[TYPES/announce] Call for participation: 2012 COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2012)

Matteo Maffei maffei at cs.uni-saarland.de
Mon May 7 08:25:31 EDT 2012


2012 COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2012)
--- June 25–27, 2012 , Harvard University, Cambridge MA, USA ---

CSF associated workshops: FCC, ASA, STAST

Website: http://csf2012.seas.harvard.edu/

The early registration deadline is May 23, 2012

---

The Computer Security Foundations Symposium is an annual
conference for researchers in computer security, to examine current
theories of security, the formal models that provide a context for
those theories, and techniques for verifying security.

Over the past two decades, many seminal papers and techniques have
been presented first at CSF. In 2008, CiteSeer listed CSF as 38th out
of more than 1200 computer science venues (top 3.11%) in impact based
on citation frequency. CiteSeerX lists CSF 2007 as 7th out of 581
computer science venues (top 1.2%) in impact based on citation
frequency.

The atmosphere of the symposium is informal, often in a peaceful,
rural setting that encourages an exchange of thoughtful technical
discussion by all attendees, both during and after scheduled
presentations.

---

Invited speakers:

William Guenther, Mass Insight Global Partnerships
Butler Lampson, Microsoft Research

---

List of accepted papers:

Information-Flow Security for a Core of JavaScript
    Daniel Hedin, Andrei Sabelfeld

Secure Information Flow for Concurrent Programs under Total Store Order
    Jeffrey A. Vaughan, Todd Millstein

ENCOVER: Symbolic Exploration for Information Flow Security
    Musard Balliu, Mads Dam, Gurvan Le Guernic

Information-flow control for programming on encrypted data
    John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman

Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings
    Alisa Pankova, Peeter Laud

Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties
    Benedikt Schmidt, Simon Meier, Cas Cremers, David Basin

Verifying privacy-type properties in a modular way
    Myrto Arapinis, Vincent Cheval, Stéphanie Delaune

Security Analysis of Access Control through Program Verification
    Anna Lisa Ferrara, P. Madhusudan, Gennaro Parlato

Gran: model checking grsecurity RBAC policies
    Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Marco Squarcina

Labeled Sequent Calculi for Access Control Logics: Countermodels,
Saturation and Abduction
    Valerio Genovese, Deepak Garg, Daniele Rispoli

Securing Interactive Programs
    Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld

Learning is Change in Knowledge: Knowledge-based Security for Dynamic Policies
    Aslan Askarov, Stephen Chong

Mashic Compiler: Mashup Sandboxing based on Inter-frame Communication
    Zhengqin Luo, Tamara Rezk

Secure compilation to modern processors
    Pieter Agten, Raoul Strackx, Bart Jacobs, Frank Piessens

Cache-leakage resilient OS isolation in an idealized model of virtualization
    Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna

A Framework for the Cryptographic Verification of Java-like Programs
    Ralf Kuesters, Tomasz Truderung, Juergen Graf

Constructing Optimistic Multi-party Contract Signing Protocols
    Barbara Kordy, Sasa Radomirovic

Refining Key Establishment
    Christoph Sprenger, David Basin

Discovering Concrete Attacks on Website Authorization by Formal Analysis
    Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffeis

Measuring Information Leakage using Generalized Gain Functions
    Mário S. Alvim, Kostas Chatzikokolakis, Catuscia Palamidessi, Geoffrey Smith

The Thermodynamics of Confidentiality
    Pasquale Malacaria, Fabrizio Smeraldi

Generic Indifferentiability Proofs of Hash Designs
    Marion Daubignard, Pierre-Alain Fouque, Yassine Lakhnech

Automatically Verified Mechanized Proof of One-Encryption Key Exchange
    Bruno Blanchet

Verified Security of Merkle-Damgaard
    Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire,
César Kunz, Malte Skoruppa, Santiago Zanella Béguelin

Provably Secure and Practical Onion Routing
    Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi


---

Registration:

For online registration, please follow the link on the
CSF website at http://csf2012.seas.harvard.edu/registration.html
The early registration deadline is May 23, 2012.

---

CSF Program Chairs:

- Veronique Cortier, LORIA and CNRS
- Steve Zdancewic, University of Pennsylvania

CSF General Chair:

- Stephen Chong, Harvard University


More information about the Types-announce mailing list