
Tuesday, October 4, 2016
John Gallagher, Professor, Roskilde University, Denmark and IMDEA Software Institute, SpainFinite tree automata in Horn clause analysis and verification
Abstract: Successful Horn clause derivations are finite trees and this leads to a straightforward correspondence between a set of ...
Thursday, July 21, 2016
Richard Rivera, PhD Student, IMDEA Software InstituteAVCLASS: A Tool for Massive Malware Labeling
Abstract: Labeling a malicious executable as a variant of a known family is important for security applications such as triage, li...
Tuesday, July 12, 2016
Platon Kotzias, PhD Student, IMDEA Software InstituteMeasuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services
Abstract: Potentially unwanted programs (PUP) such as adware and rogueware, while not outright malicious, exhibit intrusive behavi...
Tuesday, June 21, 2016
Nataliia Stulova, PhD Student, IMDEA Software InstituteReducing the Overhead of Assertion Run-time Checks via Static Analysis
Abstract: We explore the effectiveness of abstract interpretation in detecting parts of program specifications that can be simplif...
Tuesday, June 14, 2016
Isabel Garcia, Research Intern, IMDEA Software InstituteAbstract Code Browsing
Abstract: Programmers currently enjoy access to a very high number of code repositories and libraries of ever increasing size. The...
Tuesday, June 7, 2016
Miguel Ambrona, PhD Student, IMDEA Software InstituteAttribute-Based Encryption (ABE)
Abstract: The talk will be an overview of the state of the art in Attribute-Based Encryption. Attribute-based encryption (ABE) is ...
Tuesday, May 10, 2016
Pablo Nogueira, Post-doctoral Researcher, IMDEA Software InstituteNo Solvable Lambda-Value Term Left Behind
Abstract: What’s solvability? For some terms of the pure lambda calculus reduction does not terminate. But these non-termina...
Tuesday, April 26, 2016
German Delbianco, PhD Student, IMDEA Software InstituteConcurrent Data Structures Linked in Time
Abstract: Arguments about linearizability of a concurrent data structure are typically carried out by specifying the linearization...
Tuesday, March 15, 2016
Giovanni Bernardi, Post-doctoral Researcher, IMDEA Software InstituteRobustness against Parallel Snapshot Isolation
Abstract: Modern distributed systems often rely on databases that achieve scalability by providing only weak guarantees about the ...
Friday, February 19, 2016
Benedikt Schmidt, Researcher, IMDEA Software InstituteComputer-aided Proofs for Cryptographic Primitives and Protocols
Abstract: The security of cryptographic libraries relies on both the security of the underlying cryptographic primitives and their...
Tuesday, February 9, 2016
Antonio Nappa, PhD Student, IMDEA Software InstituteDefending Against Cybercrime: Advances in the Detection of Malicious Servers and the Analysis of Client-Side Vulnerabilities
Abstract: In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize th...
Tuesday, January 26, 2016
Andrea Cerone, Post-doctoral Researcher, IMDEA Software InstituteAnalysing Transactional Consistency Models
Abstract: To boost performance, modern transactional systems provide weaker consistency guarantees than those defined by serialisa...
Tuesday, January 19, 2016
Alley Stoughton, Researcher, IMDEA Software InstituteYou Sank My Battleship! A Case Study in Secure Programming
Abstract: I’ll report on a case study in secure programming, focusing on the design, implementation and auditing of programs...