{"id":147,"date":"2022-11-14T09:41:09","date_gmt":"2022-11-14T09:41:09","guid":{"rendered":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/?p=147"},"modified":"2022-11-15T11:20:53","modified_gmt":"2022-11-15T11:20:53","slug":"investigadores-de-imdea-software-consiguen-publicar-8-articulos-en-la-conferencia-acm","status":"publish","type":"post","link":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/2022\/11\/14\/investigadores-de-imdea-software-consiguen-publicar-8-articulos-en-la-conferencia-acm\/","title":{"rendered":"Investigadores de IMDEA Software consiguen publicar 8 art\u00edculos en la Conferencia CCS"},"content":{"rendered":"<h5>ACM es la principal conferencia anual del Special Interest Group on Security, Audit and Control (SIGSAC) de la Association for Computing Machinery (ACM).<\/h5>\n<figure id=\"attachment_149\" aria-describedby=\"caption-attachment-149\" style=\"width: 830px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-149 \" src=\"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/files\/2022\/11\/91ce462c-7375-454d-b9f6-3e23f80495ce.jpg\" alt=\"Investigadores recibiendo premios en el escenario\" width=\"830\" height=\"622\" srcset=\"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/files\/2022\/11\/91ce462c-7375-454d-b9f6-3e23f80495ce.jpg 1148w, https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/files\/2022\/11\/91ce462c-7375-454d-b9f6-3e23f80495ce-300x225.jpg 300w, https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/files\/2022\/11\/91ce462c-7375-454d-b9f6-3e23f80495ce-1024x768.jpg 1024w, https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/files\/2022\/11\/91ce462c-7375-454d-b9f6-3e23f80495ce-768x576.jpg 768w\" sizes=\"(max-width: 830px) 100vw, 830px\" \/><figcaption id=\"caption-attachment-149\" class=\"wp-caption-text\">Foto de familia de los Investigadores con sus premios en el escenario de ACM<\/figcaption><\/figure>\n<p>Un grupo de investigadores de IMDEA Software asisti\u00f3 a la Conferencia <a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2022\/home.html\">ACM sobre Seguridad Inform\u00e1tica y de las Comunicaciones<\/a> (CCS) en Los \u00c1ngeles, del 7 al 11 de noviembre, para presentar los 8 art\u00edculos que fueron aceptados.<\/p>\n<p>ACM es la principal conferencia anual del Special Interest Group on Security, Audit and Control (SIGSAC) de la Association for Computing Machinery (ACM). La conferencia re\u00fane a investigadores, profesionales, desarrolladores y usuarios de la seguridad de la informaci\u00f3n de todo el mundo para explorar ideas y resultados de vanguardia.<\/p>\n<p>Al logro de haber conseguido publicar 8 art\u00edculos, se suman otros: el art\u00edculo de&nbsp;<a href=\"https:\/\/mguarnieri.github.io\">Marco Guarnieri<\/a>&nbsp;\u00abAutomatic Detection of Speculative Execution Combinations\u00bb obtuvo un premio como art\u00edculo distinguido; y los investigadores <a href=\"https:\/\/software.imdea.org\/~juanca\/\">Juan Caballero<\/a>&nbsp;y <a href=\"http:\/\/www.dariofiore.it\">Dario Fiore<\/a>&nbsp;recibieron el premio al mejor revisor.<\/p>\n<p>Lista de los art\u00edculos aceptados:<\/p>\n<p>1. Automatic Detection of Speculative Execution Combinations (Xaver Fabian, Marco Guarnieri, Marco Patrignani)<\/p>\n<p>2. Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams (Dario Fiore, Ida Tucker)<\/p>\n<p>3. Foundations of Coin Mixing Services (Noemi Glaeser, Matteo Maffei, Giulio Malavolta, <a href=\"https:\/\/software.imdea.org\/~pedro.moreno\/\">Pedro Moreno-Sanchez<\/a>, Erkan Tairi, Sri Aravinda Krishnan Thyagarajan)<\/p>\n<p>4. Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration (<a href=\"https:\/\/software.imdea.org\/people\/gibran.gomez\/index.html\">Gibran Gomez<\/a>, Pedro Moreno-Sanchez, Juan Caballero)<\/p>\n<p>5. Enforcing Fine-grained Constant-time Policies (Basavesh Ammanaghatta Shivakumar, (<a href=\"https:\/\/gbarthe.github.io\">Gilles Barthe<\/a>, Benjamin Gr\u00e9goire, Vincent Laporte, Swarn Priya)<\/p>\n<p>6. Sleepy Channels: Bi-directional Payment Channels without Watchtowers (Lukas Aumayr, Sri Aravinda Krishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez, Matteo Maffei)<\/p>\n<p>7. Tidy: Symbolic Verification of Timed Cryptographic Protocols (Gilles Barthe, Ugo Dal Lago, Giulio Malavolta, Itsaka Rakotonirina)<\/p>\n<p>8. Succinct Zero-Knowledge Batch Proofs for Set Accumulators (Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, <a href=\"https:\/\/dimkolonelos.github.io\">Dimitris Kolonelos<\/a>, Hyunok Oh)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ACM es la principal conferencia anual del Special Interest Group on Security, Audit and Control (SIGSAC) de la Association for Computing Machinery (ACM). Un grupo de investigadores de IMDEA Software asisti\u00f3 a la Conferencia ACM sobre Seguridad Inform\u00e1tica y de las Comunicaciones (CCS) en Los \u00c1ngeles, del 7 al 11 de noviembre, para presentar los 8 art\u00edculos que fueron aceptados. ACM es la principal conferencia anual del Special Interest Group on Security, Audit and Control (SIGSAC) de la Association for Computing Machinery (ACM). La conferencia re\u00fane a investigadores, profesionales, desarrolladores y usuarios de la seguridad de la informaci\u00f3n de todo\u2026<\/p>\n","protected":false},"author":243,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0},"categories":[8239],"tags":[51788,1729,8239,22421,1597,244],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":4}},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/posts\/147"}],"collection":[{"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/users\/243"}],"replies":[{"embeddable":true,"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/comments?post=147"}],"version-history":[{"count":5,"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/posts\/147\/revisions"}],"predecessor-version":[{"id":153,"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/posts\/147\/revisions\/153"}],"wp:attachment":[{"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/media?parent=147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/categories?post=147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.madrimasd.org\/blogs\/Tecnologiasdelainformacionparaelmundodelmanana\/wp-json\/wp\/v2\/tags?post=147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}