FLOC 2018: FEDERATED LOGIC CONFERENCE 2018
CSF PROGRAM

Days: Monday, July 9th Tuesday, July 10th Wednesday, July 11th Thursday, July 12th

Monday, July 9th

View this program: with abstractssession overviewtalk overviewside by side with other conferences

10:30-11:00Coffee Break
11:00-12:30 Session 45A: Security protocols I
Location: Maths LT2
11:00
An extensive formal analysis of multi-factor authentication protocols (abstract)
11:30
Composition Theorems for CryptoVerif and Application to TLS 1.3 (abstract)
12:00
A Cryptographic Look at Multi-Party Channels (abstract)
12:30-14:00Lunch Break
14:00-15:00 Session 47A: CSF Invited Talk: Srini Devadas
Location: Maths LT2
14:00
Sanctum: Towards an Open-Source, Formally Verified Secure Processor (abstract)
15:00-15:30 Session 48A: Attack trees
Location: Maths LT2
15:00
Guided design of attack trees: a system-based approach (abstract)
15:30-16:00Coffee Break
19:00-21:30 FLoC reception at Ashmolean Museum

FLoC reception at Ashmolean Museum. Drinks and canapés available from 7pm (pre-booking via FLoC registration system required; guests welcome).

Tuesday, July 10th

View this program: with abstractssession overviewtalk overviewside by side with other conferences

09:00-10:30 Session 50A: Cryptographic primitives
Location: Maths LT2
09:00
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks (abstract)
09:30
Formal Security Proof of CMAC and its Variants (abstract)
10:00
Backdoored Hash Functions: Immunizing HMAC and HKDF (abstract)
10:30-11:00Coffee Break
11:00-12:30 Session 52A: Secure computation
Location: Maths LT2
11:00
Computer-aided proofs for multiparty computation with active security (abstract)
11:30
Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks (abstract)
12:00
Symbolic security of garbled circuits (abstract)
12:30-14:00Lunch Break
14:00-15:30 Session 53A: Knowledge and hyperproperties
Location: Maths LT2
14:00
The Complexity of Monitoring Hyperproperties (abstract)
14:30
Knowledge-based Security of Dynamic Secrets for Reactive Programs (abstract)
15:00
Assuming you know: epistemic semantics of relational annotations for expressive flow policies (abstract)
15:30-16:00Coffee Break
17:00-18:30 Session 56: FLoC Public Lecture: Stuart Russell

Doors open at 4:30 pm; please be seated by 4:50 pm (attendance is free of charge and all are welcome; please register).

17:00
Unifying Logic and Probability: the BLOG Language (abstract)
Wednesday, July 11th

View this program: with abstractssession overviewtalk overviewside by side with other conferences

09:00-10:30 Session 57B: Information flow
Location: Maths LT2
09:00
A Permission-Dependent Type System for Secure Information Flow Analysis (abstract)
09:30
Types for Information Flow Control: Labeling Granularity and Semantic Models (abstract)
10:00
Inductive Invariants for Noninterference in Multi-agent Workflows (abstract)
10:30-11:00Coffee Break
11:00-12:00 Session 61A: CSF Invited Talk: Catuscia Palamidessi
Location: Maths LT2
11:00
Local Differential Privacy on Metric Spaces: optimizing the trade-off with utility (abstract)
12:00-12:30 Session 62A: Privacy
Location: Maths LT2
12:00
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting (abstract)
12:30-14:00Lunch Break
15:30-16:00Coffee Break
16:00-17:00 Session 64A: Electronic voting
Chair:
Location: Maths LT2
16:00
Alethea: A Provably Secure Random Sample Voting Protocol (abstract)
16:30
Machine-checked proofs for electronic voting: privacy and verifiability for Belenios (abstract)
19:00-21:30 FLoC banquet at Examination Schools

FLoC banquet at Examination Schools. Drinks and food available from 7pm (pre-booking via FLoC registration system required; guests welcome).

Thursday, July 12th

View this program: with abstractssession overviewtalk overviewside by side with other conferences

09:30-10:30 Session 68: Side channels
09:30
Symbolic Side-Channel Analysis for Probabilistic Programs (abstract)
10:00
Secure compilation of side-channel countermeasures: the case of cryptographic “constant-time” (abstract)
10:30-11:00Coffee Break
11:00-12:30 Session 71A: Security protocols II
Chair:
11:00
A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif. (abstract)
11:30
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR (abstract)
12:00
A Typing Result for Stateful Protocols (abstract)
12:30-14:00Lunch Break
15:30-16:00Coffee Break