Program of CSF

Saturday, July 17th

Saturday's program is also available with abstracts and side by side with other events.

09:00‑10:00 Hewlett-Packard Security Lecture
Chair: Andrew Myers
Location: AT LT2
09:00 Andrew Myers
Conference welcome
09:05 Vitaly Shmatikov (University of Texas, Austin)
The end of anonymity, the beginning of privacy
10:30‑12:30 Quantitative Security
Chair: Michael Backes
Location: AT LT2
10:30 Boris Köpf and Andrey Rybalchenko
Approximation and randomization for quantitative information-flow analysis
11:00 Hirotoshi Yasuoka and Tachio Terauchi
Quantitative information flow - verification hardness and possibilities
11:30 Michael Clarkson and Fred Schneider
Quantification of integrity
12:00 Boris Köpf and Geoffrey Smith
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
14:00‑15:00 Security Protocol Verification I
Chair: Bruno Blanchet
Location: AT LT2
14:00 Mathilde Arnaud, Véronique Cortier and Stephanie Delaune
Modeling and verifying ad hoc routing protocols
14:30 Mayla Bruso, Konstantinos Chatzikokolakis and Jerry den Hartog
Formal verification of privacy for RFID systems
15:30‑17:00 Privacy and Anonymity
Chair: Vitaly Shmatikov
Location: AT LT2
15:30 Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk and Bogdan Warinschi
Robustness guarantees for anonymity
16:00 Myrto Arapinis, Tom Chothia, Eike Ritter and Mark Ryan
Analysing unlinkability and anonymity using the applied pi-calculus
16:30 Ralf Kuesters, Tomasz Truderung and Andreas Vogt
A game-based definition of coercion-resistance and its applications
17:00‑18:00 Five-Minute Talks
Chair: Stephen Chong
Location: AT LT2
17:00 List of talks at
Sunday, July 18th

Sunday's program is also available with abstracts and side by side with other events.

09:00‑10:00 Authorization
Chair: Andrew Gordon
Location: AT LT2
09:00 Adam Lee and Ting Yu
On the quantitative analysis of proofs of authorization: applications, framework, and techniques
09:30 Lujo Bauer, Limin Jia and Divya Sharma
Towards precise specification of logic-based access-control policies
10:30‑12:30 Information Flow
Chair: David Sands
Location: AT LT2
10:30 Moritz Y. Becker
Information flow in credential systems
11:00 Alejandro Russo and Andrei Sabelfeld
Dynamic vs. static flow-sensitive security analysis
11:30 Andrey Chudnov and David Naumann
Information flow monitor inlining
12:00 Stephen Chong
Required information release
14:00‑15:00 FLoC Keynote Talk: Deepak Kapur
Location: George Square Lecture Theatre
14:00 Deepak Kapur (University of New Mexico)
Induction, Invariants, and Abstraction
15:30‑17:00 Security Protocol Verification II
Chair: Mark Ryan
Location: AT LT2
15:30 Simon Meier, Cas Cremers and David Basin
Strong invariants for the efficient construction of machine-checked protocol security proofs
16:00 Santiago Zanella Béguelin, Gilles Barthe, Sylvain Heraud, Benjamin Grégoire and Daniel Hedin
A machine-checked formalization of sigma-protocols
16:30 Benedikt Schmidt, Patrick Schaller and David Basin
Impossibility results for secret establishment
Monday, July 19th

Monday's program is also available with abstracts and side by side with other events.

09:00‑10:00 Security Specifications
Chair: Jon Millen
Location: AT LT2
09:00 Juan Garay, Aggelos Kiayias and Hong-Sheng Zhou
A framework for the sound specification of cryptographic tasks
09:30 Devdatta Akhawe, Adam Barth, Peifung Lam, John Mitchell and Dawn Song
Towards a formal foundation of web security
10:30‑12:15 Language-Based Security
Chair: Matteo Maffei
Location: AT LT2
10:30 Alwen Tiu and Jeremy Dawson
Automating open bisimulation checking for the spi-calculus
11:00 Stefan Ciobaca and Veronique Cortier
Protocol composition for arbitrary primitives
11:30 Martin Abadi and Gordon Plotkin
On protection by layout randomization
12:00 Andrew Myers and Michael Backes
Program chairs' report and conference close