Workshop on Computer Security,
Logic, and Programming Languages
Logic, and Programming Languages
In Honor of John Mitchell's 60th Birthday
Stanford University, May, 19-20, 2016
The workshop will be held at the Bechtel conference center, Encica Hall located at
Encina Hall
616 Serra Street
Stanford, CA 94305-6055
616 Serra Street
Stanford, CA 94305-6055
Workshop program (tentative)
Thursday, May 19, 2016 | |
9:15am |
Welcome
Dan Boneh
|
9:30am |
Two notions of beauty in programming
Bob Harper
|
9:52am |
Mysteries of Dropbox
Benjamin Pierce
|
10:14am |
Mind the Gap: From Crypto to Code
Greg Morrisett
|
10:36am | Break
|
11:00am |
Data-driven Software Security: Models and Methods
Ulfar Erlingsson
|
11:22am |
Inheritance from an objective point of view
Kim Bruce
|
11:44am |
Recollections of John Mitchell’s early career in programming languages
Dave MacQueen
|
12:06pm |
Thinking Linearly and Nonlinearly
Pat Lincoln
|
12:28pm | Lunch
|
2:00pm |
Integrating authorization with information flow
Andrew Myers
|
2:22pm |
Towards Assessing and Controlling Privacy in Large-Scale, Open Networks
Michael Backes
|
2:44pm |
Does it Really Help to Use Challenge-Response Rounds Repeatedly?
Andre Scedrov
|
3:06pm | Break
|
3:30pm |
On some logic-based approaches to security protocol verification
Bruno Blanchet
|
3:52pm |
Towards verifying randomized cryptographic protocols
Rohit Chadha
|
4:14pm |
Panel: formal methods in security
Brad Martin, Cathy Meadows and Sukarno Mertoguno. Moderator: Pat Lincoln
|
5:00pm | Break
|
5:30pm | Reception and Dinner
|
Friday, May 20, 2016 | |
9:15am |
Welcome
|
9:30am |
All Your SSL Are Belong To Us
Vitaly Shmatikov
|
9:52am |
Emerging Issues and Trends in Formal Analysis of Cryptographic Protocols
Cathy Meadows
|
10:14am |
A Formal Model of Reference Counting
Natarajan Shankar
|
10:36am | Break
|
11:00am |
The Privacy of the Analyst and the Power of the State
Cynthia Dwork
|
11:22am |
Verifiable Electronic Voting
Vanessa Teague
|
11:44am |
Privacy and Algorithmic Accountability
Anupam Datta
|
12:06pm |
Security Requirements Management for Large-Scale Software Products
Ruth Breu
|
12:28pm | Lunch
|
2:00pm |
Redefining Relevance in Computer Science Research
Jonathan Mayer
|
2:22pm |
System and security co-design
Janos Sztipanovits
|
2:44pm |
John Mitchell, Contextual Integrity, and the Meaning of Life
Helen Nissenbaum
|
3:06pm | Break
|
3:30pm |
Using Formal Methods to Eliminate Exploitable Bugs
Kathleen Fisher
|
3:52pm |
Hiding the Metadata in Communication Systems
Dan Boneh
|
4:15pm | Workshop end
|