Protocol eXchange Meeting - May 2013
Protocol eXchange Meeting
National Cryptologic Museum
Magic Room
May 14-15, 2013
Organized by Ed Zieglar
Tuesday, May 14th
08:00 - 08:30 | Arrival and Welcome |
08:30 - 09:20 | Analysis of SIP and TLS update Frank Acker (DoD) |
09:20 - 10:10 | Unification and Matching in Formal Diffie-Hellman Derivation Environments [pdf] Moses Liskov (MITRE) |
10:10 - 10:20 | Break |
10:20 - 11:10 | State-Based Constraints in Protocol Analysis [pdf] Paul Rowe (MITRE) |
11:10 - 12:00 | Security Goals: From CPSA to PVS [pdf] John Ramsdell (MITRE) |
12:00 - 13:30 | Lunch |
13:30 - 14:20 | A New Input Language for Maude-NPA Andrew Cholewa (University of Illinois Urbana-Champaign) and Cathy Meadows (NRL) |
14:20 - 15:10 | Application-Sensitive Access Control Evaluation [pdf] Adam Lee (University of Pittsburgh) |
15:10 - 16:00 | TPM backup protocol analysis update Olga Chen (NRL) |
17:00 - ??:?? | Dinner |
Wednesday, May 15th
08:00 - 08:30 | Arrival and Welcome |
08:30 - 09:20 | Routing constraints and traffic disruption: reconciling two worlds [pdf] Alexander J. T. Gurney (University of Pennsylvania) |
09:20 - 10:10 | A Formal Framework for Secure Routing Protocols [pdf] Chen Chen (University of Pennsylvania) |
10:10 - 10:20 | Break |
10:20 - 11:10 | Decidability of security goals for a class of Diffie-Hellman protocols [pdf] Joshua Guttman (MITRE) and Dan Dougherty (Worcester Polytechnic Institute) |
11:10 - 12:00 | Protocols for Independently-Verifiable Elections: Non- Rigorous Descriptions Poorvi Vora (George Washington University) |
12:00 - 13:30 | Lunch |
13:30 - 14:20 | Bounded Memory Protocols and Unbounded Adversary Andre Scedrov (University of Pennsylvania) |
14:20 - 15:10 | When not all bits are equal: Incorporating "worth" into information-flow measures Mario Alvin (University of Pennsylvania) |
15:10 - 15:45 | GUI for the Maude-NPA Carolyn Talcott (SRI) |
15:45 - 16:00 | Wrap-up |