Sections

Program

Sunday, June 26th
19:00 Welcome reception
20:30 Dinner

 

Monday, June 27th, 2011
8:55 - 9:00 Conference Welcome by Michael Backes
9:00 - 10:00
Invited talk chair: Michael Backes
  • Challenges and Solutions in Evaluating Mobile Smartphone Application Security
    Patrick McDaniel
10:00 - 10:30 Coffee break
10:30 - 12:00
Security protocol verification I chair: Cédric Fournet
  • Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols
    François Dupressoir, Andrew D. Gordon, Jan Jürjens and David A. Naumann
  • Integrated Specification and Verification of Security Protocols and Policies
    Simone Frau and Mohammad Torabi Dashti
  • StatVerif: Verification of Stateful Processes
    Myrto Arapinis, Mark Ryan and Eike Ritter
12:00 - 14:00 Lunch
14:00 - 16:00
Information flow chair: Catuscia Palamidessi
  • A Statistical Test for Information Leaks Using Continuous Mutual Information
    Tom Chothia and Apratim Guha
  • Information-theoretic Bounds for Differentially Private Mechanisms
    Gilles Barthe and Boris Köpf
  • The Complexity of Quantitative Information Flow Problems
    Pavol Cerny, Krishnendu Chatterjee and Thomas A. Henzinger
  • Assumptions and Guarantees for Compositional Noninterference
    Heiko Mantel, David Sands and Henning Sudbrock
16:00 - 16:30 Coffee break
16:30 - 17:30
Five Minute Talks chair: Michael Backes 
19:30 Dinner

 

Tuesday, June 28th, 2011
9:00 - 10:00

Security protocol verification IIchair: Nikhil Swamy

  • Automated proofs for Diffie-Hellman-based key exchanges
    Long Ngo, Colin Boyd and Juan Gonzalez Nieto
  • Formal analysis of protocols based on TPM state registers
    Stéphanie Delaune, Steve Kremer, Mark D. Ryan and Graham Steel
10:00 - 10:30 Coffee break
10:30 - 12:30

Security notions and specificationschair: David Basin

  • Vertical Protocol Composition
    Thomas Gross and Sebastian Moedersheim
  • Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)
    Dominique Unruh
  • Security for Key Management Interfaces
    Steve Kremer, Graham Steel and Bogdan Warinschi
  • A formal framework for provenance security
    James Cheney
12:30 - 14:00 Lunch
14:00 - 15:00
Invited talkchair: Steve Zdancewic
  • seL4: Respect my Authority!
    Gerwin Klein
15:00 - 15:30 Coffee break
15:30 - 17:00
Language-based securitychair: Joshua Guttman
  • Modular Protections Against Non-control Data Attacks
    Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker and Benjamin Zorn
  • Static analysis for efficient hybrid information-flow control  
    Scott Moore and Stephen Chong
  • Local Memory via Layout Randomization
    Radha Jagadeesan, Corin Pitcher, Julian Rathke and James Riely
19:30 Dinner

 

Wednesday, June 29th, 2011
9:00 - 10:00
Privacy and anonymitychair: Dominique Unruh
  • Attacking and fixing Helios: An analysis of ballot secrecy
    Ben Smyth and Véronique Cortier
  • Regret Minimizing Audits: A Learning-theoretic Basis for Privacy Protection
    Jeremiah Blocki, Nicolas Christin, Anupam Datta and Arunesh Sinha
10:00 - 10:30 Coffee break
10:30 - 12:00
Authorization and security policies chair: Michael Clarkson
  • Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols
    Michele Bugliesi, Stefano Calzavara, Fabienne Eigner and Matteo Maffei
  • Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives
    David Basin, Samuel J. Burri and Günter Karjoth
  • Dynamic Enforcement of Knowledge-based Security Policies
    Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivatsa
12:00 - 12:15 Program Chairs' report and conference close
12:15 - 14:00 Lunch

 

Document Actions