Software Seminar Series (S3)

Abstract: Aggregates are used to compute single pieces of information from separate data items, such as records in a database or a...


Álvaro García Pérez

Tuesday, December 11, 2018

Álvaro García Pérez, Post-doctoral Researcher, IMDEA Software Institute

Federated Byzantine quorum systems

Abstract: Some of the recent blockchain proposals, such as Stellar and Ripple, use quorum-like structures typical for Byzantine co...


Matteo Campanelli

Tuesday, December 4, 2018

Matteo Campanelli, Post-doctoral Researcher, IMDEA Software Institute

On Pessimism and Optimism in Cryptography

Abstract: Modern cryptography is a pessimistic discipline, in at least two ways: pessimistic in its fundamental belief (“The...


Abstract: In addition to pre- and postconditions, program specifications in recent separation logics for concurrency have employed...


Antonio Faonio

Tuesday, November 20, 2018

Antonio Faonio, Post-doctoral Researcher, IMDEA Software Institute

Optimistic Mixing, Revisited

Abstract: Mixing Networks are protocols that allow a set of senders to send messages anonymously. Such protocols are fundamental b...


Joakim Öhman

Tuesday, November 13, 2018

Joakim Öhman, PhD Student, IMDEA Software Institute

Dependent types and the Curry-Howard correspondence

Abstract: Almost every programming language possess some kind of type system. These systems ensures some safety over the code exec...


Zsolt István

Tuesday, October 23, 2018

Zsolt István, Assistant Research Professor, IMDEA Software Institute

How It's Made? An Introduction to FPGAs as Accelerators

Abstract: Today’s workloads in the datacenter suffer from stagnating CPU performance and increasing data volumes. One promis...


Platon Kotzias

Wednesday, October 17, 2018

Platon Kotzias, PhD Student, IMDEA Software Institute

Coming of Age: A Longitudinal Study of TLS Deployment

Abstract: The Transport Layer Security (TLS) protocol is the de-facto standard for encrypted communication on the Internet. Howeve...


Abstract: Symmetric key cryptography is an essential part of communication systems, where a secret key is used to protect data con...


Jesús Domínguez

Tuesday, July 17, 2018

Jesús Domínguez, PhD Student, IMDEA Software Institute

An experiment on the Knaster-Tarski construction

Abstract: The Knaster-Tarski Lemma is one of the main tools for obtaining fixpoints. There are also iterative methods, and these a...


Joaquín Arias

Tuesday, July 10, 2018

Joaquín Arias, PhD Student, IMDEA Software Institute

Constraint Answer Set Programming without Grounding

Abstract: Extending ASP with constraints (CASP) enhances its expressiveness and performance. This extension is not straightforward...


Luis Miguel Danielsson

Tuesday, July 3, 2018

Luis Miguel Danielsson, PhD Student, IMDEA Software Institute

Decentralized Stream Runtime Verification

Abstract: Stream Runtime Verification (SRV) is a behavioral specification language for runtime verification, where a monitor is de...


Felipe Gorostiaga

Tuesday, June 26, 2018

Felipe Gorostiaga, PhD Student, IMDEA Software Institute

Striver: Runtime Verification of Asynchronous Streams

Abstract: Stream Runtime Verification (SRV) is a specification formalism for temporal properties of reactive systems where observa...


Isabel García

Tuesday, June 19, 2018

Isabel García, PhD Student, IMDEA Software Institute

Towards Better User Guidance in Abstract Interpretation

Abstract: Approximations during program analysis are a necessary evil, as they ensure essential properties, such as analysis sound...


Alejandro Aguirre

Tuesday, June 12, 2018

Alejandro Aguirre, PhD Student, IMDEA Software Institute

Almost Sure Productivity

Abstract: A program that computes on an infinite data structure, such as an infinite list or tree cannot be expected to terminate....


Miguel Ambrona

Tuesday, June 5, 2018

Miguel Ambrona, PhD Student, IMDEA Software Institute

Primality tests: How can we know that a number is prime?

Abstract: Prime numbers are essential in cryptography. Many cryptographic primitives (RSA encryption, ElGamal, digital signatures&...


Pepe Vila

Tuesday, May 22, 2018

Pepe Vila, PhD Student, IMDEA Software Institute

Theory and Practice of Finding Eviction Sets

Abstract: Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction sets: groups o...


Abstract: We extend the simply-typed guarded λ-calculus with discrete probabilities and endow it with a program logic for reasonin...


Elena Gutierrez

Tuesday, April 3, 2018

Elena Gutierrez, PhD Student, IMDEA Software Institute

Weighted Context-free Grammars: Does Parikh's Theorem still hold?

Abstract: The celebrated Parikh’s Theorem states that every context-free language is equivalent to a regular language when w...


Abstract: Modern computer architectures rely on caches to reduce the latency gap between the CPU and main memory. While indispensa...


Artem Khyzha

Tuesday, February 20, 2018

Artem Khyzha, PhD Student, IMDEA Software Institute

Safe Privatization in Transactional Memory

Abstract: Transactional memory (TM) facilitates the development of concurrent applications by letting the programmer designate cer...


Joseph Izraelevitz

Thursday, February 8, 2018

Joseph Izraelevitz, Post-doctoral Researcher, IMDEA Software Institute

Theory and Practice for Programming on Nonvolatile Memory

Abstract: It is expected that nonvolatile, byte-addressable memory (NVM) will soon be commonplace. However, registers and caches a...


Avinash Sudhodanan

Tuesday, January 23, 2018

Avinash Sudhodanan, Post-doctoral Researcher, IMDEA Software Institute

Analysis and Detection of Authentication Cross-Site Request Forgeries

Abstract: Cross-Site Request Forgery (CSRF) attacks are one of the critical threats to web applications. In a CSRF attack, an atta...


Pedro Valero

Tuesday, January 16, 2018

Pedro Valero, PhD Student, IMDEA Software Institute

Zearch: Regular Expression Matching on Compressed Text

Abstract: Facebook, Google, Amazon and many other large companies produce huge amounts of data that they need to store and process...