Third Language-theoretic Security (LangSec) IEEE Security & Privacy Workshop |
Preliminary Program |
7:30-8:30am | Breakfast |
8:45-9am | Opening Words from the Organizers |
9:00-10am | Keynote: Doug McIlroy, "Buy/by the Book Or Bye-Bye the Game" |
10:20-10:50am | Morning Coffee Break |
10:50am-12:30pm | First Session: Papers |
| Guillaume Endignoux, Olivier Levillain, Jean-Yves Migeon, "Caradoc: a Pragmatic Approach to PDF Parsing and Validation" |
| Katherine Underwood, Michael Locasto, "In Search Of Shotgun Parsers In Android Applications" |
| Harald Lampesberger, "An Incremental Learner for Language-Based Anomaly Detection in XML" |
| Sheridan Curley, Richard Harang, "Grammatical Inference and Machine Learning Approaches to Post-Hoc LangSec" |
12:30-1:30pm | Lunch |
1:30-3:10pm | Second Session: Research Reports |
| Peter Aldous, Matthew Might, "A Posteriori Taint-tracking for Demonstrating Non-interference in Expressive Low-level Languages" |
| Sven Hallberg, Adam Crain, Meredith L. Patterson, Sergey Bratus, "The State of Hammer: Ready for ICS" |
| Jacob Torrey, Jonathan Miodownik, "Research Report: Analysis of Software for Restricted Computational Environment Applicability" |
| Nathaniel Filardo, "Mitigating LangSec Problems With Capabilities" |
3:10-3:40pm | Afternoon Coffee Break |
3:40-5:30pm | Third Session: Work-in-progress Reports, Invited Presentations, Panel |
| Rick McGeer, "Declarative Verifiable SDI Specifications" |
| Matthew Van Gundy, "Complex Paths and Derelict Sentinels: software engineering underpinnings of recent NTP vulnerabilities" |
| Erik Bosman, "Some musings on the deduplication weird machine" |
| The LangSec Panel: Toward a LangSec Software Development Lifecycle |
5:30-6pm | Thanks & Further Research Directions |