CSF 2017: Affiliated workshops | Monday, August 21 |
08:00 - 16:00 | Registration @ University Center Corwin Pavilion |
09:00 - 18:00 | Affiliated workshops:
FCS and
GraMSec |
CSF 2017: Day 1 | Tuesday, August 22 |
08:15 - 16:00 | Registration @ University Center Corwin Pavilion |
09:00 - 09:10 | Opening Remarks |
Invited talk I | Chair: Steve Chong |
09:10 - 10:10 | The Protection of Private Information in Machine Learning Systems: Two Recent Approches Martín Abadi (Google) |
Session 1: Security Economics | Chair: Steve Chong |
10:15 - 10:40 | How Shall We Play a Game? A Game-Theoretical Model for Cyber-warfare Games Tiffany Bao (CMU); Yan Shoshitaishvili, Fish Wang, Christopher Kruegel, Giovanni Vigna (UCSB); David Brumley (CMU) |
10:40 - 11:10 | Coffee Break @ Lagoon Plaza |
Session 2: Information-flow Control | Chair: Andrei Sabelfeld |
11:10 - 11:35 | A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications Stefano Calzavara (Università Ca' Foscari Venezia); Ilya Grishchenko (TU Wien); Adrien Koutsos (ENS Paris-Saclay); Matteo Maffei (TU Wien) |
11:35 - 12:00 | Securing Concurrent Lazy Programs Against Information Leakage Marco Vassena (Chalmers University of Technology); Joachim Breitner (University of Pennsylvania); Alejandro Russo (Chalmers University of Technology) |
12:00 - 12:25 | Towards a Flow- and Path-Sensitive Information Flow Analysis Peixuan Li, Danfeng Zhang (Penn State University) |
12:25 - 14:00 | Lunch Break @ De La Guerra Dining Commons |
Session 3: Computer-Aided Cryptography | Chair: Peter Schwabe |
14:00 - 14:25 | Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols Bruno Blanchet (Inria Paris) |
14:25 - 14:50 | Mechanizing the Proof of Adaptive, Information-theoretic Security of Cryptographic Protocols in the Random Oracle Model Alley Stoughton, Mayank Varia (Boston University) |
14:50 - 15:15 | Formal Computational Unlinkability Proofs of RFID Protocols Hubert Comon, Adrien Koutsos (LSV, CNRS, ENS Paris-Saclay) |
15:15 - 15:45 | Coffee Break @ MCC Lobby/Foyer |
Invited talk II | Chair: Boris Koepf |
15:45 - 16:45 | Rethinking Large-scale Consensus through Blockchains Elaine Shi (Cornell University) |
18:30 - 21:00 | Welcome Dinner @ Santa Cruz Ocean Lawn (On-Campus between Santa Cruz and Anacapa residence halls) |
CSF 2017: Day 2 | Wednesday, August 23 |
08:15 - 13:00 | Registration @ University Center Corwin Pavilion |
Session 4A: Authentication and Key Management I | Chair: Limin Jia |
08:45 - 09:10 | Formal verification of protocols based on short authenticated strings Stéphanie Delaune (CNRS/IRISA); Steve Kremer, Ludovic Robin (LORIA, CNRS & Inria Nancy & Université de Lorraine) |
09:10 - 09:35 | Secure composition of PKIs with public key protocols Vincent Cheval (INRIA, LORIA, France); Véronique Cortier (CNRS, LORIA, France); Bogdan Warinschi (University of Bristol, United Kingdom) |
09:35 - 10:00 | Human Computing for Handling Strong Corruptions in Authenticated Key Exchange Alexandra Boldyreva, Shan Chen (Georgia Institute of Technology); Pierre-Alain Dupont (DGA, CNRS, Inria, ENS/PSL Research University); David Pointcheval (CNRS, Inria, ENS/PSL Research University) |
Session 4B: Authentication and Key Management II | Chair: Stéphanie Delaune |
10:05 - 10:30 | Run-time Attack Detection in Cryptographic APIs Riccardo Focardi, Marco Squarcina (Università Ca' Foscari and Cryptosense) |
10:30 - 10:55 | The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines Daniel Fett, Ralf Küsters, Guido Schmitz (University of Stuttgart) |
10:55 - 11:25 | Coffee Break @ Lagoon Plaza |
Invited talk III (joint with CRYPTO) | Chair: Pedro Adão |
11:25 - 12:25 | Deploying cryptographically-verified components for the HTTPS ecosystem Cédric Fournet (Microsoft Research) |
12:25 - 13:45 | Lunch Break @ De La Guerra Dining Commons |
Session 5: 5-minute Talks | Chair: Geoffrey Smith |
13:45 - 15:00 | Security Is a Game Tiffany Bao |
The Applied Pi Calculus... with Proofs Bruno Blanchet |
|
We are Family: Relating Information-Flow Trackers Andrei Sabelfeld |
|
A Type System for Privacy Properties Joseph Lallemand |
|
Typing for Stateful Systems Sebastian Moedersheim |
|
3 Problems for E-voting on untrusted devices Sergiu Bursuc |
|
Principles of Secure Compilation Marco Patrignani |
|
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes Limin Jia |
|
Maude-NPA 3.0 Catherine Meadows |
|
Reconciling Database Access Control and Information-flow Control Marco Guarnieri |
|
Security of Rest APIs Pedro Adao |
|
Recent Advances in Decentralized Security Research Management Stephen Chong |
|
CSF 2017: Day 3 | Thursday, August 24 |
Session 6: Security Protocols | Chair: Cathy Meadows |
09:00 - 09:25 | Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications Kevin Milner, Cas Cremers (University of Oxford); Jiangshan Yu (University of Luxembourg); Mark Ryan (University of Birmingham) |
09:25 - 09:50 | Local UC-Secure Public-Key Encryption Jan Camenisch, Anja Lehmann, Gregory Neven (IBM Research - Zurich); Kai Samelin (IBM Research - Zurich & TU Darmstadt) |
09:50 - 10:15 | Symbolic verification of privacy-type properties for security protocols with XOR David Baelde (LSV, CNRS & ENS Paris-Saclay, Université Paris-Saclay, Inria Paris); Stéphanie Delaune (IRISA, CNRS); Ivan Gazeau, Steve Kremer (LORIA, INRIA Nancy, Grand-Est) |
10:15 - 10:45 | Coffee Break @ Lagoon Plaza |
Session 7: Privacy | Chair: Deepak Garg |
10:45 - 11:10 | Differential Privacy in Quantum Computation Li Zhou (Dept. of Computer Science and Technology, Tsinghua University, China; CQSI, FEIT, University of Technology Sydney, Australia); Mingsheng Ying (Dept. of Computer Science and Technology, Tsinghua University, China; CQSI, FEIT, University of Technology Sydney, Australia; SKLCS, Institute of Software, Chinese Academy of Sciences, China) |
11:10 - 11:35 | Renyi Differential Privacy Ilya Mironov (Google) |
11:35 - 12:00 | PrivatePool: Privacy-Preserving Ridesharing Per Hallgren (Chalmers University of Technology); Claudio Orlandi (Aarhus University); Andrei Sabelfeld (Chalmers University of Technology) |
12:00 - 12:25 | Reconciling Privacy and Utility in Continuous-Time Diffusion Networks Michael Backes (CISPA, Saarland University); Manuel Gomez-Rodriguez (MPI-SWS); Praveen Manoharan, Bartlomiej Surma (CISPA, Saarland University) |
12:25 - 13:45 | Lunch Break @ De La Guerra Dining Commons |
Session 8: Quantitative Information-Flow Analysis | Chair: Danfeng Zhang |
13:45 - 14:10 | Leakage-Minimal Design: Universality, Limitations, and Applications MHR Khouzani, Pasquale Malacaria (Queen Mary University of London) |
14:10 - 14:35 | Tight Bounds on Information Leakage from Repeated Independent Runs David Smith (Princeton University); Geoffrey Smith (Florida International University) |
14:35 - 15:00 | Synthesis of Adaptive Side-Channel Attacks Quoc-Sang Phan (Carnegie Mellon University); Lucas Bang (University of California, Santa Barbara); Corina S. Pasareanu (Carnegie Mellon University/ NASA Ames); Pasquale Malacaria (Queen Mary University of London); Tevfik Bultan (University of California, Santa Barbara) |
15:00 - 15:25 | Securing Databases from Probabilistic Inference Marco Guarnieri (ETH Zurich); Srdjan Marinovic (The Wireless Registry, Inc.); David Basin (ETH Zurich) |
15:25 - 15:45 | Coffee Break @ Lagoon Plaza |
Session 9: Distributed Systems | Chair: Bill Harris |
15:45 - 16:10 | A Universally Composable Treatment of Network Time. Aanchal Malhotra, Kyle Hogan (Boston University); Ran Canetti (Boston University, Tel Aviv University); Mayank Varia (Boston University) |
16:10 - 16:35 | Types for Location and Data Security in Cloud Environments Ivan Gazeau (LORIA, INRIA Nancy, Grand-Est); Tom Chothia (University of Birmingham); Dominic Duggan (Stevens Inst of Technology, Hoboken, NJ) |
CSF Business Meeting | Chair: TBD |
16:35 - 17:35 | Program TBD |
17:45 - 19:30 | BBQ @ Goleta Beach Goleta Beach (On-Campus) |
CSF 2017: Day 4 | Friday, August 25 |
Session 10A: Security and Compilation | Chair: Alejandro Russo |
09:00 - 09:25 | Secure compilation and hyperproperty preservation Marco Patrignani, Deepak Garg (MPI-SWS) |
09:25 - 09:50 | Verified Translation Validation of Static Analyses Gilles Barthe (IMDEA Software Institute); Sandrine Blazy (IRISA/Université Rennes 1/INRIA); Vincent Laporte (IMDEA Software Institute); David Pichardie (IRISA/ENS Rennes/INRIA); Alix Trieu (IRISA/Université Rennes 1/INRIA) |
Session 10B: Embedded and Cyber-physical security | Chair: Véronique Cortier |
09:55 - 10:20 | Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants Hyoukjun Kwon, William R. Harris, Hadi Esmaeilzadeh (Georgia Institute of Technology) |
10:20 - 10:45 | A Formal Approach to Cyber-Physical Attacks Ruggero Lanotte (Universita' Degli Studi dell'Insubria); Massimo Merro, Riccardo Muradore (University of Verona); Luca Viganò (King's College London) |
10:45 - 11:15 | Coffee Break @ Lagoon Plaza |
Session 11: Security Protocols II | Chair: Bruno Blanchet |
11:15 - 11:40 | Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL Andreas Viktor Hess, Sebastian Mödersheim (DTU) |
11:40 - 12:05 | Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-bounded Processes Emanuele D'Osualdo (University of Kaiserslautern); Luke Ong (University of Oxford); Alwen Tiu (Nanyang Technological University, Singapore) |
12:05 - 12:30 | SAT-Equiv: an efficient tool for equivalence properties Véronique Cortier (CNRS, LORIA); Antoine Dallon (LSV, ENS Paris-Saclay); Stéphanie Delaune (CNRS, IRISA) |
12:30 - ... | Lunch @ De La Guerra Dining Commons |
Have a safe trip home... See you in Oxford next year |