20th IEEE Computer Security Foundations Symposium

July 6-8, 2007

S. Servolo Island, Venice, Italy

Technical Program

THURSDAY, July 5, 2007

19:00 - 21:00

Welcome buffet


FRIDAY, July 6, 2007

9:00 - 9:05

Welcome
Riccardo Focardi (University of Venice), General Chair
Andrei Sabelfeld (Chalmers), Program Chair

9:05 - 10:35

Authorization
Session Chair: Andre Scedrov

Moritz Y. Becker, Cedric Fournet and Andrew D. Gordon
Design and Semantics of a Decentralized Authorization Language

Andrew Cirillo, Radha Jagadeesan, Corin Pitcher and James Riely
Do As I SaY! Programmatic Access Control with Explicit Identities

Cedric Fournet, Andy Gordon and Sergio Maffeis
A Type Discipline for Authorization in Distributed Systems

10:35 - 11:00

Break

11:00 - 12:30

Multi-layer protocols and key conjuring
Session Chair: Michael Backes

Prateek Gupta and Vitaly Shmatikov
Security Analysis of Voice-over-IP Protocols

Alwyn Goodloe and Carl Gunter
Reasoning about Concurrency for Security Tunnels

Veronique Cortier, Stephanie Delaune and Graham Steel
A Formal Theory of Key Conjuring

12:30 - 14:00

Lunch

14:00 - 16:00

Protocols and cryptographic foundations
Session Chair: John Mitchell

Bruno Blanchet
Computationally Sound Mechanized Proofs of Correspondence Assertions

Michael Backes, Birgit Pfitzmann and Andre Scedrov
Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles

Ran Canetti, Ling Cheung, Dilsun Kaynar, Nancy Lynch and Olivier Pereira
Compositional Security for Task-PIOAs

Roberto Segala and Andrea Turrini
Approximated Computationally Bounded Simulation Relations for Probabilistic Automata

16:00 - 16:30

Break

16:30 - 17:45

Five minute talks
Session Chair: Andrei Sabelfeld

Social dinner


SATURDAY, July 7, 2007

9:00 - 10:30

Secure implementation
Session Chair:
Bruno Blanchet

James Heather
Implementing STV securely in Pret a Voter

Ricardo Corin, Pierre-Malo Denielou, Cedric Fournet, Karthikeyan Bhargavan and James Leifer
Secure Implementations for Typed Session Abstractions

Ta-chung Tsai, Alejandro Russo and John Hughes
A Library for Secure Multi-threaded Information Flow in Haskell

10:30 - 11:00

Break

11:00 - 12:30

Information flow
Session Chair: Steve Zdancewic

Paritosh Shroff, Scott F. Smith and Mark Thober
Dynamic Dependency Monitoring to Secure Information Flow

Gurvan Le Guernic
Automaton-based Confidentiality Monitoring of Concurrent Programs

Lennart Beringer and Martin Hofmann
Secure information flow and program logics

12:30 - 14:00

Lunch

14:00 - 15:30

Privacy
Session Chair:
Carl A. Gunter

Hanne Riis Nielson and Fleming Nielson
A flow-sensitive analysis of privacy properties

Paul Rowe, Andre Scedrov and Max Kanovich
Collaborative Planning with Privacy

Adam Barth, John Mitchell, Anupam Datta and Sharada Sundaram
Privacy and Utility in Business Processes

15:30 - 16:00

Break

16:00 - 18:30

20 years anniversary session

Invited talk
Chair:
Riccardo Focardi

Miranda Mowbray and Dieter Gollmann
Electing the Doge of Venice: analysis of a 13th Century protocol

Panel: Computer Security Foundations Symposium: the Next 20 Years
Chair: Jonathan Millen

Panelists: TBA

Business meeting


Free time for tours and dinner in Venice


SUNDAY, July 8, 2007

9:00 - 10:30

Vulnerability analysis and information-theoretic security
Session Chair:
Dieter Gollmann

David Brumley, Hao Wang, Somesh Jha and Dawn Song
Creating Vulnerability Signatures Using Weakest Pre-conditions

Heiko Mantel and Henning Sudbrock
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework

Konstantinos Chatzikokolakis, Catuscia Palamidessi and Prakash Panangaden
Probability of Error in Information-Hiding Protocols

10:30 - 11:00

Break

11:00 - 12:30

Security protocol analysis
Session Chair: Iliano Cervesato

Michael Backes, Agostino Cortesi and Matteo Maffei
Causality-based Abstraction of Multiplicity in Security Protocols

Sibylle Froeschle
The Insecurity Problem: Tackling Unbounded Data

Alessandro Armando, Roberto Carbone and Luca Compagna
LTL Model Checking for Security Protocols

12:30 - 12:45

Closing remarks. Presentation of awards

12:45 - 14:30

Lunch