Five Minute Talks
CSF's popular tradition of a session of 5-minute talks will continue this year! Short talks may be trailers for longer presentations at one of the affiliated workshops, or stand entirely on their own. Work-in progress, provocative ideas, programmatic presentations, and whatever has the potential to stimulate interesting discussions are especially welcome!
Abstracts (in presentation order)
- Architectures for Inlining Security Monitors in Web Applications (txt)
- HyperLTL (txt)
- Authenticated Data structures, Generically (txt)
- Ballot secrecy and ballot independence coincide (txt) (full paper)
- A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems (txt)
- Testing Noninterference, Quickly (pdf)
- How to defend vulnerable security protocols (a visionary approach) (txt)
- Discovering Security Guarantees via Program Dependence Graphs (txt)
- Transforming Eval to Staged Metaprogramming (txt)
- Helping ProVerif Get Over Its Commitment Issues (txt)
- Information Flow Investigations: Extended Abstract (pdf)
- What is in a WiFi Access Point Name? (Socio-Technical Threats in Context and Trust) (txt)
- A mechanized semantics of taint analysis (txt)
- When not all bits are equal: incorporating "worth" into information-flow measures (txt)
- Compositional Security for Interactive Systems (pdf)
- Abstract channels, gain functions and the information order (pdf)
- CacheAudit: A Tool for the Static Analysis of Cache Side Channels (pdf)
- A Multi-Role Translation of Protocol Narration into the Spi-Calculus with Correspondence Assertions (txt)
- Towards Language-Based Network Anonymity (txt)