Blogs (61) >>
Tue 17 Jul 2018 14:30 - 15:00 at Bangkok - Session 2 Chair(s): Frank S. de Boer

Cryptographic protocols are often specified by narrations, i.e., finite sequences of message exchanges that show the intended execution of the protocol. Another use of narrations is to describe attacks. We propose in this paper to compile, when possible, attack describing narrations into a set of tests that honest participants can perform to exclude these executions. These tests can be implemented in monitors to protect existing implementation from rogue behaviour.

Tue 17 Jul

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

14:00 - 15:30
Session 2VORTEX at Bangkok
Chair(s): Frank S. de Boer Centrum Wiskunde & Informatica, Leiden University
14:00
30m
Talk
SNITCH: dynamic dependent Information flow for independent Java bytecode
VORTEX
P: Eduardo Geraldo , João Costa Seco NOVA LINCS -- Universidade Nova de Lisboa
14:30
30m
Talk
Implementing security protocol monitors
VORTEX
15:00
30m
Talk
On Distributed runtime verification by aggregate computing
VORTEX
Giorgio Audrito Università di Torino, P: Ferruccio Damiani University of Turin, Volker Stolz Høgskulen på Vestlandet, Mirko Viroli University of Bologna