Five Minute Talks
CSF's popular tradition of a session of 5-minute talks will continue this year! Short talks may be trailers for longer presentations at one of the affiliated workshops, or stand entirely on their own. Work-in progress, provocative ideas, programmatic presentations, and whatever has the potential to stimulate interesting discussions are especially welcome!
Abstracts (in presentation order)
- Architectures for Inlining Security Monitors in Web Applications (txt)
 - HyperLTL (txt)
 - Authenticated Data structures, Generically (txt)
 - Ballot secrecy and ballot independence coincide (txt) (full paper)
 - A Library for Removing Cache-based Attacks in Concurrent Information Flow Systems (txt)
 - Testing Noninterference, Quickly (pdf)
 - How to defend vulnerable security protocols (a visionary approach) (txt)
 - Discovering Security Guarantees via Program Dependence Graphs (txt)
 - Transforming Eval to Staged Metaprogramming (txt)
 - Helping ProVerif Get Over Its Commitment Issues (txt)
 - Information Flow Investigations: Extended Abstract (pdf)
 - What is in a WiFi Access Point Name? (Socio-Technical Threats in Context and Trust) (txt)
 - A mechanized semantics of taint analysis (txt)
 - When not all bits are equal: incorporating "worth" into information-flow measures (txt)
 - Compositional Security for Interactive Systems (pdf)
 - Abstract channels, gain functions and the information order (pdf)
 - CacheAudit: A Tool for the Static Analysis of Cache Side Channels (pdf)
 - A Multi-Role Translation of Protocol Narration into the Spi-Calculus with Correspondence Assertions (txt)
 - Towards Language-Based Network Anonymity (txt)