13th IEEE Computer Security Foundations Workshop

July 3-5, 2000

Cambridge, England

Sponsored by the IEEE Computer Society

Preliminary Technical Program (Subject to Change)

MONDAY July 3, 2000

8:45 - 9:00Welcome
E. Stewart Lee (Cambridge University), General Chair
Paul Syverson (Naval Research Laboratory), Program Chair
9:00 - 10:00Names and Certificates

Local Names In SPKI/SDSI
Ninghui Li (New York University)

Reasoning about Trust and Insurance in a Public Key Infrastructure
Jonathan Millen (SRI) and Rebecca Wright (AT&T Labs -- Research)
10:00 - 10:30Break
10:30 - 12:00 Strands and Multiset Rewriting

Protocol Independence through Disjoint Encryption
Joshua D. Guttman and F. Javier THAYER Fabrega (MITRE)

Relating Strands and Multiset Rewriting for Security Protocol Analysis
Iliano Cervesato (ITT Industries), Nancy Durgin (Stanford), Patrick Lincoln (SRI), John Mitchell (Stanford), and Andre Scedrov (Pennsylvania)

Optimizing Protocol Rewrite Rules of CIL Specifications
G. Denker (SRI), J. Millen (SRI) J. Kuester-Filipe (Tech. Univ. Braunschwieg), and A. Grau (Tech. Univ. Braunschwieg)
12:00 - 2:00Lunch
2:00 - 3:30 Automated Security Protocol Methods

Looking for diamonds in the desert: extending automatic protocol generation to three-party authentication and key agreement protocols
Adrian Perrig and Dawn Xiadong Song (UC, Berkeley)

C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
Anthony H. Dekker (DSTO and Australian National University)

An Executable Specification Language for Planning Attacks to Security Protocols
Luigia Carlucci Aiello (Univ. Roma ``La Sapienza'') and Fabio Massacci (Univ. Di Siena)
3:30 - 4:00Break
4:00 - 5:30Panel: Intrusion Detection
Panel Chair: Teresa Lunt (Xerox PARC)

TUESDAY July 4, 2000

9:00 - 10:00 Network Security

Analyzing single-server network inhibition
Tuomas Aura (Helsinki University of Technology), Matt Bishop, (UC, Davis), and Dean Sniegowski (UC, Davis)

Reasoning About Secrecy for Active Networks
Carl A. Gunter (U. Pennsylvania), Pankaj Kakkar (U. Pennsylvania), and Martín Abadi (Lucent, Bell Labs)
10:00 - 10:30Break
10:30 - 12:00 Invariants, Induction, Ranks, Languages, and Ideals

Towards automatic verification of authentication protocols on an unbounded network
James Heather and Steve Schneider (Royal Holloway, University of London)

TAPS: A First-Order Verifier for Cryptographic Protocols
Ernie Cohen (Telcordia)

Invariant Generation Techniques in Cryptographic Protocol Analysis
Catherine Meadows (Naval Research Lab)
12:00 - 2:00Lunch
2:00 - 3:30 Noninterference and Information Flow

Information Flow Analysis in a Discrete-Time Process Algebra
Riccardo Focardi (U. Venezia - Ca' Foscari), Roberto Gorrieri (U. Bologna), and Fabio Martinelli (IAT-CNR)

Possibilistic Definitions of Security -- An Assembly Kit --
Heiko Mantel (German Research Center for Artificial Intelligence (DFKI))

Probabilistic Noninterference for Multi-threaded Programs
Andrei Sabelfeld and David Sands (Chalmers University of Technology)
3:30 - 4:00Break
4:00 - 5:00Invited Talk: "American Fish and Colossus, WW II Codebreaking in Bletchley Park"
Anthony E Sale, Hon. FBCS, ex Museums Director, Bletchley Park

WEDNESDAY July 5, 2000

9:00 - 10:00 Java and Mobile Code Security

An Operational Semantics of Java 2 Access Control
Guenter Karjoth (IBM Research)

Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
Mads Dam and Pablo Giambiagi (SICS)
10:00 - 10:30Break
10:30 - 12:00 Types and Language-Based Security

Secure Introduction of One-way Functions
Dennis Volpano (Naval Postgraduate School)

How to Prevent Type Flaw Attacks on Security Protocols
James Heather (Royal Holloway), Gavin Lowe (U. Leicester), and Steve Schneider (Royal Holloway)

Secure Composition of Untrusted Code: Wrappers and Causality Types
Peter Sewell (Cambridge) and Jan Vitek (Purdue)
12:00 - ??Closing remarks. Presentation of Croquet Awards
Field Trip to Bletchley Park