FLOC 2022: FEDERATED LOGIC CONFERENCE 2022
CSF PROGRAM

Days: Sunday, August 7th Monday, August 8th Tuesday, August 9th Wednesday, August 10th

Sunday, August 7th

View this program: with abstractssession overviewtalk overviewside by side with other conferences

08:30-09:00Coffee & Refreshments
09:00-10:30 Session 85B: CSF Opening and Security Protocols 1
Location: Taub 2
09:00
Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting (abstract)
PRESENTER: Petar Paradžik
09:30
Is Eve nearby? Analysing protocols under the distant-attacker assumption (abstract)
10:00
A small bound on the number of sessions for security protocols (abstract)
10:30-11:00Coffee Break
11:00-12:00 Session 89: Keynote
11:00
Harnessing the Power of Formal Verification for the $Trillion Chip Design Industry (abstract)
12:30-14:00Lunch Break

Lunches will be held in Taub lobby (CAV, CSF) and in The Grand Water Research Institute (DL, NMR, ITP).

 

14:00-15:30 Session 90B: Language-based Security
Location: Taub 2
14:00
A Formal Model of Checked C (abstract)
PRESENTER: Liyi Li
14:30
SecurePtrs: Proving Secure Compilation Using Data-Flow Back-Translation and Turn-Taking Simulation (abstract)
PRESENTER: Roberto Blanco
15:00
Proving full-system security properties under multiple attacker models on capability machines (abstract)
15:30-16:00Coffee Break
16:00-17:30 Session 92B: Privacy 1
Location: Taub 2
16:00
Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes (abstract)
PRESENTER: Peeter Laud
16:30
DPL: A Language for GDPR Enforcement (abstract)
PRESENTER: Farzane Karami
17:00
Privacy as Reachability (abstract)
Monday, August 8th

View this program: with abstractssession overviewtalk overviewside by side with other conferences

08:30-09:00Coffee & Refreshments
09:00-10:30 Session 94B: Voting and Distributed Systems
Location: Taub 2
09:00
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures (abstract)
PRESENTER: Thilo Weghorn
09:30
Applying consensus and replication securely with FLAQR (abstract)
PRESENTER: Priyanka Mondal
10:00
How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis (abstract)
PRESENTER: Johannes Müller
10:30-11:00Coffee Break
11:00-12:30 Session 96B: Cryptography 1
Location: Taub 2
11:00
Contingent payments from two-party signing and verification for abelian groups (abstract)
PRESENTER: Sergiu Bursuc
11:30
Collusion-Preserving Computation without a Mediator (abstract)
PRESENTER: Yun Lu
12:00
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox (abstract)
PRESENTER: Sabine Oechsner
12:30-14:00Lunch Break

Lunches will be held in Taub lobby (CAV, CSF) and in The Grand Water Research Institute (DL, NMR, IJCAR, ITP).

14:00-15:30 Session 97B: Invited Talk 1
Location: Taub 2
14:00
Membership Inference Attacks against Classifiers (abstract)
15:30-16:00Coffee Break
18:30-20:30 Walking tour (at Haifa)

pickup at 18:00 from the Technion (Tour at Haifa, no food will be provided)

Tuesday, August 9th

View this program: with abstractssession overviewtalk overviewside by side with other conferences

08:30-09:00Coffee & Refreshments
09:00-10:30 Session 100B: Information Flow
Location: Taub 2
09:00
IFCIL: An Information Flow Configuration Language for SELinux (abstract)
09:30
Towards a General-Purpose Dynamic Information Flow Policy (abstract)
PRESENTER: Peixuan Li
10:00
Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games (abstract)
10:30-11:00Coffee Break
11:00-12:30 Session 102B: Security Protocols 2
Location: Taub 2
11:00
Cracking the Stateful Nut -- Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant (abstract)
PRESENTER: Adrien Koutsos
11:30
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol (abstract)
PRESENTER: Felipe Boeira
12:00
Symbolic protocol verification with dice: process equivalences in the presence of probabilities (abstract)
PRESENTER: Steve Kremer
12:30-14:00Lunch Break

Lunches will be held in Taub lobby (CAV, CSF) and in The Grand Water Research Institute (DL, NMR, IJCAR, ITP).

14:00-15:30 Session 104B: Invited Talk 2
Location: Taub 2
14:00
So near and yet so far: formal verification of distance bounding protocols (abstract)
16:00-16:30Coffee Break
16:30-17:30 Session 108: Plenary
Chair:
16:30
SMT-based Verification of Distributed Network Control Planes (abstract)
Wednesday, August 10th

View this program: with abstractssession overviewtalk overviewside by side with other conferences

08:30-09:00Coffee & Refreshments
09:00-10:30 Session 110B: Privacy 2
Location: Taub 2
09:00
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co (abstract)
PRESENTER: Peter B. Rønne
09:30
Universal Optimality and Robust Utility Bounds for Metric Differential Privacy (abstract)
10:00
Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments (abstract)
PRESENTER: Semyon Yurkov
10:30-11:00Coffee Break
11:00-12:30 Session 112B: Verification and Synthesis
Location: Taub 2
11:00
Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems (abstract)
PRESENTER: Lisa Oakley
11:30
The Complexity of Verifying Boolean Programs as Differentially Private (abstract)
PRESENTER: Ludmila Glinskih
12:00
Adversary Safety by Construction in a Language of Cryptographic Protocols (abstract)
PRESENTER: Alice Lee
12:30-14:00Lunch Break

Lunches will be held in Taub lobby (CAV, CSF) and in The Grand Water Research Institute (DL, IJCAR, ITP).

14:00-15:30 Session 115B: Cryptography 2
Location: Taub 2
14:00
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing (abstract)
PRESENTER: Floyd Zweydinger
14:30
A Complete Characterization of Security for Linicrypt Block Cipher Modes (abstract)
PRESENTER: Lawrence Roy
15:00
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking (abstract)
PRESENTER: Mohamed Elmassad
15:30-16:00Coffee Break
16:00-17:00 Session 116B: Hyperproperties
Location: Taub 2
16:00
Prophecy Variables for Hyperproperty Verification (abstract)
PRESENTER: Raven Beutner
16:30
Mapping Synthesis for Hyperproperties (abstract)
PRESENTER: Tzu-Han Hsu