POST 2014 Programme

Monday, April 7th
10h30 - 12h30 POST / Room: Makalu
Analysis of Cryptographic Protocols (chair: Steve Kremer)
  • David Baelde, Stéphanie Delaune and Lucca Hirschi. A Reduced Semantics for Deciding Trace Equivalence using Constraint Systems
  • Myrto Arapinis, Jia Liu, Eike Ritter and Mark Ryan. Stateful Applied Pi Calculus
  • Michael Backes, Esfandiar Mohammadi and Tim Ruffing. Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity
  • David Lubicz, Graham Steel and Marion Daubignard. A Secure Key Management Interface with Asymmetric Cryptography
14h00 - 16h00 POST / Room: Makalu
Quantitative Aspects of Information Flow (chair: Catuscia Palamidessi)
  • Annabelle McIver, Carroll Morgan, Geoffrey Smith, Barbara Espinoza and Larissa Meinicke. Abstract Channels and their Robust Information-leakage Ordering (nomination for best paper award)
  • Rohit Chadha, Dileep Kini and Mahesh Viswanathan. Quantitative Information Flow in Boolean Programs
  • Mario S. Alvim, Fred B. Schneider and Andre Scedrov. When not All Bits are Equal: Worth-based Information Flow
  • Florian Arnold, Holger Hermanns, Reza Pulungan and Marielle I A Stoelinga. Time-Dependent Analysis of Attacks
16h30 - 18h00 POST / Room: Makalu
Information Flow Control in Programming Languages (chair: Pierpaolo Degano)
  • Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer. Information Flow Control in WebKit’s JavaScript Bytecode
  • David Costanzo and Zhong Shao. A Separation Logic for Enforcing Declarative Information Flow Control Policies
  • Jed Liu and Andrew Myers. Defining and Enforcing Referential Security
Tuesday, April 8th
14h00 - 15h00 Room: Amphitheater
POST Invited Speaker (chair: Martín Abadi)
David Mazières (Stanford University, US)
Security and the Average Programmer
15h00 - 16h00 POST / Room: Cervin
Cryptography in Implementations (chair: Riccardo Focardi)
  • Ralf Kuesters, Enrico Scapin, Tomasz Truderung and Juergen Graf. Extending and Applying a Framework for the Cryptographic Verification of Java Programs
  • Manuel Barbosa, David Castro and Paulo Silva. Compiling CAO: from Cryptographic Specifications to C Implementations
16h30 - 18h00 POST / Room: Cervin
Policies and Attacks (chair: Andrew Myers)
  • Gilles Barthe, Boris Köpf, Laurent Mauborgne and Martin Ochoa. Leakage Resilience against Concurrent Cache Attacks (nomination for best paper award)
  • Michael Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe and Cesar Sanchez. Temporal Logics for Hyperproperties
  • Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti and David Basin. Decentralized Composite Access Control

Who's online

We have 3 guests and no members online

Site Hosted by