Information Trust Institute block of abstract images
Information Trust Institute block of abstract images

Agenda

Monday, July 22, 2013

8:30 a.m. - 9:00 a.m.

Registration

9:00 a.m. - 9:30 a.m.

Welcome and Introduction

David Nicol, Director, Information Trust Institute, Franklin W. Woeltge Professor of Electrical and Computer Engineering, University of Illinois, Urbana‐Champaign
José Meseguer, Professor, Computer Science, University of Illinois, Urbana‐Champaign

9:30 a.m. - 10:30 a.m.

Introduction to Maude‐NPA

Catherine Meadows, Senior Researcher in Computer Security, Center for High
Assurance Systems, Naval Research Laboratory

10:30 a.m. - 10:45 a.m. Break
10:45 a.m. - 11:45 p.m.

Introduction to Security APIs

Graham Steel, Research Fellow, INRIA, France

11:45 a.m. - 12:45 p.m. Lunch Break
12:45 p.m. - 1:45 p.m.

Controlling the Search Space in Maude‐NPA

Catherine Meadows, Senior Researcher in Computer Security, Center for High
Assurance Systems, Naval Research Laboratory

1:45 p.m. - 2:45 p.m.

Cryptographic Key Management APIs

Graham Steel, Research Fellow, INRIA, France

2:45 p.m. - 3:00 p.m. Break
3:00 p.m. - 4:00 p.m.

Lying and Authentication (Part 1 of 3)

Dusko Pavlovic, Professor of Information Security, Dept. of Mathematics Royal Holloway, University of London

4:00 p.m. - 5:00 p.m.

Panel Discussion

Catherine Meadows, Senior Researcher in Computer Security, Center for High
Assurance Systems, Naval Research Laboratory

Dusko Pavlovic, Professor of Information Security, Dept. of Mathematics
Royal Holloway, University of London

Graham Steel, Research Fellow, INRIA, France

Tuesday, July 23, 2013

8:30 a.m. -  9:30 a.m.

Asymmetric Unification and Indistinguishability

Catherine Meadows, Senior Researcher in Computer Security, Center for High Assurance Systems, Naval Research Laboratory

9:30 a.m. - 10:30 a.m.

PIN Processing APIs in the Cash Machine Network

Graham Steel, Research Fellow, INRIA, France

10:30 a.m. - 10:45 a.m. Break
10:45 a.m. - 11:45 a.m.

Practical session: Writing Exploits for PKCS#11 Key Management APIs

Graham Steel, Research Fellow, INRIA, France

11:45 a.m. - 12:45 p.m. Lunch Break
12:45 p.m. - 1:45 p.m.

Computer‐Aided Cryptographic Proofs (Part 1 of 4)

Gilles Barthe, Research Professor, IMDEA‐Software Institute, Spain

1:45 p.m. -  2:45 p.m.

Lying and Authentication (Part 2 of 3)

Dusko Pavlovic, Professor of Information Security, Department of Mathematics
Royal Holloway, University of London

2:45 p.m. -  3:00 p.m. Break
3:00 p.m. –  4:00 p.m.

Special Topics: Unification and Narrowing in Security Applications

Santiago Escobar, Professor, School of Engineering in Computer Science
Universitat Politècnica de València, Spain

4:00 p.m. -  5:00 p.m.

Panel Discussion

Watch This Session

(Video runs from 01:50:20 to 02:14:53)

Gilles Barthe, Research Professor, IMDEA‐Software Institute, Spain
Santiago Escobar, Professor, School of Engineering in Computer Science, Politècnica Universitat de València, Spain
Catherine Meadows, Senior Researcher in Computer Security, Center for High
Assurance Systems, Naval Research Laboratory

Dusko Pavlovic, Professor of Information Security, Department of Mathematics
Royal Holloway, University of London

Graham Steel, Research Fellow, INRIA, France

5:00 p.m. -  7:00 p.m.

Summer School Reception

(Second Floor Terrace, Siebel Center)

Wednesday, July 24, 2013

8:30 a.m. - 9:30 a.m.

Computer‐Aided Cryptographic Proofs (Part 2 of 4)

Gilles Barthe, Research Professor, IMDEA‐Software Institute, Spain

9:30 a.m. - 10:30 a.m.

Computer‐Aided Cryptographic Proofs (Part 3 of 4)

Gilles Barthe, Research Professor, IMDEA‐Software Institute, Spain

10:30 a.m. - 10:45
a.m.
Summer School All-Participants Group Picture/Break
10:45 a.m. - 11:45 a.m.

Special Topics: Equivalence Properties of Cryptographic Protocols and Their Formal Verification

Rohit Chadha, Assistant Professor, Computer Science, University of Missouri

11:45 a.m. - 12:45
p.m.
Lunch Break
12:45 p.m. - 1:45 p.m.

Blueprint for a Science of Security

Fred Schneider, Samuel B. Eckert Professor of Computer Science
Cornell University

1:45 p.m. - 2:45 p.m.

Lying and Authentication (Part 3 of 3)

Dusko Pavlovic, Professor of Information Security, Department of Mathematics
Royal Holloway, University of London

2:45 p.m. - 3:00 p.m. Break
3:00 p.m. - 4:00 p.m.

Special Topics: Rewriting Logic Methods in Security: The DOS Case

José Meseguer, Professor, Computer Science, University of Illinois, Urbana‐Champaign

4:00 p.m. – 5:00 p.m.

Panel Discussion

Watch This Session

(Video runs from 01:18:39 to 02:14:53)

Gilles Barthe, Research Professor, IMDEA‐Software Institute, Spain
Rohit Chadha, Assistant Professor, Computer Science, University of Missouri
José Meseguer, Professor, Computer Science, University of Illinois,
Urbana‐Champaign

Dusko Pavlovic, Professor of Information Security, Department of Mathematics
Royal Holloway, University of London

Fred Schneider, Samuel B. Eckert

 

Thursday, July 25, 2013

8:30 a.m. - 9:30 a.m.

Computer‐Aided Cryptographic Proofs (Part 4 of 4)

Gilles Barthe, Research Professor, IMDEA‐Software Institute, Spain

9:30 a.m. - 10:30 a.m.

Credentials‐Based Authorization I: Logic

Fred Schneider, Samuel B. Eckert Professor of Computer Science
Cornell University

10:30 a.m. - 10:45
a.m.
Break
10:45 a.m. - 11:45 a.m.

Credentials‐Based Authorization II: Pragmatics

Fred Schneider, Samuel B. Eckert Professor of Computer Science
Cornell University

11:45 a.m. - 12:45 p.m. Lunch Break
12:45 p.m. - 1:45 p.m.

Special Topics: Hyperproperties

Michael Clarkson, Assistant Professor, Computer Science
George Washington University

1:45 p.m. - 2:45 p.m.

Special Topics: Quantifying Information Flow Using Min‐entropy and G‐leakage

Geoffrey Smith, Associate Professor, School of Computing and Information Sciences, Florida International University

2:45 p.m. - 3:00 p.m. Break
3:00 p.m. - 4:00 p.m.

Panel Discussion

Watch this session

(Video runs from 02:37:23 to 03:28:43)

Gilles Barthe, Research Professor, IMDEA‐Software Institute, Spain
Fred Schneider, Samuel B. Eckert Professor of Computer Science, Cornell University
Michael Clarkson, Assistant Professor, Computer Science, George Washington
University

Geoffrey Smith, Associate Professor, School of Computing and Information Sciences, Florida International University

6:00 p.m. - 8:00 p.m.

Summer School Dinner

(National Center for Supercomputing Applications)

 

Friday, July 26, 2013

8:30 a.m. - 9:30 a.m.

Monitoring and Enforcing Data‐Usage Policies (Part 1 of 2)

Felix Klaedtke, Professor, Computer Science, ETH‐Zurich, Switzerland

9:30 a.m. - 9:45 a.m. Break
9:45 a.m. – 10:45 a.m.

Monitoring and Enforcing Data‐Usage Policies (Part 2 of 2)

Felix Klaedtke, Professor, Computer Science, ETH‐Zurich, Switzerland

10:45 a.m. – 11:45 a.m.

Wrap Up Panel Discussion

Watch this session

(Video runs from 02:30:00 to 03:20:29)

Felix Klaedtke, Professor, Computer Science, ETH‐Zurich, Switzerland,
and other panelists

11:45 a.m. Boxed Lunches Provided: End of Summer School