David Basin (joint work with Christoph Sprenger) Cryptographically Sound Protocol-Model Abstractions

Similar documents
CSF Adamson Wing Baker Hall 136A. 8:00-9:00 Registration & Breakfast (Giant Eagle lobby, Baker Hall A51)

Non-Classical Logics. Viorica Sofronie-Stokkermans Winter Semester 2012/2013

A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register

How to Write a Paper

Randomness for Ergodic Measures

Design of Fault Coverage Test Pattern Generator Using LFSR

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

2018 Florida Encounter

Logical Foundations of Mathematics and Computational Complexity a gentle introduction

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory.

Formal Verification of Correctness and Performance of Random Priority-based Arbiters

Bulletin of the Transilvania University of Braşov Vol 7(56), No Series III: Mathematics, Informatics, Physics,

Sequences and Cryptography

6.034 Notes: Section 4.1

Security of the Internet of Things

Pseudorandom bit Generators for Secure Broadcasting Systems

BOOK ARTS & LETTERPRESS: COURSE SYLLABUS

Chapter 12. Synchronous Circuits. Contents

Lecture 3: Nondeterministic Computation

How to Predict the Output of a Hardware Random Number Generator

ASP-DAC 2016 Conference Program at A Glance (Final)

The Early History of Asynchronous Circuits and Systems

Digital Signal Processing

Mathematics, Proofs and Computation

Business Intelligence & Process Modelling

Music and Mathematics: On Symmetry

Exhibitor Registration Form June 10-13, 2015

2D ELEMENTARY CELLULAR AUTOMATA WITH FOUR NEIGHBORS

Lecture 16: Feedback channel and source-channel separation

SERVICE DESCRIPTION VIDENS SD-WAN SERVICE MANAGEMENT

Programme overview April 3rd - 4th Industry Days 2014

Dear Parent or Guardian:

MADAGASCAR A Musical Adventure JR.

Indiana University College Audition Preparation (CAP) Tentative Daily Schedule Sunday July 22, 2018

PRESERVATION HALL ANNOUNCES APRIL, 2011 VENUE AND TOURING SCHEDULE, FEATURING:

True Random Number Generation with Logic Gates Only

LBB/BB start Tuesday 22 April start 5.30PM. SO/JS start Thursday 24 April start 4.45PM

Workshop Location Weigel Hall, The Ohio State University School of Music, 1866 College Rd.

UvA-DARE (Digital Academic Repository) Grothendieck inequalities, nonlocal games and optimization Briët, J. Link to publication

40 th ANNUAL HONOR. Registration After arriving, please register and pick up your packet in the Fine Arts Band Work Room -FA 132.

Lecture Notes in Computer Science. Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Peirce's Remarkable Rules of Inference

INTRODUCTION TO AXIOMATIC SET THEORY

Marching Colonels Preseason Schedule August 14 to August 20, :00-9:00 Leadership Team Meeting Foster 212

Testing of Cryptographic Hardware

Doctor of Philosophy

New Address Shift Linear Feedback Shift Register Generator

1360 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH Optimal Encoding for Discrete Degraded Broadcast Channels

Sponsor/Exhibitor/Advertising Prospectus. F or m ore i n f o r m a t io n v isit o u r w e bp a g e! CONFEREN C E FEBRUARY 4 6, 2018

DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS

Tuesday, August 28th: Reading Auditions, Day One 3-5PM. Auditorium. Wednesday, August 29th: Reading Auditions, Day Two 3-5PM. Auditorium.

MATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM

Informatique Fondamentale IMA S8

Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory. National Central University

Model- based design of energy- efficient applications for IoT systems

Analytic Geometry [Kindle Edition] By Vladimir Serdarushich READ ONLINE

Curry s Formalism as Structuralism

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

Musical Harmonization with Constraints: A Survey. Overview. Computers and Music. Tonal Music

Yale University Department of Computer Science

A Novel Low Power pattern Generation Technique for Concurrent Bist Architecture

Mary Baker Russell 116: Cheney Music Education Rm

Audition Info Auditions will be held on Monday, January 12 & Tuesday, January 13 from 4-6pm at Wolf PAC

King Philip Regional Middle School Choral Program Handbook

PART II METHODOLOGY: PROBABILITY AND UTILITY

LSST 2018: August 13-17, 2018

Welcome to the 2014 Adult Summer Reading Club Program!

Chapter 1 Overview of Music Theories

Stream Ciphers. Debdeep Mukhopadhyay

AUDITIONS! Chandler-Gilbert Community College Performing Arts Department Presents. Actors / Singers / Dancers Needed

1 Lesson 11: Antiderivatives of Elementary Functions

Design of Test Circuits for Maximum Fault Coverage by Using Different Techniques

Weighted Random and Transition Density Patterns For Scan-BIST

First day: Saturday, July 16, 2016

Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR

Introduction p. 1 The Elements of an Argument p. 1 Deduction and Induction p. 5 Deductive Argument Forms p. 7 Truth and Validity p. 8 Soundness p.

Marching Band Division June 23-28, 2014 Ball State University Muncie, IN Leadership Weekend Experience June 21-23, 2014

This is an author produced version of Introduction from type theory and homotopy theory to univalent foundations.

WYOMING ALL-STATE AUDITIONS RECORDING SITE CHAIR HANDBOOK

TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS

Testing Digital Systems II

Temporal Knowledge and Musical Perception: Application to Auditive Illusions

Dear All-State Member:

Advanced cryptography - Project

ECEN689: Special Topics in High-Speed Links Circuits and Systems Spring 2011

EXHIBITOR & SPONSORSHIP PROSPECTUS. April 18-20, 2018 Boston, MA Hynes Convention Center #ESACon18

1st INTERNATIONAL UNIVERSITY CHOIR COMPETITION MEDELLÍN 2016

The 2019 Ohio State University July 7-13, 2019 String Teacher Workshop ( )

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Graduate Orientation

MUSIC-ENCODING.ORG/CONFERENCE/2018

Enhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm

Sponsorship Opportunities FloridaHuddle.com

Sponsorship Opportunities

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015

Design of BIST Enabled UART with MISR

Cryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian

INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR NPTEL ONLINE CERTIFICATION COURSE. On Industrial Automation and Control

EXHIBITOR GUIDE MARK YOUR CALENDAR SEPTEMBER 23-26, 2018 INDIANA TOWNSHIP ASSOCIATION ANNUAL EDUCATION CONFERENCE JULY 1 >>>HOTEL ROOM BLOCKS OPEN

MEMBER APPRECIATION WEEK MAY SCHEDULE OF EVENTS

Transcription:

TUESDAY JUNE 24 CSF/ Joint Session McConomy Auditorium, University Center 8:00-8:25 Registration & Breakfast Rangos 2 & 3, University Center 8:25-8:30 Welcome McConomy Auditorium 8:30-9:30 Joint /CSF Invited Talk Chairs: Frank Pfenning, Andrei Sabelfeld David Basin (joint work with Christoph Sprenger) Cryptographically Sound Protocol-Model Abstractions Joint Session: Authorization Logic I Chairs: Andrei Sabelfeld, Frank Pfenning 9:30-10:00 Rohit Chadha, A. Prasad Sistla, Manesh Viswanathan On the Expressiveness and Complexity of Randomization in Finite State Monitors 10:00-10:30 Henry DeYoung, Deepak Garg, Frank Pfenning An Authorization Logic with Explicit Time 10:30-11:00 BREAK (Rangos 2 & 3) Joint Session: Authorization Logic II Chair: John Mitchell 11:00-11:30 Yuri Gurevich, Itay Neeman DKAL: Distributed-Knowledge Authorization Language 11:30-12:00 Glenn Bruns, Michael Huth Access-Control Policies via Belnap Logic: Effective & Efficient Composition & Analysis 12:00-12:30 Jeffrey Vaughan, Limin Jia, Karl Mazurak, Steve Zdancevic Evidence-based Audit 12:30-2:00 LUNCH (Rangos 2 & 3)

TUESDAY JUNE 24 Logical Frameworks Chair: Robert Harper CSF Adamson Wing Baker Hall 136A Protocol Analysis I Chair: Cedric Fournet 2:00-2:30 Andrew Gacek, Dale Miller, Gopalan Nadathur Combining Generic Judgments with Recursive Definitions 2:30-3:00 Christian Urban, James Cheney, Stefan Berghofer Mechanizing the Theory of LF 3:00-3:30 Marcelo Fiore Second-Order & Dependently- Sorted Abstract Syntax 3:30-4:00 Carsten Schuermann, Jeffrey Sarnat Structural Logical Relations Michael Backes, Catalin Hritcu, Matteo Maffei Automated Verification of Remote Electronic Voting Protocols in Applied Pi-calculus Christopher Dilloway & Gavin Lowe Specifying Secure Transport Layers Jean Goubault-Larrecq Towards Producing Formally Checkable Security Proofs, Automatically Stephanie Delaune, Steve Kremer, Mark Ryan Composition of Password-Based Protocols 4:00-4:30 BREAK Giant Eagle Lobby Lambda Calculus Chair: Ugo Dal Lago 4:30-5:00 Makoto Tatsuta Types for Hereditary Permutators 5:00-5:30 Adria Gascon, Guillem Godoy, Manfred Schmidt-Schauss Context Matching for Compressed Terms Cryptographic Foundations Chair: Bruno Blanchet Michael Backes, Dominique Unruh Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers Ralf Kuesters, Max Tuengerthal Joint State Theorems for Public-Key Encryption & Digital Signature Functionalities with Local Computation 5:30-6:30 SHORT TALKS Chair: Frank Pfenning 7:00-9:00 /CSF RECEPTION Phipps Conservatory

WEDNESDAY JUNE 25 CSF Adamson Wing 8:30-9:30 Invited Talk Chair: Stephen Brookes Dexter Kozen Non-local Flow of Control and Kleene Algebra with Tests Algebraic Methods 9:30-10:00 Gordon Plotkin, Matija Pretnar A Logic for Algebraic Effects 10:00-10:30 Emmanuel Beffara An Algebraic Process Calculus Information Flow and Concurrency Chair: Riccardo Focardi Tachio Terauchi A Type System for Observational Determinism Ron van der Meyden, Chenyi Yang Information Flow in Systems with Schedulers 10:30-11:00 BREAK Giant Eagle Lobby Process Calculi Chair: Marcelo Fiore 11:00-11:30 Ivan Lanese, Jorge Perez, Davide Sangiorgi, Alan Schmitt On the Expressiveness and Decidability of Higher-Order Process Calculus 11:30-12:00 Taolue Chen, Wan Fokkink On the Axiomatizability of Impossible Futures: Preorder versus Equivalence 12:00-12:30 Sam Staton General Structural Operational Semantics through Categorical Logic Protocol Analysis II Chair: Vitaly Shmatikov 11:15 Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh Tripunitara A Correctness Proof of a Mesh Security Architecture 11:45 Stephanie Delaune, Steve Kremer, Graham Steel Formal Analysis of PKCS#11 12:15 Closing remarks & Award presentation 12:30-2:00 LUNCH Rangos 2 & 3

WEDNESDAY JUNE 25 Model Checking Chair: Gordon Plotkin 2:00-2:30 Vineet Kahlon Parameterization as Abstraction: A Tractable Approach to the Dataflow Analysis of Concurrent Programs 2:30-3:00 Arnaud Carayol, Matthew Hague, Antoine Meyer, Luke Ong, Olivier Serre Winning Regions of Higher-Order Pushdown Games 3:00-3:30 Pierre Chambart, Philippe Schnoebelen The Ordinal Recursive Complexity of Lossy Channel Systems 3:30-4:00 Christel Baier, Nathalie Bertrand, Patricia Bouyer, Thomas Brihaye, Marcus Groesser Almost-Sure Model Checking of Infinite Paths in One-Clock Timed Automata 4:00-4:30 BREAK Giant Eagle Lobby Proof Theory Chair: Dale Miller 4:30-5:00 Agata Ciabattoni, Nikolaus Galatos, Kazushige Terui From Axioms to Analytic Rules in Non-Classical Logics 5:00-5:30 Daniel Licata, Noam Zeilberger, Robert Harper Focusing on Binding and Computation 5:30-6:00 Guillaume Burel A First-Order Representation of Pure Type Systems using Superdeduction 6:00-6:30 AWARD PRESENTATIONS (Chair: Frank Pfenning, Dexter Kozen) 6:30-7:30 Business Meeting (Chair: Martin Abadi)

THURSDAY JUNE 26 8:30-9:30 Invited Talk Computational Complexity Chair: Martin Abadi Martin Grohe The Quest for a Logic Capturing PTIME 9:30-10:00 Soren Riis On the Asymptotic Nullstellensatz & Polynomial Calculus Proof Complexity 10:00-10:30 Klaus Aehlig, Arnold Beckmann On the Computational Complexity of Cut-Reduction 10:30-11:00 BREAK Giant Eagle Lobby Constraints Chair: Andrei Bulatov 11:00-11:30 Victor Dalmau, Benoit Larose Maltsev + Datalog Symmetric Datalog 11:30-12:00 Catarina Carvalho, Victor Dalmau, Andrei Krokhin Caterpillar Duality for Constraint Satisfaction Problems 12:00-12:30 Barnaby Martin, Florent Madelaine, Hubie Chen Quantified Constraints and Containment Problems 12:30-2:00 LUNCH Rangos 2

THURSDAY JUNE 26 Reasoning about Programs Chair: Luke Ong 2:00-2:30 Francois Pottier Hiding Local State in Direct Style: A Higher-Order Anti-Frame Rule 2:30-3:00 Soren Lassen, Paul Blain Levy Typed Normal Form Bisimulation for Parametric Polymorphism 3:00-3:30 Andrzej Murawski Reachability Games and Game Semantics: On Comparing Non-deterministic Programs 3:30-4:00 Abbas Edalat Weak Topology and Differentiable Operator for Lipschitz Maps 4:00-4:30 BREAK Giant Eagle Lobby Probabilistic Systems Chair: Radha Jagadeesan 4:30-5:00 James Lynch A Logical Characterization of Individual-Based Models 5:00-5:30 Tomas Bradzil, Jan Kretinsky, Antonin Kucera, Vojtech Forejt The Satisfiability Problem for Probabilistic CTL 8:00-10:30 Banquet Heinz History Center Buses leave at 7:00, return at 10:30

FRIDAY JUNE 27, Finite Model Theory Chair: Philip Scott 8:30-9:30 Invited Talk Yiannis Moschovakis The Axiomatic Derivation of Absolute Lower Bounds 9:30-10:00 Martin Grohe Definable Tree Decompositions 10:00-10:30 David Duris Hypergraph Acyclicity and Extension Preservation Theorems 10:30-11:00 BREAK Giant Eagle Lobby Automata Theory Chair: Yuri Gurevich 11:00-11:30 Greg Hjorth, Bakhadyr Khoussainov, Antonio Montalban, Andre Nies From Automatic Structures to Borel Structures 11:30-12:00 Mikolaj Bojanczyk, Luc Segoufin, Howard Straubing Piecewise Testable Tree Languages 12:00-12:30 Matthew Hague, Andrzej Murawski Collapsible Pushdown Automata and Recursion Schemes 12:30-1:00 BOX LUNCH Giant Eagle Lobby

FRIDAY JUNE 27 Linear Logic Chair: Jean Goubault-Larrecq 1:00-1:30 Marc de Falco The Geometry of Interaction of Differential Interaction Nets 1:30-2:00 Virgile Mogbil, Paulin Jacobe de Naurois Correctness of Multiplicative Additive Proof Structures is NL-Complete 2:00-2:30 Roberto Maieli, Olivier Laurent Cut Elimination for Monomial MALL Proof Nets 2:30-3:00 Olivier Delande, Dale Miller A Neutral Approach to Proof and Refutation in MALL 3:00 AM End of Conference