Pedro Adão

Orcid: 0000-0002-4049-1954

According to our database1, Pedro Adão authored at least 27 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Web Platform Threats: Automated Detection of Web Security Issues With WPT.
Proceedings of the 33rd USENIX Security Symposium, 2024

Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization Techniques.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Toward Tool-Independent Summaries for Symbolic Execution (Artifact).
Dagstuhl Artifacts Ser., 2023

Cookie Crumbles: Breaking and Fixing Web Session Integrity.
Proceedings of the 32nd USENIX Security Symposium, 2023

Toward Tool-Independent Summaries for Symbolic Execution.
Proceedings of the 37th European Conference on Object-Oriented Programming, 2023

2022
Concolic Execution for WebAssembly (Artifact).
Dagstuhl Artifacts Ser., 2022

Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Concolic Execution for WebAssembly.
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022

2021
A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

2020
Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL.
Proceedings of the Logic, 2020

2018
Securing Electronic Health Records in the Cloud.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018

2016
Localizing Firewall Security Policies.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2014
Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete.
Theor. Comput. Sci., 2014

Hybrid learning of Bayesian multinets for binary classification.
Pattern Recognit., 2014

Oblivious transfer based on quantum state computational distinguishability.
CoRR, 2014

Mignis: A Semantic Based Tool for Firewall Configuration.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2013
Type-Based Analysis of Generic Key Management APIs (Long Version).
IACR Cryptol. ePrint Arch., 2013

Efficient Approximation of the Conditional Relative Entropy with Applications to Discriminative Learning of Bayesian Network Classifiers.
Entropy, 2013

Type-Based Analysis of Generic Key Management APIs.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

2012
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch., 2012

Computationally Complete Symbolic Attacker in Action.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2012

2009
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage.
J. Comput. Secur., 2009

2006
Towards a Quantitative Analysis of Security Protocols.
Proceedings of the 4th International Workshop on Quantitative Aspects of Programming Languages, 2006

Cryptographically Sound Implementations for Communicating Processes.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

2005
A Process Algebra for Reasoning About Quantum Security.
Proceedings of the 3rd International Workshop on Quantum Programming Languages, 2005

Soundness of Formal Encryption in the Presence of Key-Cycles.
Proceedings of the Computer Security, 2005

Computational and Information-Theoretic Soundness and Completeness of Formal Encryption.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005


  Loading...