2nd Workshop on
Hot Issues in Security Principles
and Trust (HotSpot 2014)
Affiliated with ETAPS 2014
5th April 2014 in Grenoble, France.
9:00 - 10:30 Session 1 chaired by Peter Ryan
- Mark Ryan and Jia Liu Verifiably accountable
surveillance. Extended abstract
Lili Xu, Konstantinos Chatzikokolakis, Huimin Lin and Catuscia
Palamidessi Metrics for Differential Privacy in Concurrent
- Chiara Bodei, Pierpaolo Degano, Letterio Galletta and Francesco
Salvatori Here you can't: context-aware security. Paper
11:00 - 12:30 Session 2 chaired by Mark Ryan
- Massimo Bartoletti, Alceste Scalas and Roberto Zunino
Towards a theory of honesty. Paper
- Davide Basile, Pierpaolo Degano and Gian-Luigi Ferrari Automata for
Service Contracts. Paper
- Pedro Adão, Claudio Bozzato, Gian-luca Dei Rossi, Riccardo Focardi and Flaminia
semantic based tool for firewall configuration. Extended abstract
14:00 - 16:00 Session 3 chaired by
- Invited talk: David Naccache, ENS
Using Physics to Solve Security Related Problems. Slides available
upon request from David Naccache.
Talk included paper
New Algorithmic Approaches to Point Constellation Recognition. Paper (joint work with Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, Antoine Voizard)
- Afonso Arriaga, Qiang Tang and Peter Ryan Trapdoor Privacy in
Asymmetric Searchable Encryption Schemes. Paper
Jiangshan Yu, Vincent Cheval and Mark Ryan DTKI: Distributed
transparent key infrastructure.
16:30 - 18:00 Session 4 chaired by
- Miriam Paiola and Bruno Blanchet From the Applied Pi Calculus to Horn
Clauses for Protocols with Lists. Paper
- Vincent Cheval and Veronique Cortier Timing attacks: symbolic framework
and proof techniques. Extended abstract
- Ghazi Maatoug, Frédéric Dadeau and Michaël Rusinowitch Model-Based
Vulnerability Testing of Payment Protocol Implementations. Paper
This workshop is intended to be a less formal counterpart to the
Principles of Security and Trust (POST) conference at ETAPS, and with
an emphasis on "hot topics", both of security and of its theoretical
foundations and analysis.
Like POST, the themes are:
- theory of computer security;
- formal specification, analysis and design of security systems;
- automated reasoning for security analysis.
Submissions about new and emerging topics (for example, those that
have not appeared prominently in conferences and workshops until now)
are particularly encouraged. Submissions of preliminary, tentative
work are also encouraged. There is no page limit, but the length of
your submission should be appropriate to its content. There will be no
formal proceedings. Inclusion in informal proceedings is optional.
Blanchet, INRIA Paris-Rocquencourt
- Pierpaolo Degano, University of Pisa
- Dieter Gollmann, Hamburg University of Technology
- Joshua Guttman, Worcester Polytechnic Institute
- Jan Jürjens, TU Dortmund & Fraunhofer ISST
Lafourcade, Clermont University
- Gavin Lowe, University of Oxford
- Matteo Maffei, Saarland University
Mödersheim, Technical University of Denmark
- Carroll Morgan, University of New South Wales
- Jean-Jacques Quisquater, Catholic University of Louvain
- Mark Ryan, University of Birmingham
- Peter Y. A. Ryan, University of Luxembourg
- Steve Schneider, University of Surrey
Sprenger, ETH Zürich
Viganò, King's College London
This workshop is organised by
IFIP WG 1.7: Theoretical Foundations of Security Analysis and Design.
Submissions were via EasyChair.
Sebastian Mödersheim (program chair): email@example.com.
Registration, accommodation and travel
Information about registration, accommodation and travel will be
made available on the ETAPS web site.