Software Seminar Series (S3)

Abstract: Some weeks ago I found an interesting bug in Chrome and spent the weekend trying to come up with a clever exploit. In th...


Miguel Ambrona

Tuesday, December 12, 2017

Miguel Ambrona, PhD Student, IMDEA Software Institute

Card-Based Cryptography

Abstract: In this talk I will show you how to use standard playing cards in order to run cryptographic protocols in a visual and e...


Nataliia Stulova

Tuesday, December 5, 2017

Nataliia Stulova, PhD Student, IMDEA Software Institute

Improving Runtime Verification in Dynamic Programming Languages

Abstract: Software verification comes in two flavors: static and dynamic. Static program verification takes place during program a...


Joakim Öhman

Tuesday, November 28, 2017

Joakim Öhman, PhD Student, IMDEA Software Institute

Decidability of Conversion for Type Theory in Type Theory

Abstract: For type checking of functional programming languages, it is fundamental to be able to check equality of types, or in ot...


Wouter Lueks

Tuesday, November 14, 2017

Wouter Lueks, Post-doctoral Researcher, IMDEA Software Institute

Securing attribute-based credentials on smart-phones

Abstract: Attribute-based credentials are a privacy-enhancing technology that allow users to prove things about themselves in a pr...


Abstract: s(ASP) is a system which computes stable models of logic programs extended with negation (i.e., a logic program with no ...


Antonio Faonio

Tuesday, October 17, 2017

Antonio Faonio, Post-doctoral Researcher, IMDEA Software Institute

Leakage-and-Tamper Resilient Cryptography in the Split-State Model

Abstract: The Split State Model allows to obtain tamper and leakage resilience against a big class of attackers. In this model the...


Abstract: Attribute-based encryption (ABE) is a cryptographic primitive which supports fine-grained access control on encrypted da...


Abstract: Procedure specifications are useful in many software development tasks. As one example, in automatic test case generatio...


Irfan Ul Haq

Tuesday, July 18, 2017

Irfan Ul Haq, PhD Student, IMDEA Software Institute

Malware Lineage in the Wild

Abstract: Malware lineage studies the evolutionary relationships among malware and has important applications for malware analysis...


Vincent Laporte

Tuesday, June 27, 2017

Vincent Laporte, Post-doctoral Researcher, IMDEA Software Institute

Verified Translation Validation of Static Analyses

Abstract: Motivated by applications to security and high efficiency, we propose an automated methodology for validating on low-lev...


Isabel Garcia

Tuesday, June 20, 2017

Isabel Garcia, PhD Student, IMDEA Software Institute

Incremental and Modular Context-sensitive Analysis

Abstract: Context-sensitive global analysis of large code bases can be expensive, which can be specially problematic in interactiv...


Platon Kotzias

Tuesday, June 6, 2017

Platon Kotzias, PhD Student, IMDEA Software Institute

An Analysis of Pay-per-Install Economics Using Entity Graphs

Abstract: Potentially unwanted programs (PUP) are a category of undesirable software which includes adware and rogueware. PUP is o...


Antonio Faonio

Tuesday, May 30, 2017

Antonio Faonio, Post-doctoral Researcher, IMDEA Software Institute

Proofs of Space: When Space is of the Essence

Abstract: Proofs of computational effort were devised to control denial of service attacks. Dwork and Naor (CRYPTO ‘92), for...


Alvaro Garcia Perez

Tuesday, May 23, 2017

Alvaro Garcia Perez, Post-doctoral Researcher, IMDEA Software Institute

Towards modular verification of consensus algorithms

Abstract: The Paxos algorithm of Lamport is a classic consensus protocol for state machine replication in environments that admit ...


Nataliia Stulova

Tuesday, May 16, 2017

Nataliia Stulova, PhD Student, IMDEA Software Institute

Shallow Run-time Checking

Abstract: Untyped languages offer great flexibility in term creation and manipulation. To ensure correctness of data operations ex...


Abstract: We present a preliminary study to understand how apps evolve in their permission requests across different releases. We ...


Alejandro Aguirre

Tuesday, March 21, 2017

Alejandro Aguirre, PhD Student, IMDEA Software Institute

A Relational Logic for Higher-Order Programs

Abstract: Relational program verification is a variant of program verification where one can reason about two programs and as a sp...


Itsaka Rakotonirina

Tuesday, March 14, 2017

Itsaka Rakotonirina, Research Intern, IMDEA Software Institute

Reasoning about aggregation of information

Abstract: Along with the conventional mathematic-driven approach of software security, 20 years of attacks harnessing the timing b...


Elena Gutierrez

Tuesday, March 7, 2017

Elena Gutierrez, PhD Student, IMDEA Software Institute

Parikh Image of Pushdown Automata

Abstract: There exist two main formalisms to describe context-free languages: context-free grammars and pushdown automata. In fact...


German Delbianco

Tuesday, February 28, 2017

German Delbianco, PhD Student, IMDEA Software Institute

Concurrent Data Structures Linked in Time

Abstract: Arguments about correctness of a concurrent data structure are typically carried out by using the notion of linearizabil...


Arthur Blot

Tuesday, February 21, 2017

Arthur Blot, Research Intern, IMDEA Software Institute

Compositional Synthesis of Leakage Resilient Programs

Abstract: A promising approach to defend against side channel attacks is to build programs that are leakage resilient, in a formal...


Abstract: In the last years we have witnessed a boom in the use of techniques and tools that provide anonymity. Such techniques an...


Pedro Valero

Tuesday, January 31, 2017

Pedro Valero, PhD Student, IMDEA Software Institute

A Language-theoretic View on Network Protocols

Abstract: Input validation is the first line of defense against malformed or malicious inputs. It is therefore critical that the v...


Joaquín Arias Herrero

Tuesday, January 24, 2017

Joaquín Arias Herrero, PhD Student, IMDEA Software Institute

Tabled CLP for Reasoning over Stream Data

Abstract: The interest in reasoning over stream data is growing as quickly as the amount of data generated. Our intention is to ch...


Luca Nizzardo

Tuesday, January 17, 2017

Luca Nizzardo, PhD Student, IMDEA Software Institute

Multi-Key Homomorphic Authenticators

Abstract: Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements m_1, … , m_t...