FCS-FCC PROGRAM
      Friday, July 18th, 2014
View this program: with abstractssession overviewtalk overviewside by side with other conferences
08:45-09:45 Session 86L: Invited Speaker (joint with ASA)
Chair: 
Location: MB, Hörsaal 7
| 08:45 | Cryptosense: Formal Analysis of Security APIs from Research to Spin-Off (abstract)  | 
09:45-10:15 Session 89B: Technical Session
Chair: 
Location: MB, Hörsaal 7
| 09:45 | A Hybrid Analysis for Security Protocols with State (abstract)  | 
10:15-10:45Coffee Break
10:45-11:45 Session 90AZ: Invited Speaker
Chair: 
Location: MB, Hörsaal 7
| 10:45 | Constructive Cryptography and Security Proofs (abstract)  | 
12:00-13:00 Session 94D: Technical Session
Chair: 
Location: MB, Hörsaal 7
| 12:00 | A tool for automating the computationally complete symbolic attacker (abstract)  | 
| 12:20 | Towards a Coinductive Characterization of Computational Indistinguishability (abstract)  | 
| 12:40 | Actual Causes of Security Violations (abstract)  | 
13:00-14:30Lunch Break
14:30-16:00 Session 96AZ: Technical Session
Chair: 
Location: MB, Hörsaal 7
| 14:30 | Adversary Gain vs. Defender Loss in Quantified Information Flow (abstract)  | 
| 15:00 | Generalizing Permissive-Upgrade in Dynamic Information Flow Analysis (abstract)  | 
| 15:30 | Micro-Policies: Formally Verified Low-Level Tagging Schemes for Safety and Security (Short Paper) (abstract)  | 
16:00-16:30Coffee Break
16:30-18:00 Session 99AV: Technical Session
Chair: 
Location: MB, Hörsaal 7
| 16:30 | Protocol Indistinguishability and the Computationally Complete Symbolic Attacker (abstract)  | 
| 16:50 | On Well-Founded Security Protocols  (abstract)  | 
| 17:10 | Fitting's Embedding of Classical Logic in S4 and Trace Properties in the Computational Model (abstract)  | 
| 17:30 | Towards Timed Models for Cyber-Physical Security Protocols (abstract)  |