Days: Monday, July 9th Tuesday, July 10th Wednesday, July 11th Thursday, July 12th
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:00 | Continuous Reasoning: Scaling the Impact of Formal Methods (abstract) |
11:00 | An extensive formal analysis of multi-factor authentication protocols (abstract) |
11:30 | Composition Theorems for CryptoVerif and Application to TLS 1.3 (abstract) |
12:00 | A Cryptographic Look at Multi-Party Channels (abstract) |
14:00 | Sanctum: Towards an Open-Source, Formally Verified Secure Processor (abstract) |
15:00 | Guided design of attack trees: a system-based approach (abstract) |
Short talks by attendees.
The 5-minute talk schedule is available here.
This is a fun session in which you can describe work in progress, crazy-sounding ideas, interesting questions and challenges, research proposals, or anything else within reason! You can use 2-3 slides, or you can just speak without slides.
FLoC reception at Ashmolean Museum. Drinks and canapés available from 7pm (pre-booking via FLoC registration system required; guests welcome).
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:00 | Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks (abstract) |
09:30 | Formal Security Proof of CMAC and its Variants (abstract) |
10:00 | Backdoored Hash Functions: Immunizing HMAC and HKDF (abstract) |
11:00 | Computer-aided proofs for multiparty computation with active security (abstract) |
11:30 | Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks (abstract) |
12:00 | Symbolic security of garbled circuits (abstract) |
14:00 | The Complexity of Monitoring Hyperproperties (abstract) |
14:30 | Knowledge-based Security of Dynamic Secrets for Reactive Programs (abstract) |
15:00 | Assuming you know: epistemic semantics of relational annotations for expressive flow policies (abstract) |
16:00 | KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine (abstract) |
Doors open at 4:30 pm; please be seated by 4:50 pm (attendance is free of charge and all are welcome; please register).
17:00 | Unifying Logic and Probability: the BLOG Language (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:00 | A Permission-Dependent Type System for Secure Information Flow Analysis (abstract) |
09:30 | Types for Information Flow Control: Labeling Granularity and Semantic Models (abstract) |
10:00 | Inductive Invariants for Noninterference in Multi-agent Workflows (abstract) |
11:00 | Local Differential Privacy on Metric Spaces: optimizing the trade-off with utility (abstract) |
12:00 | Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting (abstract) |
14:00 | Pseudo deterministic algorithms and proofs (abstract) |
16:00 | Alethea: A Provably Secure Random Sample Voting Protocol (abstract) |
16:30 | Machine-checked proofs for electronic voting: privacy and verifiability for Belenios (abstract) |
FLoC banquet at Examination Schools. Drinks and food available from 7pm (pre-booking via FLoC registration system required; guests welcome).
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:30 | Symbolic Side-Channel Analysis for Probabilistic Programs (abstract) |
10:00 | Secure compilation of side-channel countermeasures: the case of cryptographic “constant-time” (abstract) |
11:00 | A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif. (abstract) |
11:30 | Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR (abstract) |
12:00 | A Typing Result for Stateful Protocols (abstract) |