Software Seminar Series (S3)
Tuesday, December 18, 2018
Joaquin Arias, PhD Student, IMDEA Software InstituteIncremental Evaluation of Lattice-Based Aggregates in Logic Programming Using Modular TCLP
Abstract: Aggregates are used to compute single pieces of information from separate data items, such as records in a database or a...
Tuesday, December 11, 2018
Álvaro García Pérez, Post-doctoral Researcher, IMDEA Software InstituteFederated Byzantine quorum systems
Abstract: Some of the recent blockchain proposals, such as Stellar and Ripple, use quorum-like structures typical for Byzantine co...
Tuesday, December 4, 2018
Matteo Campanelli, Post-doctoral Researcher, IMDEA Software InstituteOn Pessimism and Optimism in Cryptography
Abstract: Modern cryptography is a pessimistic discipline, in at least two ways: pessimistic in its fundamental belief (“The...
Thursday, November 29, 2018
Ignacio Fábregas, Post-doctoral Researcher, IMDEA Software InstituteResource Morphisms for Specifying Concurrent Programs in Separation Logic: An Introduction
Abstract: In addition to pre- and postconditions, program specifications in recent separation logics for concurrency have employed...
Tuesday, November 20, 2018
Antonio Faonio, Post-doctoral Researcher, IMDEA Software InstituteOptimistic Mixing, Revisited
Abstract: Mixing Networks are protocols that allow a set of senders to send messages anonymously. Such protocols are fundamental b...
Tuesday, November 13, 2018
Joakim Öhman, PhD Student, IMDEA Software InstituteDependent types and the Curry-Howard correspondence
Abstract: Almost every programming language possess some kind of type system. These systems ensures some safety over the code exec...
Tuesday, October 23, 2018
Zsolt István, Assistant Research Professor, IMDEA Software InstituteHow It's Made? An Introduction to FPGAs as Accelerators
Abstract: Today’s workloads in the datacenter suffer from stagnating CPU performance and increasing data volumes. One promis...
Wednesday, October 17, 2018
Platon Kotzias, PhD Student, IMDEA Software InstituteComing of Age: A Longitudinal Study of TLS Deployment
Abstract: The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted communication on the Internet. Howeve...
Tuesday, October 9, 2018
Anais Querol, PhD Student, IMDEA Software InstituteConditional Differential Cryptanalysis of the ARX Symmetric Primitive Salsa20
Abstract: Symmetric key cryptography is an essential part of communication systems, where a secret key is used to protect data con...
Tuesday, July 17, 2018
Jesús Domínguez, PhD Student, IMDEA Software InstituteAn experiment on the Knaster-Tarski construction
Abstract: The Knaster-Tarski Lemma is one of the main tools for obtaining fixpoints. There are also iterative methods, and these a...
Tuesday, July 10, 2018
Joaquín Arias, PhD Student, IMDEA Software InstituteConstraint Answer Set Programming without Grounding
Abstract: Extending ASP with constraints (CASP) enhances its expressiveness and performance. This extension is not straightforward...
Tuesday, July 3, 2018
Luis Miguel Danielsson, PhD Student, IMDEA Software InstituteDecentralized Stream Runtime Verification
Abstract: Stream Runtime Verification (SRV) is a behavioral specification language for runtime verification, where a monitor is de...
Tuesday, June 26, 2018
Felipe Gorostiaga, PhD Student, IMDEA Software InstituteStriver: Runtime Verification of Asynchronous Streams
Abstract: Stream Runtime Verification (SRV) is a specification formalism for temporal properties of reactive systems where observa...
Tuesday, June 19, 2018
Isabel García, PhD Student, IMDEA Software InstituteTowards Better User Guidance in Abstract Interpretation
Abstract: Approximations during program analysis are a necessary evil, as they ensure essential properties, such as analysis sound...
Tuesday, June 12, 2018
Alejandro Aguirre, PhD Student, IMDEA Software InstituteAlmost Sure Productivity
Abstract: A program that computes on an infinite data structure, such as an infinite list or tree cannot be expected to terminate....
Tuesday, June 5, 2018
Miguel Ambrona, PhD Student, IMDEA Software InstitutePrimality tests: How can we know that a number is prime?
Abstract: Prime numbers are essential in cryptography. Many cryptographic primitives (RSA encryption, ElGamal, digital signatures&...
Tuesday, May 22, 2018
Pepe Vila, PhD Student, IMDEA Software InstituteTheory and Practice of Finding Eviction Sets
Abstract: Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction sets: groups o...
Tuesday, April 10, 2018
Alejandro Aguirre, PhD Student, IMDEA Software InstituteRelational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus
Abstract: We extend the simply-typed guarded λ-calculus with discrete probabilities and endow it with a program logic for reasonin...
Tuesday, April 3, 2018
Elena Gutierrez, PhD Student, IMDEA Software InstituteWeighted Context-free Grammars: Does Parikh's Theorem still hold?
Abstract: The celebrated Parikh’s Theorem states that every context-free language is equivalent to a regular language when w...
Tuesday, February 27, 2018
Pablo Cañones, PhD Student, IMDEA Software InstituteOn the Incomparability of Cache Algorithms in Terms of Security
Abstract: Modern computer architectures rely on caches to reduce the latency gap between the CPU and main memory. While indispensa...
Tuesday, February 20, 2018
Artem Khyzha, PhD Student, IMDEA Software InstituteSafe Privatization in Transactional Memory
Abstract: Transactional memory (TM) facilitates the development of concurrent applications by letting the programmer designate cer...
Thursday, February 8, 2018
Joseph Izraelevitz, Post-doctoral Researcher, IMDEA Software InstituteTheory and Practice for Programming on Nonvolatile Memory
Abstract: It is expected that nonvolatile, byte-addressable memory (NVM) will soon be commonplace. However, registers and caches a...
Tuesday, January 23, 2018
Avinash Sudhodanan, Post-doctoral Researcher, IMDEA Software InstituteAnalysis and Detection of Authentication Cross-Site Request Forgeries
Abstract: Cross-Site Request Forgery (CSRF) attacks are one of the critical threats to web applications. In a CSRF attack, an atta...
Tuesday, January 16, 2018
Pedro Valero, PhD Student, IMDEA Software InstituteZearch: Regular Expression Matching on Compressed Text
Abstract: Facebook, Google, Amazon and many other large companies produce huge amounts of data that they need to store and process...