FCS-FCC '14

Joint Workshop on Foundations of Computer Security and Formal and Computational Cryptography


July 18, 2014
Vienna, Austria

Affiliated with CSF '14 and CSL-LICS '14 as part of the Vienna Summer of Logic.


Call for papers | Important dates | Submission | PC members | Contact | Previous editions
Program | Registration | Informal proceedings


Background, aim and scope

Computer security is an established field of computer science of both theoretical and practical significance. In recent years, there has been sustained interest in logic-based foundations for various methods in computer security, including the formal specification, analysis, and design of cryptographic protocols and their applications; the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks; and the modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis.

The aim of the FCS-FCC 2014 workshop is to provide a forum for continued activity in this area. Historically, FCS has contributed to bringing computer security researchers in closer contact with the LICS community, and given LICS attendees an opportunity to talk to experts in computer security. FCC, traditionally affiliated with CSF, provides a dedicated venue to present recent advances in the field of computationally-sound cryptographic protocol analysis. Both these areas---logical foundations and protocol analysis---are of interest to large subsets of the CSF community.

We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories, as well as in new results on developing and applying automated reasoning techniques and tools for the formal specification and analysis of security protocols. We thus solicit submissions of papers both on mature work and on work in progress.
Possible topics include, but are not limited to: 

Automated reasoning techniques
Composition issues
Formal specification
Foundations of verification
Information flow analysis
Language-based security
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Tools
Trust management
for Access control and resource usage control
Authentication
Availability and denial of service
Covert channels
Confidentiality
Integrity and privacy
Intrusion detection
Malicious code
Mobile code
Mutual distrust
Privacy
Security policies
Security protocols

All submissions will be peer-reviewed. Authors of accepted papers must guarantee that their paper will be presented at the workshop.

Submission

FCS-FCC '14 welcomes two kinds of submissions Short abstracts will receive as rigorous review as do full papers. Short abstracts may receive shorter talk slots at the workshop than do full papers, depending on the number of accepted submissions. Papers should be submitted using the two-column IEEE Proceedings style available for various document preparation systems at the IEEE Conference Publishing Services page.

The cover page should include title, names of authors, co-ordinates of the corresponding author, an abstract, and a list of keywords. Committee members are not required to read appendices, so the paper must be intelligible without them. Papers not adhering to the page limits will be rejected without consideration of their merits.

Authors are invited to submit their papers electronically, as portable document format (pdf) via the

EasyChair submission web page.

Please, do not send files formatted for word processing packages (e.g., Microsoft Word or WordPerfect files).

Invited speakers

Program

Invited talk I Chair: Matteo Maffei
08:45 - 9:45 Cryptosense: Formal Analysis of Security APIs from Research to Spin-Off
Graham Steel
Session I Chair: Limin Jia
09:45 - 10:15 A Hybrid Analysis for Security Protocols with State
John D. Ramsdell, Daniel Dougherty, Joshua Guttman and Paul D. Rowe
10:15 - 10:45 Coffee break
Invited Talk II Chair: Boris Köpf
10:45 - 11:45 Constructive Cryptography and Security Proofs
Ueli Maurer
11:45 - 12:00 Break
Session II Chair: Pedro Adão
12:00 - 12:20 A Tool for Automating the Computationally Complete Symbolic Attacker (Extended Abstract)
Hubert Comon-Lundh, Véronique Cortier and Guillaume Scerri
12:20 - 12:40 Towards a Coinductive Characterization of Computational Indistinguishability (Extended Abstract)
Alberto Cappai and Ugo Dal Lago
12:40 - 13:00 Actual Causes of Security Violations (Extended Abstract)
Anupam Datta, Dilsun Kaynar, Divya Sharma and Arunesh Sinha
13:00 - 14:30 Lunch Break
Session III Chair: Carroll Morgan
14:30 - 15:00 Adversary Gain vs. Defender Loss in Quantified Information Flow
Piotr Mardziel, Mário Alvim and Michael Hicks
15:00 - 15:30 Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis
Abhishek Bichhawat, Vineet Rajani, Deepak Garg and Christian Hammer
15:30 - 15:50 Micro-Policies: Formally Verified Low-Level Tagging Schemes for Safety and Security (Extended Abstract)
Cătălin Hriţcu
16:00 - 16:30 Coffee break
Session IV Chair: Véronique Cortier
16:30 - 16:50 Protocol Indistinguishability and the Computationally Complete Symbolic Attacker (Extended Abstract)
Gergei Bana and Hubert Comon-Lundh
16:50 - 17:10 On Well-Founded Security Protocols (Extended Abstract)
Sibylle Fröschle
17:10 - 17:30 Fitting's Embedding of Classical Logic in S4 and Trace Properties in the Computational Model (Extended Abstract)
Gergei Bana and Mitsuhiro Okada
17:30 - 18:00 Towards Timed Models for Cyber-Physical Security Protocols
Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov and Carolyn Talcott

Registration

Registration is via the VSL registration web site. Participation to the workshop is open to anybody willing to register. The early registration deadline is June 8.

Important dates

Submission: April 25, 2014 (extended!)
Notification of acceptance: May 30, 2014
Final papers: June 25, 2014
Workshop: July 18, 2014

Informal proceedings

The workshop has no published proceedings. Presenting a paper at the workshop should not preclude submission to or publication in other venues. The papers presented at the workshop are available through the links in the program and in compiled form, but this does not constitute an official proceedings.

Program Committee

Contact

To reach the PC chairs, send email to fcsfcc2014@easychair.org

Previous editions



Last modified on Nov 22, 2013.