Days: Sunday, August 7th Monday, August 8th Tuesday, August 9th Wednesday, August 10th
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:00 | Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting (abstract) PRESENTER: Petar Paradžik |
09:30 | Is Eve nearby? Analysing protocols under the distant-attacker assumption (abstract) PRESENTER: Reynaldo Gil-Pons |
10:00 | A small bound on the number of sessions for security protocols (abstract) PRESENTER: Stephanie Delaune |
11:00 | Harnessing the Power of Formal Verification for the $Trillion Chip Design Industry (abstract) |
Lunches will be held in Taub lobby (CAV, CSF) and in The Grand Water Research Institute (DL, NMR, ITP).
14:00 | A Formal Model of Checked C (abstract) PRESENTER: Liyi Li |
14:30 | SecurePtrs: Proving Secure Compilation Using Data-Flow Back-Translation and Turn-Taking Simulation (abstract) PRESENTER: Roberto Blanco |
15:00 | Proving full-system security properties under multiple attacker models on capability machines (abstract) PRESENTER: Thomas Van Strydonck |
16:00 | Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes (abstract) PRESENTER: Peeter Laud |
16:30 | DPL: A Language for GDPR Enforcement (abstract) PRESENTER: Farzane Karami |
17:00 | Privacy as Reachability (abstract) PRESENTER: Sébastien Gondron |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:00 | N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures (abstract) PRESENTER: Thilo Weghorn |
09:30 | Applying consensus and replication securely with FLAQR (abstract) PRESENTER: Priyanka Mondal |
10:00 | How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis (abstract) PRESENTER: Johannes Müller |
11:00 | Contingent payments from two-party signing and verification for abelian groups (abstract) PRESENTER: Sergiu Bursuc |
11:30 | Collusion-Preserving Computation without a Mediator (abstract) PRESENTER: Yun Lu |
12:00 | Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox (abstract) PRESENTER: Sabine Oechsner |
Lunches will be held in Taub lobby (CAV, CSF) and in The Grand Water Research Institute (DL, NMR, IJCAR, ITP).
14:00 | Membership Inference Attacks against Classifiers (abstract) |
pickup at 18:00 from the Technion (Tour at Haifa, no food will be provided)
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:00 | IFCIL: An Information Flow Configuration Language for SELinux (abstract) PRESENTER: Lorenzo Ceragioli |
09:30 | Towards a General-Purpose Dynamic Information Flow Policy (abstract) PRESENTER: Peixuan Li |
10:00 | Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games (abstract) |
11:00 | Cracking the Stateful Nut -- Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant (abstract) PRESENTER: Adrien Koutsos |
11:30 | Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol (abstract) PRESENTER: Felipe Boeira |
12:00 | Symbolic protocol verification with dice: process equivalences in the presence of probabilities (abstract) PRESENTER: Steve Kremer |
Lunches will be held in Taub lobby (CAV, CSF) and in The Grand Water Research Institute (DL, NMR, IJCAR, ITP).
14:00 | So near and yet so far: formal verification of distance bounding protocols (abstract) |
16:30 | SMT-based Verification of Distributed Network Control Planes (abstract) |
View this program: with abstractssession overviewtalk overviewside by side with other conferences
09:00 | Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co (abstract) PRESENTER: Peter B. Rønne |
09:30 | Universal Optimality and Robust Utility Bounds for Metric Differential Privacy (abstract) PRESENTER: Catuscia Palamidessi |
10:00 | Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments (abstract) PRESENTER: Semyon Yurkov |
11:00 | Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems (abstract) PRESENTER: Lisa Oakley |
11:30 | The Complexity of Verifying Boolean Programs as Differentially Private (abstract) PRESENTER: Ludmila Glinskih |
12:00 | Adversary Safety by Construction in a Language of Cryptographic Protocols (abstract) PRESENTER: Alice Lee |
Lunches will be held in Taub lobby (CAV, CSF) and in The Grand Water Research Institute (DL, IJCAR, ITP).
14:00 | Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing (abstract) PRESENTER: Floyd Zweydinger |
14:30 | A Complete Characterization of Security for Linicrypt Block Cipher Modes (abstract) PRESENTER: Lawrence Roy |
15:00 | Locked Circuit Indistinguishability: A Notion of Security for Logic Locking (abstract) PRESENTER: Mohamed Elmassad |
16:00 | Prophecy Variables for Hyperproperty Verification (abstract) PRESENTER: Raven Beutner |
16:30 | Mapping Synthesis for Hyperproperties (abstract) PRESENTER: Tzu-Han Hsu |