The workshop will be held at the Bechtel conference center, Encica Hall located at

Encina Hall
616 Serra Street
Stanford, CA 94305-6055

Workshop program (tentative)

Thursday, May 19, 2016
9:15am
Welcome  
Dan Boneh
9:30am
Two notions of beauty in programming  
Bob Harper
9:52am
Mysteries of Dropbox  
Benjamin Pierce
10:14am
Mind the Gap: From Crypto to Code  
Greg Morrisett
10:36am
Break
11:00am
Data-driven Software Security: Models and Methods  
Ulfar Erlingsson
11:22am
Inheritance from an objective point of view  
Kim Bruce
11:44am
Recollections of John Mitchell’s early career in programming languages  
Dave MacQueen
12:06pm
Thinking Linearly and Nonlinearly  
Pat Lincoln
12:28pm
Lunch
2:00pm
Integrating authorization with information flow  
Andrew Myers
2:22pm
Towards Assessing and Controlling Privacy in Large-Scale, Open Networks  
Michael Backes
2:44pm
Does it Really Help to Use Challenge-Response Rounds Repeatedly?  
Andre Scedrov
3:06pm
Break
3:30pm
On some logic-based approaches to security protocol verification  
Bruno Blanchet
3:52pm
Towards verifying randomized cryptographic protocols  
Rohit Chadha
4:14pm
Panel: formal methods in security  
Brad Martin, Cathy Meadows and Sukarno Mertoguno.   Moderator: Pat Lincoln
5:00pm
Break
5:30pm
Reception and Dinner
Friday, May 20, 2016
9:15am
Welcome  
9:30am
All Your SSL Are Belong To Us  
Vitaly Shmatikov
9:52am
Emerging Issues and Trends in Formal Analysis of Cryptographic Protocols  
Cathy Meadows
10:14am
A Formal Model of Reference Counting  
Natarajan Shankar
10:36am
Break
11:00am
The Privacy of the Analyst and the Power of the State  
Cynthia Dwork
11:22am
Verifiable Electronic Voting  
Vanessa Teague
11:44am
Privacy and Algorithmic Accountability  
Anupam Datta
12:06pm
Security Requirements Management for Large-Scale Software Products  
Ruth Breu
12:28pm
Lunch
2:00pm
Redefining Relevance in Computer Science Research  
Jonathan Mayer
2:22pm
System and security co-design  
Janos Sztipanovits
2:44pm
John Mitchell, Contextual Integrity, and the Meaning of Life  
Helen Nissenbaum
3:06pm
Break
3:30pm
Using Formal Methods to Eliminate Exploitable Bugs  
Kathleen Fisher
3:52pm
Hiding the Metadata in Communication Systems  
Dan Boneh
4:15pm
Workshop end