Monday, April 7th |
10h30 - 12h30 |
POST / Room: Makalu Analysis of Cryptographic Protocols (chair: Steve Kremer)
- David Baelde, Stéphanie Delaune and Lucca Hirschi. A Reduced Semantics for Deciding Trace Equivalence using Constraint Systems
- Myrto Arapinis, Jia Liu, Eike Ritter and Mark Ryan. Stateful Applied Pi Calculus
- Michael Backes, Esfandiar Mohammadi and Tim Ruffing. Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity
- David Lubicz, Graham Steel and Marion Daubignard. A Secure Key Management Interface with Asymmetric Cryptography
|
14h00 - 16h00 |
POST / Room: Makalu Quantitative Aspects of Information Flow (chair: Catuscia Palamidessi)
- Annabelle McIver, Carroll Morgan, Geoffrey Smith, Barbara Espinoza and Larissa Meinicke. Abstract Channels and their Robust Information-leakage Ordering (nomination for best paper award)
- Rohit Chadha, Dileep Kini and Mahesh Viswanathan. Quantitative Information Flow in Boolean Programs
- Mario S. Alvim, Fred B. Schneider and Andre Scedrov. When not All Bits are Equal: Worth-based Information Flow
- Florian Arnold, Holger Hermanns, Reza Pulungan and Marielle I A Stoelinga. Time-Dependent Analysis of Attacks
|
16h30 - 18h00 |
POST / Room: Makalu Information Flow Control in Programming Languages (chair: Pierpaolo Degano)
- Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer. Information Flow Control in WebKit’s JavaScript Bytecode
- David Costanzo and Zhong Shao. A Separation Logic for Enforcing Declarative Information Flow Control Policies
- Jed Liu and Andrew Myers. Defining and Enforcing Referential Security
|
Tuesday, April 8th |
14h00 - 15h00 |
Room: Amphitheater POST Invited Speaker (chair: Martín Abadi) David Mazières (Stanford University, US) Security and the Average Programmer |
15h00 - 16h00 |
POST / Room: Cervin Cryptography in Implementations (chair: Riccardo Focardi)
- Ralf Kuesters, Enrico Scapin, Tomasz Truderung and Juergen Graf. Extending and Applying a Framework for the Cryptographic Verification of Java Programs
- Manuel Barbosa, David Castro and Paulo Silva. Compiling CAO: from Cryptographic Specifications to C Implementations
|
16h30 - 18h00 |
POST / Room: Cervin Policies and Attacks (chair: Andrew Myers)
- Gilles Barthe, Boris Köpf, Laurent Mauborgne and Martin Ochoa. Leakage Resilience against Concurrent Cache Attacks (nomination for best paper award)
- Michael Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe and Cesar Sanchez. Temporal Logics for Hyperproperties
- Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti and David Basin. Decentralized Composite Access Control
|