Software Seminar Series (S3)
Thursday, December 14, 2017
Pepe Vila, PhD Student, IMDEA Software InstituteA bug bounty tale: Chrome, stylesheets, cookies, and AES
Abstract: Some weeks ago I found an interesting bug in Chrome and spent the weekend trying to come up with a clever exploit. In th...
Tuesday, December 12, 2017
Miguel Ambrona, PhD Student, IMDEA Software InstituteCard-Based Cryptography
Abstract: In this talk I will show you how to use standard playing cards in order to run cryptographic protocols in a visual and e...
Tuesday, December 5, 2017
Nataliia Stulova, PhD Student, IMDEA Software InstituteImproving Runtime Verification in Dynamic Programming Languages
Abstract: Software verification comes in two flavors: static and dynamic. Static program verification takes place during program a...
Tuesday, November 28, 2017
Joakim Öhman, PhD Student, IMDEA Software InstituteDecidability of Conversion for Type Theory in Type Theory
Abstract: For type checking of functional programming languages, it is fundamental to be able to check equality of types, or in ot...
Tuesday, November 14, 2017
Wouter Lueks, Post-doctoral Researcher, IMDEA Software InstituteSecuring attribute-based credentials on smart-phones
Abstract: Attribute-based credentials are a privacy-enhancing technology that allow users to prove things about themselves in a pr...
Tuesday, November 7, 2017
Joaquin Arias, PhD Student, IMDEA Software InstituteTCLP(ASP): A meta-interpreter for goal-directed ASP using Tabling and Constraints
Abstract: s(ASP) is a system which computes stable models of logic programs extended with negation (i.e., a logic program with no ...
Tuesday, October 17, 2017
Antonio Faonio, Post-doctoral Researcher, IMDEA Software InstituteLeakage-and-Tamper Resilient Cryptography in the Split-State Model
Abstract: The Split State Model allows to obtain tamper and leakage resilience against a big class of attackers. In this model the...
Tuesday, October 10, 2017
Miguel Ambrona, PhD Student, IMDEA Software InstituteAttribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions
Abstract: Attribute-based encryption (ABE) is a cryptographic primitive which supports fine-grained access control on encrypted da...
Tuesday, October 3, 2017
Arianna Blasi, Research Intern, IMDEA Software InstituteUsing semantic similarity analysis of Javadoc comments to automatically generate test oracles
Abstract: Procedure specifications are useful in many software development tasks. As one example, in automatic test case generatio...
Tuesday, July 18, 2017
Irfan Ul Haq, PhD Student, IMDEA Software InstituteMalware Lineage in the Wild
Abstract: Malware lineage studies the evolutionary relationships among malware and has important applications for malware analysis...
Tuesday, June 27, 2017
Vincent Laporte, Post-doctoral Researcher, IMDEA Software InstituteVerified Translation Validation of Static Analyses
Abstract: Motivated by applications to security and high efficiency, we propose an automated methodology for validating on low-lev...
Tuesday, June 20, 2017
Isabel Garcia, PhD Student, IMDEA Software InstituteIncremental and Modular Context-sensitive Analysis
Abstract: Context-sensitive global analysis of large code bases can be expensive, which can be specially problematic in interactiv...
Tuesday, June 6, 2017
Platon Kotzias, PhD Student, IMDEA Software InstituteAn Analysis of Pay-per-Install Economics Using Entity Graphs
Abstract: Potentially unwanted programs (PUP) are a category of undesirable software which includes adware and rogueware. PUP is o...
Tuesday, May 30, 2017
Antonio Faonio, Post-doctoral Researcher, IMDEA Software InstituteProofs of Space: When Space is of the Essence
Abstract: Proofs of computational effort were devised to control denial of service attacks. Dwork and Naor (CRYPTO ‘92), for...
Tuesday, May 23, 2017
Alvaro Garcia Perez, Post-doctoral Researcher, IMDEA Software InstituteTowards modular verification of consensus algorithms
Abstract: The Paxos algorithm of Lamport is a classic consensus protocol for state machine replication in environments that admit ...
Tuesday, May 16, 2017
Nataliia Stulova, PhD Student, IMDEA Software InstituteShallow Run-time Checking
Abstract: Untyped languages offer great flexibility in term creation and manipulation. To ensure correctness of data operations ex...
Tuesday, April 4, 2017
Paolo Calciati, PhD Student, IMDEA Software InstituteHow do Apps Evolve in Their Permission Requests? A Preliminary Study
Abstract: We present a preliminary study to understand how apps evolve in their permission requests across different releases. We ...
Tuesday, March 21, 2017
Alejandro Aguirre, PhD Student, IMDEA Software InstituteA Relational Logic for Higher-Order Programs
Abstract: Relational program verification is a variant of program verification where one can reason about two programs and as a sp...
Tuesday, March 14, 2017
Itsaka Rakotonirina, Research Intern, IMDEA Software InstituteReasoning about aggregation of information
Abstract: Along with the conventional mathematic-driven approach of software security, 20 years of attacks harnessing the timing b...
Tuesday, March 7, 2017
Elena Gutierrez, PhD Student, IMDEA Software InstituteParikh Image of Pushdown Automata
Abstract: There exist two main formalisms to describe context-free languages: context-free grammars and pushdown automata. In fact...
Tuesday, February 28, 2017
German Delbianco, PhD Student, IMDEA Software InstituteConcurrent Data Structures Linked in Time
Abstract: Arguments about correctness of a concurrent data structure are typically carried out by using the notion of linearizabil...
Tuesday, February 21, 2017
Arthur Blot, Research Intern, IMDEA Software InstituteCompositional Synthesis of Leakage Resilient Programs
Abstract: A promising approach to defend against side channel attacks is to build programs that are leakage resilient, in a formal...
Tuesday, February 14, 2017
Srdjan Matic, PhD Student, IMDEA Software InstituteActive Techniques for Revealing and Analyzing the Security of Hidden Servers
Abstract: In the last years we have witnessed a boom in the use of techniques and tools that provide anonymity. Such techniques an...
Tuesday, January 31, 2017
Pedro Valero, PhD Student, IMDEA Software InstituteA Language-theoretic View on Network Protocols
Abstract: Input validation is the first line of defense against malformed or malicious inputs. It is therefore critical that the v...
Tuesday, January 24, 2017
Joaquín Arias Herrero, PhD Student, IMDEA Software InstituteTabled CLP for Reasoning over Stream Data
Abstract: The interest in reasoning over stream data is growing as quickly as the amount of data generated. Our intention is to ch...
Tuesday, January 17, 2017
Luca Nizzardo, PhD Student, IMDEA Software InstituteMulti-Key Homomorphic Authenticators
Abstract: Homomorphic authenticators (HAs) enable a client to authenticate a large collection of data elements m_1, … , m_t...