Skip to main content

Showing 1–20 of 20 results for author: Blanco, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.16277  [pdf, other

    cs.PL cs.CR

    SECOMP: Formally Secure Compilation of Compartmentalized C Programs

    Authors: Jérémy Thibault, Roberto Blanco, Dongjae Lee, Sven Argo, Arthur Azevedo de Amorim, Aïna Linn Georges, Catalin Hritcu, Andrew Tolmach

    Abstract: Undefined behavior in C often causes devastating security vulnerabilities. One practical mitigation is compartmentalization, which allows developers to structure large programs into mutually distrustful compartments with clearly specified privileges and interactions. In this paper we introduce SECOMP, a compiler for compartmentalized C code that comes with machine-checked proofs guaranteeing that… ▽ More

    Submitted 1 July, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: CCS'24 camera ready version, extended with appendices and a few more references

  2. Mercury: A modeling, simulation, and optimization framework for data stream-oriented IoT applications

    Authors: Román Cárdenas, Patricia Arroba, Roberto Blanco, Pedro Malagón, José L. Risco-Martín, José M. Moya

    Abstract: The Internet of Things is transforming our society by monitoring users and infrastructures' behavior to enable new services that will improve life quality and resource management. These applications require a vast amount of localized information to be processed in real-time so, the deployment of new fog computing infrastructures that bring computing closer to the data sources is a major concern. I… ▽ More

    Submitted 2 November, 2023; originally announced December 2023.

    Journal ref: Simulation Modelling Practice and Theory, 101, 2019

  3. arXiv:2305.11673  [pdf, other

    cs.CL

    Bias Beyond English: Counterfactual Tests for Bias in Sentiment Analysis in Four Languages

    Authors: Seraphina Goldfarb-Tarrant, Adam Lopez, Roi Blanco, Diego Marcheggiani

    Abstract: Sentiment analysis (SA) systems are used in many products and hundreds of languages. Gender and racial biases are well-studied in English SA systems, but understudied in other languages, with few resources for such studies. To remedy this, we build a counterfactual evaluation corpus for gender and racial/migrant bias in four languages. We demonstrate its usefulness by answering a simple but import… ▽ More

    Submitted 19 May, 2023; originally announced May 2023.

    Comments: 5 pages, accepted to Findings of ACL 2023

  4. Test adequacy evaluation for the user-database interaction: a specification-based approach

    Authors: Raquel Blanco, Javier Tuya, Ruben V. Seco

    Abstract: Testing a database application is a challenging process where both the database and the user interaction have to be considered in the design of test cases. This paper describes a specification-based approach to guide the design of test inputs (both the test database and the user inputs) for a database application and to automatically evaluate the test adequacy. First, the system specification of t… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST 2012), Montreal, QC, Canada, 2012

  5. Can gamification help in software testing education? Findings from an empirical study

    Authors: Raquel Blanco, Manuel Trinidad, Maria Jose Suarez-Cabal, Alejandro Calderon, Mercedes Ruiz, Javier Tuya

    Abstract: Software testing is an essential knowledge area required by industry for software engineers. However, software engineering students often consider testing less appealing than designing or coding. Consequently, it is difficult to engage students to create effective tests. To encourage students, we explored the use of gamification and investigated whether this technique can help to improve the engag… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Journal ref: The Journal of Systems & Software, 200, 2023

  6. arXiv:2302.03616  [pdf

    cs.LG cs.AI eess.SP

    Can gamification reduce the burden of self-reporting in mHealth applications? A feasibility study using machine learning from smartwatch data to estimate cognitive load

    Authors: Michal K. Grzeszczyk, Paulina Adamczyk, Sylwia Marek, Ryszard Pręcikowski, Maciej Kuś, M. Patrycja Lelujko, Rosmary Blanco, Tomasz Trzciński, Arkadiusz Sitek, Maciej Malawski, Aneta Lisowska

    Abstract: The effectiveness of digital treatments can be measured by requiring patients to self-report their state through applications, however, it can be overwhelming and causes disengagement. We conduct a study to explore the impact of gamification on self-reporting. Our approach involves the creation of a system to assess cognitive load (CL) through the analysis of photoplethysmography (PPG) signals. Th… ▽ More

    Submitted 21 December, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: Accepted for AMIA 2023

  7. arXiv:2210.12022  [pdf, other

    cs.CL

    Performance-Efficiency Trade-Offs in Adapting Language Models to Text Classification Tasks

    Authors: Laura Aina, Nikos Voskarides, Roi Blanco

    Abstract: Pre-trained language models (LMs) obtain state-of-the-art performance when adapted to text classification tasks. However, when using such models in real-world applications, efficiency considerations are paramount. In this paper, we study how different training procedures that adapt LMs to text classification perform, as we vary model and train set size. More specifically, we compare standard fine-… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: AACL-IJCNLP 2022

  8. arXiv:2110.01439  [pdf, other

    cs.PL cs.CR

    SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation

    Authors: Akram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg, Catalin Hritcu

    Abstract: Proving secure compilation of partial programs typically requires back-translating an attack against the compiled program to an attack against the source program. To prove back-translation, one can syntactically translate the target attacker to a source one -- i.e., syntax-directed back-translation -- or show that the interaction traces of the target attacker can also be emitted by source attacker… ▽ More

    Submitted 3 June, 2022; v1 submitted 4 October, 2021; originally announced October 2021.

    Comments: CSF 2022 pre-print with extra appendices

  9. Formalizing Stack Safety as a Security Property

    Authors: Sean Noble Anderson, Roberto Blanco, Leonidas Lampropoulos, Benjamin C. Pierce, Andrew Tolmach

    Abstract: The term stack safety is used to describe a variety of compiler, run-time, and hardware mechanisms for protecting stack memory. Unlike "the heap," the ISA-level stack does not correspond to a single high-level language concept: different compilers use it in different ways to support procedural and functional abstraction mechanisms from a wide range of languages. This protean nature makes it diffic… ▽ More

    Submitted 21 March, 2024; v1 submitted 2 May, 2021; originally announced May 2021.

    Journal ref: Proceedings of the 2023 IEEE 36th Computer Security Foundations Symposium (CSF)

  10. arXiv:1910.00856  [pdf, other

    cs.CL

    BookQA: Stories of Challenges and Opportunities

    Authors: Stefanos Angelidis, Lea Frermann, Diego Marcheggiani, Roi Blanco, Lluís Màrquez

    Abstract: We present a system for answering questions based on the full text of books (BookQA), which first selects book passages given a question at hand, and then uses a memory network to reason and predict an answer. To improve generalization, we pretrain our memory network using artificial questions generated from book sentences. We experiment with the recently published NarrativeQA corpus, on the subse… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Accepted at 2nd Workshop on Machine Reading for Question Answering (MRQA), EMNLP 2019

  11. arXiv:1907.05320  [pdf, other

    cs.PL cs.CR

    Trace-Relating Compiler Correctness and Secure Compilation

    Authors: Carmine Abate, Roberto Blanco, Stefan Ciobaca, Adrien Durier, Deepak Garg, Catalin Hritcu, Marco Patrignani, Éric Tanter, Jérémy Thibault

    Abstract: Compiler correctness is, in its simplest form, defined as the inclusion of the set of traces of the compiled program into the set of traces of the original program, which is equivalent to the preservation of all trace properties. Here traces collect, for instance, the externally observable events of each execution. This definition requires, however, the set of traces of the source and target langu… ▽ More

    Submitted 23 February, 2020; v1 submitted 11 July, 2019; originally announced July 2019.

    Comments: ESOP'20 camera ready version together with online appendix

  12. arXiv:1810.05421  [pdf, ps, other

    cs.CY cs.SI physics.ed-ph

    The use of blogs in the education field: A qualitative systematic review

    Authors: Carlos R. del Blanco, Ivan García-Magariño

    Abstract: Blogs have become one of the most successful tools of the Web 2.0 because of their ease of use and the availability of open platforms. They have quickly spread in the education field thanks to the many attractive qualities that have been attributed to them, such as collaboration, communication, enhancing of professional writing, and the improvement of information-gathering skills. However, many of… ▽ More

    Submitted 12 October, 2018; originally announced October 2018.

  13. Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation

    Authors: Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy Thibault

    Abstract: (CROPPED TO FIT IN ARXIV'S SILLY LIMIT. SEE PDF FOR COMPLETE ABSTRACT.) We are the first to thoroughly explore a large space of formal secure compilation criteria based on robust property preservation, i.e., the preservation of properties satisfied against arbitrary adversarial contexts. We study robustly preserving various classes of trace properties such as safety, of hyperproperties such as n… ▽ More

    Submitted 17 May, 2019; v1 submitted 12 July, 2018; originally announced July 2018.

    Comments: Long version of CSF'19 paper, including online appendix

  14. arXiv:1802.00588  [pdf, other

    cs.CR cs.PL

    When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise

    Authors: Carmine Abate, Arthur Azevedo de Amorim, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Théo Laurent, Benjamin C. Pierce, Marco Stronati, Jérémy Thibault, Andrew Tolmach

    Abstract: We propose a new formal criterion for evaluating secure compilation schemes for unsafe languages, expressing end-to-end security guarantees for software components that may become compromised after encountering undefined behavior---for example, by accessing an array out of bounds. Our criterion is the first to model dynamic compromise in a system of mutually distrustful components with clearly s… ▽ More

    Submitted 29 November, 2019; v1 submitted 2 February, 2018; originally announced February 2018.

    Comments: CCS paper with significant improvement of the proofs, first step towards a journal version

  15. Efficient and Effective Tail Latency Minimization in Multi-Stage Retrieval Systems

    Authors: Joel Mackenzie, J. Shane Culpepper, Roi Blanco, Matt Crane, Charles L. A. Clarke, Jimmy Lin

    Abstract: Scalable web search systems typically employ multi-stage retrieval architectures, where an initial stage generates a set of candidate documents that are then pruned and re-ranked. Since subsequent stages typically exploit a multitude of features of varying costs using machine-learned models, reducing the number of documents that are considered at each stage improves latency. In this work, we propo… ▽ More

    Submitted 20 April, 2017; v1 submitted 12 April, 2017; originally announced April 2017.

    Comments: Update 1: Edited email address

  16. arXiv:1704.01617  [pdf, ps, other

    cs.IR

    Part of Speech Based Term Weighting for Information Retrieval

    Authors: Christina Lioma, Roi Blanco

    Abstract: Automatic language processing tools typically assign to terms so-called weights corresponding to the contribution of terms to information content. Traditionally, term weights are computed from lexical statistics, e.g., term frequencies. We propose a new type of term weight that is computed from part of speech (POS) n-gram statistics. The proposed POS-based term weight represents how informative a… ▽ More

    Submitted 5 April, 2017; originally announced April 2017.

  17. Proof Outlines as Proof Certificates: A System Description

    Authors: Roberto Blanco, Dale Miller

    Abstract: We apply the foundational proof certificate (FPC) framework to the problem of designing high-level outlines of proofs. The FPC framework provides a means to formally define and check a wide range of proof evidence. A focused proof system is central to this framework and such a proof system provides an interesting approach to proof reconstruction during the process of proof checking (relying on a… ▽ More

    Submitted 13 November, 2015; originally announced November 2015.

    Comments: In Proceedings WoF'15, arXiv:1511.02529

    Journal ref: EPTCS 197, 2015, pp. 7-14

  18. Local Ranking Problem on the BrowseGraph

    Authors: Michele Trevisiol, Luca Maria Aiello, Paolo Boldi, Roi Blanco

    Abstract: The "Local Ranking Problem" (LRP) is related to the computation of a centrality-like rank on a local graph, where the scores of the nodes could significantly differ from the ones computed on the global graph. Previous work has studied LRP on the hyperlink graph but never on the BrowseGraph, namely a graph where nodes are webpages and edges are browsing transitions. Recently, this graph has receive… ▽ More

    Submitted 23 May, 2015; originally announced May 2015.

    ACM Class: H.4; E.1

  19. Entity-Linking via Graph-Distance Minimization

    Authors: Roi Blanco, Paolo Boldi, Andrea Marino

    Abstract: Entity-linking is a natural-language-processing task that consists in identifying the entities mentioned in a piece of text, linking each to an appropriate item in some knowledge base; when the knowledge base is Wikipedia, the problem comes to be known as wikification (in this case, items are wikipedia articles). One instance of entity-linking can be formalized as an optimization problem on the un… ▽ More

    Submitted 29 July, 2014; originally announced July 2014.

    Comments: In Proceedings GRAPHITE 2014, arXiv:1407.7671. The second and third authors were supported by the EU-FET grant NADINE (GA 288956)

    ACM Class: G.2.2; G.2.3; F.2.m

    Journal ref: EPTCS 159, 2014, pp. 30-43

  20. arXiv:1211.6496  [pdf, other

    cs.SI cs.AI physics.soc-ph

    TwitterPaul: Extracting and Aggregating Twitter Predictions

    Authors: Naushad UzZaman, Roi Blanco, Michael Matthews

    Abstract: This paper introduces TwitterPaul, a system designed to make use of Social Media data to help to predict game outcomes for the 2010 FIFA World Cup tournament. To this end, we extracted over 538K mentions to football games from a large sample of tweets that occurred during the World Cup, and we classified into different types with a precision of up to 88%. The different mentions were aggregated in… ▽ More

    Submitted 30 November, 2012; v1 submitted 27 November, 2012; originally announced November 2012.

    Comments: Check out the blog post with a summary and Prediction Retrieval information here: http://bitly.com/TwitterPaul