08:45-09:00 Opening Remarks
09:00-10:30 Session 1: Foundations of
Security
Chair:
Véronique Cortier
09:00 | Ralf
Küsters, U Kiel, Germany On the decidability of cryptographic protocols with open-ended data structures [Slides] |
09:30 | Kong-wei
Lye and Jeannette M. Wing, Carnegie Mellon U, USA Game strategies in network security [Slides] |
10:00 | Sylvain
Conchon, Oregon Health and Science U, USA Modular information flow analysis for process calculi [Slides] |
10:30-11:00 Refreshments
11:00-12:30 Session 2: Logical Approaches (joint with VERIFY)
Chair:
Catherine Meadows
Room:
auditorium 6
11:00 | Andrew
W. Appel, Princeton U, USA; Neophytos G. Michael, Princeton U, USA; Aaron
Stump, Stanford U, USA; and Roberto Virga, Princeton U, USA A trustworthy proof checker [Slides] |
11:30 | Ernie
Cohen, Microsoft Research Cambridge, UK Proving protocols safe from guessing [Slides] |
12:00 | Alessandro
Armando and Luca Compagna, U Genova, Italy Automatic SAT-compilation of security problems [Slides] |
12:30-14:00 Lunch
14:00-15:30 Session 3: VERIFY Invited talk (joint with VERIFY)
Chair:
Heiko Mantel
Room:
auditorium 6
14:00 | Fabio Massacci, U Trento,
Italy Invited talk: Formal verification of SET by Visa and Mastercard: Lessons for formal methods in security |
15:30-16:00 Refreshments
16:00-17:00 Session 4: Verification of
Security Protocols (joint with VERIFY)
Chair:
Dieter Gollmann
Room:
auditorium 6
16:00 | Catherine
Meadows, Naval Research Laboratory, USA Identifying potential type confusion in authenticated messages [Slides] |
16:30 | Graham
Steel, Alan Bundy, and Ewen Denney; U Edinburgh, UK Finding counterexamples to inductive conjectures and discovering security protocol attacks [Slides] |
09:00-10:30 Session 5: FCS Invited talk (joint with VERIFY)
Chair:
Iliano Cervesato
Room:
auditorium 6
09:00 | Dieter
Gollmann, Microsoft Research Cambridge, UK Invited talk: Defining security is difficult and error prone |
10:30-11:00 Refreshments
11:00-12:30 Session 6: Programming Language
Security
Chair:
Ernie Cohen
11:00 | Lujo
Bauer, Jarred Ligatti, and David Walker; Princeton U, USA More enforceable security policies [Slides] |
11:30 | Yu
David Liu and Scott F. Smith, Johns Hopkins U, USA A component security infrastructure [Slides] |
12:00 | Christian
Skalka and Scott F. Smith, Johns Hopkins U, USA Static use-based object confinement [Slides] |
12:30-14:00 Lunch
14:00-15:40 Session 7 (joint with VERIFY)
Moderators:
Serge Autexier, Iliano Cervesato, Heiko Mantel
Room:
auditorium 6
14:00 | Ernie
Cohen, Microsoft Research Cambridge, UK; Alan Jeffrey, DePaul U, USA; Fabio Martinelli, CNR Pisa,
Italy; Fabio Massacci, U
Trento, Italy; Catherine Meadows, Naval Research Laboratory, USA; and David Basin, U
Freiburg, Germany Panel: The future of protocol verification |
15:30 | Closing Remarks |