CSF 2017 Program (Tentative)

CSF 2017: Affiliated workshops Monday, August 21
08:00 - 16:00 Registration @ University Center Corwin Pavilion
09:00 - 18:00 Affiliated workshops: FCS and GraMSec
CSF 2017: Day 1 Tuesday, August 22
08:15 - 16:00 Registration @ University Center Corwin Pavilion
09:00 - 09:10 Opening Remarks
Invited talk I Chair: Steve Chong
09:10 - 10:10 The Protection of Private Information in Machine Learning Systems: Two Recent Approches
Martín Abadi (Google)
Session 1: Security Economics Chair: Steve Chong
10:15 - 10:40 How Shall We Play a Game? A Game-Theoretical Model for Cyber-warfare Games
Tiffany Bao (CMU); Yan Shoshitaishvili, Fish Wang, Christopher Kruegel, Giovanni Vigna (UCSB); David Brumley (CMU)
10:40 - 11:10 Coffee Break @ Lagoon Plaza
Session 2: Information-flow Control Chair: Andrei Sabelfeld
11:10 - 11:35 A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications
Stefano Calzavara (Università Ca' Foscari Venezia); Ilya Grishchenko (TU Wien); Adrien Koutsos (ENS Paris-Saclay); Matteo Maffei (TU Wien)
11:35 - 12:00 Securing Concurrent Lazy Programs Against Information Leakage
Marco Vassena (Chalmers University of Technology); Joachim Breitner (University of Pennsylvania); Alejandro Russo (Chalmers University of Technology)
12:00 - 12:25 Towards a Flow- and Path-Sensitive Information Flow Analysis
Peixuan Li, Danfeng Zhang (Penn State University)
12:25 - 14:00 Lunch Break @ De La Guerra Dining Commons
Session 3: Computer-Aided Cryptography Chair: Peter Schwabe
14:00 - 14:25 Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols
Bruno Blanchet (Inria Paris)
14:25 - 14:50 Mechanizing the Proof of Adaptive, Information-theoretic Security of Cryptographic Protocols in the Random Oracle Model
Alley Stoughton, Mayank Varia (Boston University)
14:50 - 15:15 Formal Computational Unlinkability Proofs of RFID Protocols
Hubert Comon, Adrien Koutsos (LSV, CNRS, ENS Paris-Saclay)
15:15 - 15:45 Coffee Break @ MCC Lobby/Foyer
Invited talk II Chair: Boris Koepf
15:45 - 16:45 Rethinking Large-scale Consensus through Blockchains
Elaine Shi (Cornell University)
18:30 - 21:00 Welcome Dinner @ Santa Cruz Ocean Lawn
(On-Campus between Santa Cruz and Anacapa residence halls)
CSF 2017: Day 2 Wednesday, August 23
08:15 - 13:00 Registration @ University Center Corwin Pavilion
Session 4A: Authentication and Key Management I Chair: Limin Jia
08:45 - 09:10 Formal verification of protocols based on short authenticated strings
Stéphanie Delaune (CNRS/IRISA); Steve Kremer, Ludovic Robin (LORIA, CNRS & Inria Nancy & Université de Lorraine)
09:10 - 09:35 Secure composition of PKIs with public key protocols
Vincent Cheval (INRIA, LORIA, France); Véronique Cortier (CNRS, LORIA, France); Bogdan Warinschi (University of Bristol, United Kingdom)
09:35 - 10:00 Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Alexandra Boldyreva, Shan Chen (Georgia Institute of Technology); Pierre-Alain Dupont (DGA, CNRS, Inria, ENS/PSL Research University); David Pointcheval (CNRS, Inria, ENS/PSL Research University)
Session 4B: Authentication and Key Management II Chair: Stéphanie Delaune
10:05 - 10:30 Run-time Attack Detection in Cryptographic APIs
Riccardo Focardi, Marco Squarcina (Università Ca' Foscari and Cryptosense)
10:30 - 10:55 The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines
Daniel Fett, Ralf Küsters, Guido Schmitz (University of Stuttgart)
10:55 - 11:25 Coffee Break @ Lagoon Plaza
Invited talk III (joint with CRYPTO) Chair: Pedro Adão
11:25 - 12:25 Deploying cryptographically-verified components for the HTTPS ecosystem
Cédric Fournet (Microsoft Research)
12:25 - 13:45 Lunch Break @ De La Guerra Dining Commons
Session 5: 5-minute Talks Chair: Geoffrey Smith
13:45 - 15:00 Security Is a Game
Tiffany Bao
The Applied Pi Calculus... with Proofs
Bruno Blanchet
We are Family: Relating Information-Flow Trackers
Andrei Sabelfeld
A Type System for Privacy Properties
Joseph Lallemand
Typing for Stateful Systems
Sebastian Moedersheim
3 Problems for E-voting on untrusted devices
Sergiu Bursuc
Principles of Secure Compilation
Marco Patrignani
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes
Limin Jia
Maude-NPA 3.0
Catherine Meadows
Reconciling Database Access Control and Information-flow Control
Marco Guarnieri
Security of Rest APIs
Pedro Adao
Recent Advances in Decentralized Security Research Management
Stephen Chong
CSF 2017: Day 3 Thursday, August 24
Session 6: Security Protocols Chair: Cathy Meadows
09:00 - 09:25 Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Kevin Milner, Cas Cremers (University of Oxford); Jiangshan Yu (University of Luxembourg); Mark Ryan (University of Birmingham)
09:25 - 09:50 Local UC-Secure Public-Key Encryption
Jan Camenisch, Anja Lehmann, Gregory Neven (IBM Research - Zurich); Kai Samelin (IBM Research - Zurich & TU Darmstadt)
09:50 - 10:15 Symbolic verification of privacy-type properties for security protocols with XOR
David Baelde (LSV, CNRS & ENS Paris-Saclay, Université Paris-Saclay, Inria Paris); Stéphanie Delaune (IRISA, CNRS); Ivan Gazeau, Steve Kremer (LORIA, INRIA Nancy, Grand-Est)
10:15 - 10:45 Coffee Break @ Lagoon Plaza
Session 7: Privacy Chair: Deepak Garg
10:45 - 11:10 Differential Privacy in Quantum Computation
Li Zhou (Dept. of Computer Science and Technology, Tsinghua University, China; CQSI, FEIT, University of Technology Sydney, Australia); Mingsheng Ying (Dept. of Computer Science and Technology, Tsinghua University, China; CQSI, FEIT, University of Technology Sydney, Australia; SKLCS, Institute of Software, Chinese Academy of Sciences, China)
11:10 - 11:35 Renyi Differential Privacy
Ilya Mironov (Google)
11:35 - 12:00 PrivatePool: Privacy-Preserving Ridesharing
Per Hallgren (Chalmers University of Technology); Claudio Orlandi (Aarhus University); Andrei Sabelfeld (Chalmers University of Technology)
12:00 - 12:25 Reconciling Privacy and Utility in Continuous-Time Diffusion Networks
Michael Backes (CISPA, Saarland University); Manuel Gomez-Rodriguez (MPI-SWS); Praveen Manoharan, Bartlomiej Surma (CISPA, Saarland University)
12:25 - 13:45 Lunch Break @ De La Guerra Dining Commons
Session 8: Quantitative Information-Flow Analysis Chair: Danfeng Zhang
13:45 - 14:10 Leakage-Minimal Design: Universality, Limitations, and Applications
MHR Khouzani, Pasquale Malacaria (Queen Mary University of London)
14:10 - 14:35 Tight Bounds on Information Leakage from Repeated Independent Runs
David Smith (Princeton University); Geoffrey Smith (Florida International University)
14:35 - 15:00 Synthesis of Adaptive Side-Channel Attacks
Quoc-Sang Phan (Carnegie Mellon University); Lucas Bang (University of California, Santa Barbara); Corina S. Pasareanu (Carnegie Mellon University/ NASA Ames); Pasquale Malacaria (Queen Mary University of London); Tevfik Bultan (University of California, Santa Barbara)
15:00 - 15:25 Securing Databases from Probabilistic Inference
Marco Guarnieri (ETH Zurich); Srdjan Marinovic (The Wireless Registry, Inc.); David Basin (ETH Zurich)
15:25 - 15:45 Coffee Break @ Lagoon Plaza
Session 9: Distributed Systems Chair: Bill Harris
15:45 - 16:10 A Universally Composable Treatment of Network Time.
Aanchal Malhotra, Kyle Hogan (Boston University); Ran Canetti (Boston University, Tel Aviv University); Mayank Varia (Boston University)
16:10 - 16:35 Types for Location and Data Security in Cloud Environments
Ivan Gazeau (LORIA, INRIA Nancy, Grand-Est); Tom Chothia (University of Birmingham); Dominic Duggan (Stevens Inst of Technology, Hoboken, NJ)
CSF Business Meeting Chair: TBD
16:35 - 17:35 Program TBD
17:45 - 19:30 BBQ @ Goleta Beach
Goleta Beach (On-Campus)
CSF 2017: Day 4 Friday, August 25
Session 10A: Security and Compilation Chair: Alejandro Russo
09:00 - 09:25 Secure compilation and hyperproperty preservation
Marco Patrignani, Deepak Garg (MPI-SWS)
09:25 - 09:50 Verified Translation Validation of Static Analyses
Gilles Barthe (IMDEA Software Institute); Sandrine Blazy (IRISA/Université Rennes 1/INRIA); Vincent Laporte (IMDEA Software Institute); David Pichardie (IRISA/ENS Rennes/INRIA); Alix Trieu (IRISA/Université Rennes 1/INRIA)
Session 10B: Embedded and Cyber-physical security Chair: Véronique Cortier
09:55 - 10:20 Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants
Hyoukjun Kwon, William R. Harris, Hadi Esmaeilzadeh (Georgia Institute of Technology)
10:20 - 10:45 A Formal Approach to Cyber-Physical Attacks
Ruggero Lanotte (Universita' Degli Studi dell'Insubria); Massimo Merro, Riccardo Muradore (University of Verona); Luca Viganò (King's College London)
10:45 - 11:15 Coffee Break @ Lagoon Plaza
Session 11: Security Protocols II Chair: Bruno Blanchet
11:15 - 11:40 Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL
Andreas Viktor Hess, Sebastian Mödersheim (DTU)
11:40 - 12:05 Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-bounded Processes
Emanuele D'Osualdo (University of Kaiserslautern); Luke Ong (University of Oxford); Alwen Tiu (Nanyang Technological University, Singapore)
12:05 - 12:30 SAT-Equiv: an efficient tool for equivalence properties
Véronique Cortier (CNRS, LORIA); Antoine Dallon (LSV, ENS Paris-Saclay); Stéphanie Delaune (CNRS, IRISA)
12:30 - ... Lunch @ De La Guerra Dining Commons
Have a safe trip home... See you in Oxford next year