FCS program

Sessions take place in auditorium 5 unless otherwise indicated.

Thursday July 25th

Thursday's program is also available with abstracts or side by side with other meetings.

08:45-09:00  Opening Remarks

09:00-10:30  Session 1: Foundations of Security
Chair: Véronique Cortier

09:00  Ralf Küsters, U Kiel, Germany
On the decidability of cryptographic protocols with open-ended data structures
09:30  Kong-wei Lye and Jeannette M. Wing, Carnegie Mellon U, USA
Game strategies in network security
10:00  Sylvain Conchon, Oregon Health and Science U, USA
Modular information flow analysis for process calculi

10:30-11:00  Refreshments

11:00-12:30  Session 2: Logical Approaches (joint with VERIFY)
Room: auditorium 6
Chair: Catherine Meadows

11:00  Andrew W. Appel, Princeton U, USA; Neophytos G. Michael, Princeton U, USA; Aaron Stump, Stanford U, USA; and Roberto Virga, Princeton U, USA
A trustworthy proof checker
11:30  Ernie Cohen, Microsoft Research Cambridge, UK
Proving protocols safe from guessing
12:00  Alessandro Armando and Luca Compagna, U Genova, Italy
Automatic SAT-compilation of security problems

12:30-14:00  Lunch

14:00-15:30  Session 3: VERIFY Invited talk (joint with VERIFY)
Room: auditorium 6
Chair: Heiko Mantel

14:00  Fabio Massacci, U Trento, Italy
Invited talk: Formal verification of SET by Visa and Mastercard: Lessons for formal methods in security

15:30-16:00  Refreshments

16:00-17:00  Session 4: Verification of Security Protocols (joint with VERIFY)
Room: auditorium 6
Chair: Dieter Gollmann

16:00  Catherine Meadows, Naval Research Laboratory, USA
Identifying potential type confusion in authenticated messages
16:30  Graham Steel, Alan Bundy, and Ewen Denney; U Edinburgh, UK
Finding counterexamples to inductive conjectures and discovering security protocol attacks

Friday July 26th

Friday's program is also available with abstracts or side by side with other meetings.

09:00-10:30  Session 5: FCS Invited talk (joint with VERIFY)
Room: auditorium 6
Chair: Iliano Cervesato

09:00  Dieter Gollmann, Microsoft Research Cambridge, UK
Invited talk: Defining security is difficult and error prone

10:30-11:00  Refreshments

11:00-12:30  Session 6: Programming Language Security
Chair: Ernie Cohen

11:00  Lujo Bauer, Jarred Ligatti, and David Walker; Princeton U, USA
More enforceable security policies
11:30  Yu David Liu and Scott F. Smith, Johns Hopkins U, USA
A component security infrastructure
12:00  Christian Skalka and Scott F. Smith, Johns Hopkins U, USA
Static use-based object confinement

12:30-14:00  Lunch

14:00-15:40  Session 7 (joint with VERIFY)
Room: auditorium 6
Chair: Serge Autexier, Iliano Cervesato, Heiko Mantel

14:00  Ernie Cohen, Microsoft Research Cambridge, UK; Alan Jeffrey, DePaul U, USA; Fabio Martinelli, CNR Pisa, Italy; Fabio Massacci, U Trento, Italy; Catherine Meadows, Naval Research Laboratory, USA; and David Basin, U Freiburg, Germany
Panel: The future of protocol verification
15:30  Closing Remarks