Principles of Security and Trust is a broad forum related to all theoretical and foundational aspects of security and trust.
We seek submissions on the foundations of information security, privacy, and trust, relevant for computer science and different application disciplines. Case studies that reflect the strengths and limitations of existing foundations, methods, and their supporting tools are also welcome, as are more exploratory presentations on open questions.
Areas of interest include:
Access control | Accountability | Anonymity |
Authentication | Availability | Cloud security |
Confidentiality | Covert channels | Crypto foundations |
Cyber-physical systems security | Database security | Distributed systems security |
Security and privacy economics | Hardware security | Information flow |
Integrity | Languages for security | Malicious code |
Mobile security and privacy | Models and policies | Privacy and privacy-preserving systems |
Provenance | Reputation and trust | Resource usage |
Risk assessment | Security architectures | Security protocols |
Trust management | Usable security and privacy | Usage control |
Web security and privacy |
Thu 11 AprDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
10:30 - 12:30 | |||
10:30 30mTalk | Foundations for Parallel Information Flow Control Runtime Systems POST Marco Vassena Chalmers University of Technology, Gary Soeller , Peter Amidon , Matthew Chan , John Renner University of California, San Diego, Deian Stefan University of California San Diego Link to publication | ||
11:00 30mTalk | A Formal Analysis of Timing Channel Security via Bucketing POST Link to publication | ||
11:30 30mTalk | A Dependently Typed Library for Static Information-Flow Control in Idris POST Simon Oddershede Gregersen Aarhus University, Søren Eller Thomsen Aarhus University, Aslan Askarov Aarhus University Link to publication | ||
12:00 30mTalk | Achieving Safety Incrementally with Checked C POST Andrew Ruef , Leonidas Lampropoulos University of Pennsylvania, Ian Sweet , David Tarditi , Michael Hicks University of Maryland, College Park Link to publication |
14:00 - 16:00 | |||
14:00 30mTalk | Wys*: A DSL for Verified Secure Multi-party Computations POST Aseem Rastogi Microsoft Research, Nikhil Swamy Microsoft Research, Michael Hicks University of Maryland, College Park Link to publication | ||
14:30 30mTalk | Generalised Differential Privacy for Text Document Processing POST Link to publication | ||
15:00 30mTalk | Symbolic verification of distance bounding protocols POST Link to publication | ||
15:30 30mTalk | On the formalisation of Σ-Protocols and Commitment Schemes POST Link to publication |
16:30 - 17:30 | |||
16:30 30mTalk | Orchestrating Layered Attestations POST John D. Ramsdell , Paul D. Rowe , Perry Alexander , Sarah Helble , Peter Loscocco , J. Aaron Pendergrass , Adam Petz Link to publication | ||
17:00 30mTalk | Verifying liquidity of Bitcoin contracts POST Link to publication |
Accepted Papers
Call for Papers
Important dates and submission instructions
See the ETAPS 2019 joint call for papers. Submit your paper through the POST 2019 author interface of Easychair.
The review process of POST 2019 is double-blind, with a rebuttal phase.
Authors are asked to omit their names, institutions, and other directly identifying information; refer to their prior work in the third person, just as to prior work by others; and not to include acknowledgements that might identify them.
Paper categories
POST 2019 solicits four types of contributions: regular research papers, systematization of knowledge papers, position papers and tool demonstration papers.
Regular research papers
POST allows regular research paper submissions of at most 20 pages (excluding bibliography). Additional material intended for reviewers but not for publication in the final version—for example, details of proofs—may be placed in a clearly marked appendix that is not included in the page limit. POST reviewers are at liberty to ignore appendices and papers must be understandable without them.
Systematization of knowledge (SoK) papers
SoK papers evaluate, systematize, and contextualize existing knowledge. Suitable papers are those that provide an important new viewpoint on established research areas, challenge long-held beliefs in such an area with compelling evidence, or present a comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate. Submissions should be distinguished by the prefix “SoK:” in the title. They will be reviewed by the PC and held to the same standards as traditional research papers, except instead of emphasizing novel research contributions the emphasis will be on value to the community.
The page limit is as for regular research papers – 20 pages (excluding the bibliography).
Position papers
Position papers that present a well justified stance on a fundamental but possibly controversial question. For example: “Privacy should trump security in all cases” (or the other way around), “Cryptocurrencies should be outlawed because… / encouraged because …”, “Why we should/should not research internet-based voting”. A position paper can also propose new directions for foundational research without having worked out all technical details. Position papers will be selected based on originality, likelihood of stimulating insightful discussion at the conference, and technical merit.
Position papers may be no longer than 10 pages (excluding bibliography) and their titles must start with the words “Position Paper:”.
Tool demonstration papers
Submissions of tool demonstration papers should consist of two parts:
The first part, at most 6 pages, should describe the tool presented and provide information that illustrates the maturity and robustness of the tool (this part will be included in the proceedings). If available, the URL of the tool should be provided in the appropriate form field when submitting your paper. This field can only been seen by PC chairs, and hence, it does not have to be anonymized. Of course, authors may also include anonymized URLs directly in their submission. The title of the submission should start with the words “Tool Demonstration:”.
The second part should be either (i) a video of the demonstration, max 15 minutes, which sketches the planned demo talk; a URL to the video should be sent to the program chairs separately at the time of submission, or (ii) an appendix of at most 6 pages, which should explain how the demonstration will be carried out and what it will show, including screen dumps and examples. (This part will not be included in the proceedings, but will be evaluated.)