Manuel Maarek

Manuel Maarek
Heriot-Watt University · Department of Computer Science

About

42
Publications
3,885
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
177
Citations
Citations since 2017
16 Research Items
29 Citations
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
Additional affiliations
January 2002 - present

Publications

Publications (42)
Article
Bitcoin and other cryptocurrencies are well-known for their privacy properties that allow for the “anonymous” exchange of money. Bitcoin tracking with taint analysis remains challenging as it does not account for the change in Bitcoins' ownership or the usage of Privacy-Enhancing Technologies (PETs) to obscure Bitcoins' movement, and often produces...
Chapter
Mixer services purportedly remove all connections between the input (deposited) Bitcoins and the output (withdrawn) mixed Bitcoins, seemingly rendering taint analysis tracking ineffectual. In this paper, we introduce and explore a novel tracking strategy, called Address Taint Analysis, that adapts from existing transaction-based taint analysis tech...
Preprint
Full-text available
Mixer services purportedly remove all connections between the input (deposited) Bitcoins and the output (withdrawn) mixed Bitcoins, seemingly rendering taint analysis tracking ineffectual. In this paper, we introduce and explore a novel tracking strategy, called \emph{Address Taint Analysis}, that adapts from existing transaction-based taint analys...
Preprint
As part of formative and summative assessments in programming courses, students work on developing programming artifacts following a given specification. These artifacts are evaluated by the teachers. At the end of this evaluation, the students receive feedback and marks. Providing feedback on programming artifacts is time demanding and could make...
Conference Paper
Full-text available
Rapid advancement in Web technologies has seen a shift from the use and implementation of closed applications to open information sharing in the form of Web APIs (Application Programming Interface). Developers make use of Web APIs by integrating them into their Web and mobile applications. These APIs however, come with Terms of Service (ToS) and Pr...
Preprint
Full-text available
Since the first theft of the Mt.Gox exchange service in 2011, Bitcoin has seen major thefts in subsequent years. For most thefts, the perpetrators remain uncaught and unknown. Although every transaction is recorded and transparent in the blockchain, thieves can hide behind pseudonymity and use transaction obscuring techniques to disguise their tran...
Article
Full-text available
Offering timely feedback on programming while encouraging learners to engage in critical evaluation of programs are the objectives of peer-testing. We report on a peer-testing experiment with students on distant campuses using a Web platform. The experiment shows the potential that peer-testing has to help students transition from passive learners...
Conference Paper
Approaches to the safety analysis of software-intensive systems are being adapted to also provide security assurance. Extensions have been proposed to reflect the specific nature of security analysis by introducing intention as a causal factor to reaching unsafe state of the system, or by introducing new layers in the system modelling to model its...
Article
Full-text available
In this paper we present our experience in developing a security application using a typed functional language. We describe how the formal grounding of its semantic and compiler have allowed for a trustworthy development and have facilitated the fulfillment of the security specification.
Article
This paper reports on the results of a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools to (1) define software liability in a precise and unambiguous way and (2) establish such liability in case of incident. The overall approach taken in the project is presented through an el...
Article
Full-text available
LISE is a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools to (1) dene software liability in a precise and unambiguous way and (2) establish such liability in case of incident. This paper provides an overview of the overall approach taken in the project based on a case study....
Conference Paper
Full-text available
Methods for computerised mathematics have found little appeal among mathematicians because they call for additional skills which are not available to the typical mathematician. We herein propose to reconcile computerised mathematics to mathematicians by restoring natural language as the primary medium for mathematical authoring. Our method associat...
Conference Paper
Full-text available
There are many styles for the narrative structure of a mathematical document. Each mathematician has its own conventions and traditions about labeling portions of texts (e.g., chapter, section, theorem or proof ) and identifying statements according to their logical importance (e.g., theorem is more important than lemma). Such narrative/structuring...
Article
Full-text available
Due to a strict page limit for MKM 2007, it was necessary to remove the appendix from the paper (3) and instead provide its contents through an alternative medium. Distributed on the respective web sites of the paper's authors, the contents are reproduced in this document. The reader will find herein an example in which the method of the above ment...
Article
Full-text available
We explain in this paper the gradual computerisation process of an ordinary mathematical text into more formal versions ending with a fully formalised Mizar text. The process is part of the MathLang-Mizar project and is divided into a number of steps (called aspects). The first three aspects (CGa, TSa and DRa) are the same for any MathLang-TP proje...
Conference Paper
Full-text available
Computerizing mathematical texts to allow software access to some or all of the texts’ semantic content is a long and tedious process that currently requires much expertise. We believe it is useful to support computerization that adds some structural and semantic information, but does not require jumping directly from the word-processing level (e.g...
Conference Paper
Full-text available
This paper reports on refinements and extensions to the MathLang framework that add substantial support for natural language text. We show how the extended framework supports multiple views of mathematical texts, including natural language views using the exact text that the mathematician wants to use. Thus, MathLang now supports the ability to cap...
Article
Full-text available
In this paper we report on the design of a new mathematical language and our method of designing it, driven by the encoding of mathematical texts. MathLang is intended to provide support for checking basic well-formedness of mathematical text without requiring the heavy and diffcult-to- use machinery of full type theory or other forms of full forma...
Article
Full-text available
FoC is a computer algebra library with a strong emphasis on formal certi cation of its algorithms. We present in this article our work on the link between the FoC language and OMDoc, an emerging XML standard to represent and share mathematical contents. On the one hand, we focus on the elaboration of the documentation system FoCDoc. After an analys...
Article
syntax. The MathLang abstract syntax (that is to say the way we represent MathLang data) is de ned in the following sections. The abstract syntax will only be used in the WTC The Backus-Naur form (BNF) is a metasyntax to formally describe languages.
Article
Full-text available
In only few decades, computers have changed the way we approach docu- ments. Throughout history, mathematicians and philosophers had clari- fied the relationship between mathematical thoughts and their textual and symbolic representations. We discuss here the consequences of computer- based formalisation for mathematical authoring habits and we pre...

Network

Cited By