Days: Saturday, July 19th Sunday, July 20th Monday, July 21st Tuesday, July 22nd
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 08:45 | FLoC Plenary Talk: From Reachability to Temporal Specifications in Game Theory (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 08:45 | FLoC Panel: Publication Models in Computing Research: Is a Change Needed? Are We Ready for a Change? (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 09:00 | FLoC Olympic Games Big Screen: OWL Reasoner Evaluation (ORE 2014) (abstract)  | 
| 09:00 | FLoC Olympic Games Big Screen: Satisfiability Modulo Theories solver competition (SMT-COMP 2014) (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 08:45 | FLoC Panel: Computational Complexity and Logic: Theory vs. Experiments (abstract)  | 
| 10:45 | Declarative Policies for Capability Control (abstract)  | 
| 11:15 | Portable Software Fault Isolation (abstract)  | 
| 11:45 | Certificates for Verifiable Forensics (abstract)  | 
| 12:15 | Information flow monitoring as abstract interpretation for relational logic (abstract)  | 
| 14:30 | Synthesis of Masking Countermeasures against Side Channel Attacks (abstract)  | 
| 14:50 | Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (abstract)  | 
| 15:10 | Program Verification through String Rewriting (abstract)  | 
| 15:30 | A Conference Management System with Verified Document Confidentiality (abstract)  | 
| 15:50 | VAC - Verifier of Administrative Role-based Access Control Policies (abstract)  | 
| 16:30 | Towards a Zero-Software Trusted Computing Base for Extensible Systems (abstract)  | 
| 17:30 | On Dynamic Flow-sensitive Floating-Label Systems (abstract)  | 
| 18:00 | Noninterference under Weak Memory Models (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 08:45 | FLoC Plenary Talk: Electronic voting: how logic can help? (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 10:15 | FLoC Olympic Games Big Screen: 7th IJCAR ATP System Competition (CASC-J7) (abstract)  | 
| 10:15 | FLoC Olympic Games Big Screen: Termination Competition (termCOMP 2014) (abstract)  | 
| 10:45 | Who’s Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness (abstract)  | 
| 11:15 | How task familiarity and cognitive predispositions impact behavior in a security game of timing (abstract)  | 
| 11:45 | Panel: Usability (abstract)  | 
| 14:30 | Attribute-based Encryption for Access Control Using Elementary Operations (abstract)  | 
| 15:00 | Automated Analysis and Synthesis of Block-Cipher Modes of Operation (abstract)  | 
| 15:30 | Certified Synthesis of Efficient Batch Verifiers (abstract)  | 
| 14:30 | FLoC Olympic Games: Answer Set Programming Modeling Competition 2014 (abstract)  | 
| 16:30 | A Peered Bulletin Board for Robust Use in Verifiable Voting Systems (abstract)  | 
| 17:00 | From input private to universally composable secure multiparty computation primitives (abstract)  | 
| 17:30 | Malleable Signatures: New Definitions and Delegatable Anonymous Credentials (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 10:45 | Decidability for Lightweight Diffie-Hellman Protocols (abstract)  | 
| 11:15 | Modeling Diffie-Hellman Derivability for Automated Analysis (abstract)  | 
| 11:45 | Actor Key Compromise: Consequences and Countermeasures (abstract)  | 
| 12:15 | A Sound Abstraction of the Parsing Problem (abstract)  | 
| 14:30 | Compositional Information-flow Security for Interactive Systems (abstract)  | 
| 15:00 | Stateful Declassification Policies for Event-Driven Programs (abstract)  | 
| 15:30 | Additive and multiplicative notions of leakage, and their capacities (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 16:30 | New Directions in Computed-Aided Cryptography (abstract)  | 
| 08:45 | VSL Keynote Talk: Ontology-Based Monitoring of Dynamic Systems (abstract)  | 
| 19:00 | VSL Public Lecture: Vienna Circle(s) - Between Philosophy and Science in Cultural Context (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 10:45 | The Complexity of Estimating Systematic Risk in  Networks (abstract)  | 
| 11:15 | Automated Generation of Attack Trees (abstract)  | 
| 11:45 | Mignis: A semantic based tool for firewall configuration (abstract)  | 
| 12:15 | Provably Sound Browser-Based Enforcement of Web Session Integrity (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 16:30 | FLoC Olympic Games Award Ceremony 2 (abstract)  | 
| 18:00 | Lifetime Achievement Award (abstract)  | 
| 18:10 | Lifetime Achievement Award (abstract)  | 
| 18:20 | EMCL Distinguished Alumni Award (abstract)  | 
| 18:30 | FLoC Closing Week 2 (abstract)  | 
View this program: with abstractssession overviewtalk overviewside by side with other conferences
| 14:30 | Privacy in the Age of Augmented Reality (abstract)  | 
| 15:30 | Balancing Societal Security and Individual Privacy: Accountable Escrow System (abstract)  | 
| 16:30 | TUC: Time-sensitive and Modular Analysis of Anonymous Communication (abstract)  | 
| 17:00 | Differential Privacy: An Economic Method for Choosing Epsilon (abstract)  | 
| 17:30 | Proving differential privacy in Hoare logic (abstract)  | 
| 18:00 | Surveillance and Privacy (abstract)  | 
| 08:45 | VSL Keynote Talk: Verification of Computer Systems with Model Checking (abstract)  |