Estimating Hidden Bug Count — Part 3/3
Part 1: Introduction and Basic Theory > Part 2: Accounting for Bug Fixes > Part 4: Step By Step Guide This is just a summary of the previous chapters as a flow chart (click here for…
Ironclad
An Ironclad App lets a user securely transmit her data to a remote machine with the guarantee that every instruction executed on that machine adheres to a formal abstract specification of the app’s behavior. This…
Estimating Hidden Bug Count — Part 2/3
Part 1: Introduction and Basic Theory > Part 3: Harsh Reality That simple logic is nice, but practice makes it questionable for at least two reasons: Bugs found by either of the parties are fixed.…
Estimating Hidden Bug Count — Part 1/3
Part 1: Introduction Probably every piece of software has some defects in it. Known defects (also called bugs) are found by manufacturers and users and fixed. Unknown ones remain there, waiting to be discovered some…
Weak Instances of PLWE
Zero-Effort Payments
Zero-Effort Payments (ZEP) is a seamless mobile computing system designed to accept payments with no effort on the customer’s part beyond a one-time opt-in. With ZEP, customers need not present cards nor operate smartphones to…
Konstantinos Vamvourellis talks about his stint at MSR India
Konstantinos is a PhD student in CSE at City University of New York. He is interested is research areas such as Cryptography and Privacy and worked with two groups at MSR India: Algorithms and Data…