Pedro Adão

Orcid: 0000-0002-4049-1954

According to our database1, Pedro Adão authored at least 25 papers between 2005 and 2023.

Collaborative distances:



In proceedings 
PhD thesis 


Online presence:



Toward Tool-Independent Summaries for Symbolic Execution (Artifact).
Dagstuhl Artifacts Ser., 2023

Cookie Crumbles: Breaking and Fixing Web Session Integrity.
Proceedings of the 32nd USENIX Security Symposium, 2023

Toward Tool-Independent Summaries for Symbolic Execution.
Proceedings of the 37th European Conference on Object-Oriented Programming, 2023

Concolic Execution for WebAssembly (Artifact).
Dagstuhl Artifacts Ser., 2022

Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Concolic Execution for WebAssembly.
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022

A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL.
Proceedings of the Logic, 2020

Securing Electronic Health Records in the Cloud.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018

Localizing Firewall Security Policies.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete.
Theor. Comput. Sci., 2014

Hybrid learning of Bayesian multinets for binary classification.
Pattern Recognit., 2014

Oblivious transfer based on quantum state computational distinguishability.
CoRR, 2014

Mignis: A Semantic Based Tool for Firewall Configuration.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Type-Based Analysis of Generic Key Management APIs (Long Version).
IACR Cryptol. ePrint Arch., 2013

Efficient Approximation of the Conditional Relative Entropy with Applications to Discriminative Learning of Bayesian Network Classifiers.
Entropy, 2013

Type-Based Analysis of Generic Key Management APIs.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch., 2012

Computationally Complete Symbolic Attacker in Action.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2012

Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage.
J. Comput. Secur., 2009

Towards a Quantitative Analysis of Security Protocols.
Proceedings of the 4th International Workshop on Quantitative Aspects of Programming Languages, 2006

Cryptographically Sound Implementations for Communicating Processes.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

A Process Algebra for Reasoning About Quantum Security.
Proceedings of the 3rd International Workshop on Quantum Programming Languages, 2005

Soundness of Formal Encryption in the Presence of Key-Cycles.
Proceedings of the Computer Security, 2005

Computational and Information-Theoretic Soundness and Completeness of Formal Encryption.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005