15th IEEE Computer Security Foundations Workshop

 

June 24-26, 2002

Keltic Lodge

Cape Breton, Nova Scotia, Canada

 

Technical Program

SUNDAY June 23, 2002

6:30 - 7:30 Reception and Registration

MONDAY June 24, 2002

8:45 - 9:00 WELCOME
Iliano Cervesato (Naval Research Laboratory), General Chair
Steve Schneider (Royal Holloway, University of London), Program Chair
9:00 - 10:30 Information Flow I
Session Chair: Riccardo Focardi

Approximate Non-Interference
Alessandra Di Pierro (University of Pisa), Chris Hankin (Imperial College), and Herbert Wiklicky (Imperial College)

Quantifying Information Flow
Gavin Lowe (Oxford)

Secrecy in Multiagent Systems
Joseph Halpern and Kevin O'Neill (Cornell)

10:30 - 11:00 Break
11:00 - 12:00 Intrusion
Session Chair: Joshua Guttman

Two Formal Analyses of Attack Graphs
Somesh Jha (University of Wisconsin), Oleg Sheyner (CMU), and Jeannette Wing (CMU)

Formal Specification of Intrusion Signatures and Detection Rules
Jean-Philippe Pouzol and Mireille Ducassé (IRISA)

12:00 - 2:00 Lunch
2:00 - 3:30 Protocols I
Session Chair: Paul Syverson

Types and Effects for Asymmetric Cryptographic Protocols
Andrew D. Gordon (Microsoft Research) and Alan Jeffrey (DePaul University)

Security Protocol Design via Authentication Tests
Joshua D. Guttman (MITRE)

Strand Spaces and Rank Functions: More Than Distant Cousins
James Heather (University of Surrey)

3:30 - 4:00 Break
4:00 - 5:00 Applications of model-checking
Session Chair: Steve Schneider

Probabilistic Analysis of Anonymity
Vitaly Shmatikov (SRI)

Analysis of SPKI/SDSI Certificates Using Model Checking
Somesh Jha and Thomas Reps (University of Wisconsin)

5:30 - 8:00 Whale watching excursion

TUESDAY June 25, 2002

9:00 - 10:30 Protocols II
Session Chair: Dieter Gollmann

Capturing Parallel Attacks within the Data Independence Framework
Philippa J. Broadfoot and Bill Roscoe (Oxford)

Polynomial Fairness and Liveness
Michael Backes (Saarland University), Birgit Pfitzmann (IBM Zurich), Michael Steiner (Saarland University), and Michael Waidner (IBM Zurich)

A Formal Analysis of some Properties of Kerberos 5 using MSR
Frederick Butler (University of Pennsylvania), Iliano Cervesato (ITT Industries), Aaron D. Jaggard (University of Pennsylvania) and Andre Scedrov (University of Pennsylvania)

10:30 - 11:00 Break
11:00 - 12:00 Games
Session Chair: Cathy Meadows

A Formal Analysis of Syverson's Rational Exchange Protocol
Levente Buttyan, Jean-Pierre Hubaux and Srdjan Capkun (EPFL)

Game Analysis of Abuse-free Contract Signing
Steve Kremer and Jean-François Raskin (Université Libre de Bruxelles)

12:00 - 2:00 Lunch
2:00 - 3:30 Language-based security
Session Chair: Andrei Sabelfeld

Fine-grained Information Flow Analysis for a Lambda-Calculus with Sum Types
Vincent Simonet (INRIA)

Cryptographic Types
Dominic Duggan (Stevens Institute)

Secure Information Flow and Pointer Confinement in a Java-like Language
Anindya Banerjee (Kansas State University) and David A. Naumann (Stevens Institute)

3:30 - 4:00 Break
4:00 - 5:00 Business meeting

WEDNESDAY June 26, 2001

9:00 - 10:30 Distributed Rights, Access Control, and Watermarking
Session Chair: Jonathan Millen

A Privacy Policy Model for Enterprises
Guenter Karjoth and Matthias Schunter (IBM Zurich)

A Logic for Reasoning about Digital Rights
Riccardo Pucella and Vicky Weissman (Cornell)

Hiding Functions and Computational Security of Image Watermarking Systems
Nicholas Tran (Santa Clara)

10:30 - 11:00 Break
11:00 - 12:00 Information flow II
Session Chair: Roberto Gorrieri

Information Flow Security in Dynamic Contexts
Riccardo Focardi and Sabina Rossi (University of Venice)

A Simple View of Type-Secure Information Flow in the pi-Calculus
François Pottier (INRIA)

12:00 - 12:15 Closing remarks. Presentation of Croquet Awards
Lunch