FCS-FCC PROGRAM
Friday, July 18th, 2014
View this program: with abstractssession overviewtalk overviewside by side with other conferences
08:45-09:45 Session 86L: Invited Speaker (joint with ASA)
Chair:
Location: MB, Hörsaal 7
08:45 | Cryptosense: Formal Analysis of Security APIs from Research to Spin-Off (abstract) |
09:45-10:15 Session 89B: Technical Session
Chair:
Location: MB, Hörsaal 7
09:45 | A Hybrid Analysis for Security Protocols with State (abstract) |
10:15-10:45Coffee Break
10:45-11:45 Session 90AZ: Invited Speaker
Chair:
Location: MB, Hörsaal 7
10:45 | Constructive Cryptography and Security Proofs (abstract) |
12:00-13:00 Session 94D: Technical Session
Chair:
Location: MB, Hörsaal 7
12:00 | A tool for automating the computationally complete symbolic attacker (abstract) |
12:20 | Towards a Coinductive Characterization of Computational Indistinguishability (abstract) |
12:40 | Actual Causes of Security Violations (abstract) |
13:00-14:30Lunch Break
14:30-16:00 Session 96AZ: Technical Session
Chair:
Location: MB, Hörsaal 7
14:30 | Adversary Gain vs. Defender Loss in Quantified Information Flow (abstract) |
15:00 | Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis (abstract) |
15:30 | Micro-Policies: Formally Verified Low-Level Tagging Schemes for Safety and Security (Short Paper) (abstract) |
16:00-16:30Coffee Break
16:30-18:00 Session 99AV: Technical Session
Chair:
Location: MB, Hörsaal 7
16:30 | Protocol Indistinguishability and the Computationally Complete Symbolic Attacker (abstract) |
16:50 | On Well-Founded Security Protocols (abstract) |
17:10 | Fitting's Embedding of Classical Logic in S4 and Trace Properties in the Computational Model (abstract) |
17:30 | Towards Timed Models for Cyber-Physical Security Protocols (abstract) |