Tuesday, June 28th, 2011 |
9:00 - 10:00 | Security protocol verification II | chair: Nikhil Swamy |
- Automated proofs for Diffie-Hellman-based key exchanges
Long Ngo, Colin Boyd and Juan Gonzalez Nieto - Formal analysis of protocols based on TPM state registers
Stéphanie Delaune, Steve Kremer, Mark D. Ryan and Graham Steel
|
10:00 - 10:30 | Coffee break |
10:30 - 12:30 | Security notions and specifications | chair: David Basin |
- Vertical Protocol Composition
Thomas Gross and Sebastian Moedersheim - Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)
Dominique Unruh - Security for Key Management Interfaces
Steve Kremer, Graham Steel and Bogdan Warinschi - A formal framework for provenance security
James Cheney
|
12:30 - 14:00 | Lunch |
14:00 - 15:00 | Invited talk | chair: Steve Zdancewic |
- seL4: Respect my Authority!
Gerwin Klein
|
15:00 - 15:30 | Coffee break |
15:30 - 17:00 | Language-based security | chair: Joshua Guttman |
- Modular Protections Against Non-control Data Attacks
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker and Benjamin Zorn - Static analysis for efficient hybrid information-flow control
Scott Moore and Stephen Chong - Local Memory via Layout Randomization
Radha Jagadeesan, Corin Pitcher, Julian Rathke and James Riely
|
19:30 | Dinner |