| Friday, August 19, 2005
| Slides
|
| 8:30
| Coffee (D⁢ lunchroom, 7th floor)
|
|
| 9:00
| Hanne Riis Nielson, DTU
| Abstract transition graphs for pi-calculus processes
|
| 9:25
| Q&A;
|
| 9:30
| Christian Probst, DTU
| A Portable Virtual Machine Target For
Proof-Carrying Code
| slides
|
| 9:55
| Q&A;
|
| 10:00
| David Sands, Chalmers
| On Flow Sensitive Security Types
|
| 10:25
| Q&A;
|
| 10:30
| Coffee
|
| 11:00
| Heiko Mantel, RWTH Aachen
| Eliminating Implicit Information Leaks by
Transformational Typing and Unification
|
| 11:25
| Q&A;
|
| 11:30
| Mads Dam, KTH
| Decidability and proof systems for language-based non-interference
relations
| preprint on request
|
| 11:55
| Q&A;
|
| 12:00
| Lunch
|
| 1:30
| Alejandro Russo, Stevens
| Declassification by Self-composition and
Assertions
| slides
|
| 1:45
| Q&A;
|
| 1:50
| Tobias Gedell, Chalmers
| Loop Analysis in KeY
| slides
|
| 2:10
| Q&A;
|
| 2:15
| Aslan Askarov, Chalmers
| Security-typed languages for implementation of cryptographic protocols: A case study
| slides
|
| 2:40
| Q&A;
|
| 2:45
| Coffee
|
|
| 3:15
| Rene Rydhof Hansen, DTU
| Non-interference for Carmel
| slides
|
| 3:40
| Q&A;
|
| 3:45
| Terkel Tolstrup, DTU
| Non-interference for VHDL
| slides
|
| 4:10
| Q&A;
|
| 4:15
| Coffee
|
|