CSF seeks contributions on foundational aspects of computer security as well as their application to practice. Official announcement Oct 26, Event website Nov 28, Her principal research interests are in malware detection for mobile applications, automatic software repair, and software testing and analysis. Their work proposes new techniques that enable third parties to compute over encrypted data, namely to evaluate a function without learning its inputs.

TNO connects people and knowledge to create innovations that boost the sustainable competitive strength of industry and well-being of society. Finally, a code generator automatically generates a multi-tier application, along with all support for access control, from the security-aware GUI model. The selected program can be found here. The winner was selected by a committee of international experts. Ben Livshits is a research scientist at Microsoft Research and an affiliate professor at the University of Washington. Cryptography is one of the strongest areas of the IMDEA Software Institute, and we want to take this occasion to warmheartedly congratulate these four outstanding scientists for their achievements and well-deserved recognition. Interview Sep 25,

Tbesis school was split between lectures, which introduced the formal foundations behind these tools, and exercises, where the participants used the tools to verify the security of representative cryptographic constructions. In each problem category, the three highest-scoring verifiers are awarded medals: IMDEA researcher is chairing three program committees.

News – IMDEA Software Institute

AVClass automates a common task performed by malware analysts. Read the whole story from the EIT Digital website. SV-COMP aims to advance software verification technology by bringing together the top international minds. Link to the event On twitter Dec 10, Pedro’s talk, entitled “Static Profiling of Parametric Resource Usage as a Valuable Aid for Hot-spot Detection,” presents a novel technique that allows performing better software optimizations, and in a more efficient way, than the ones obtained with current cost analysis tools.

jru thesis format

A permanent call for applications will be opened on October, 1 and will run until September, 30with periodic closing dates. The layout facilitates the setup of joint research labs with flrmat and academia.


It takes as input the AV labels for a large number of malware samples e.

jru thesis format

Gilles talk, entitled ‘Advances in computer-aided lcryptography’ presented recent developments in thesls cryptography which aims to provide rigorous tools that ease the design, analyze and implement cryptographic primitives and protocols.

The seven IMDEA Institutes of the Madrid region will jointly present, with the support of the National Policehow science and technology help solving a crime and finding the criminal and its motivation.

She has also served on over 10 program committees of international conferences, and reviewed articles for numerous international journals. IMDEA’s program will focus on the technology surrounding the Tezos cryptographic ledger and smart contracts, which will help advance developments in privacy, correctness, robustness, and scalability. S Swamy medal from the Indian Institute of Science.

jru thesis format

More than 2, people attended the event born with the purpose of promoting the exchange of knowledge among members of the security community. PC co-chair with Martin Sulzmann.

Juan Caballero who works on the area of cybersecurity. To achieve this, the focus is on the core component of DL systems, namely, distributed consensus that is used to establish an absolute order of transactions. The event included the attendance by Alan Craig EC – Marie Curie representativewho gave a presentation of the current call. These models formalize respectively the application’s data domain, authorization policy, and its graphical interface together with its behavior.

The paper results revealed that although individual exploit servers have a short median lifetime of a few hours, attackers were able to sustain long-lived malware distribution by turning to the cloud, hosting their exploit servers in specialized cloud hosting services.

IMDEA Software Institute News

The award is given by the Association for Logic Programming. RV has emerged in recent years as a practical application of formal verification, and a less ad-hoc approach to conventional testing by building monitors from formal specifications. The 10 year Test of Time Award recognizes the paper published 10 years ago which has had the largest impact.


Security researchers from the IMDEA Software Institute explore in this document what cutting-edge computer science can do now and what could be done in the future. Registration and more information here. TNO connects people and knowledge to create formar that boost the sustainable competitive strength of industry and well-being of society.

Roberto has just started his Business Development Experience for 6 months at Sanitas, in which he will be able to deliver the background of his thesis to the industry.

The awarded work is entitled: About Con ciencia en la escuela in Spanish. Ben’s research interests include application of analysis techniques to finding errors in programs, and, more generally, privacy, security, and performance of large programs.

The workshop was aimed at discussing collaborative work on chosen software projects and, where possible, to bring those advances to Microsoft’s businesses. During one hour, they spoke about science in general and, in particular, about the science they will show in an upcoming event in CSIC’s Residencia de Estudiantes on the evening of September 29th.

The thesis studies the formal verification of temporal properties of safety thesia liveness of parametrized concurrent systems, with a special focus on programs that manipulate complex concurrent data structures in the heap.