Blogs (61) >>
Tue 17 Jul 2018 14:30 - 15:00 at Bangkok - Session 2 Chair(s): Frank S. de Boer

Cryptographic protocols are often specified by narrations, i.e., finite sequences of message exchanges that show the intended execution of the protocol. Another use of narrations is to describe attacks. We propose in this paper to compile, when possible, attack describing narrations into a set of tests that honest participants can perform to exclude these executions. These tests can be implemented in monitors to protect existing implementation from rogue behaviour.

Tue 17 Jul
Times are displayed in time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

14:00 - 15:30
Session 2VORTEX at Bangkok
Chair(s): Frank S. de BoerCentrum Wiskunde & Informatica, Leiden University
14:00
30m
Talk
SNITCH: dynamic dependent Information flow for independent Java bytecode
VORTEX
P: Eduardo Geraldo, João Costa SecoNOVA LINCS -- Universidade Nova de Lisboa
14:30
30m
Talk
Implementing security protocol monitors
VORTEX
15:00
30m
Talk
On Distributed runtime verification by aggregate computing
VORTEX
Giorgio AudritoUniversità di Torino, P: Ferruccio DamianiUniversity of Turin, Volker StolzHøgskulen på Vestlandet, Mirko ViroliUniversity of Bologna