Lecture Notes in Computer Science 7140

Similar documents
Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 7342

Lecture Notes in Computer Science 4728

Lecture Notes in Computer Science 7480

Lecture Notes in Computer Science 3819

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 5474

Lecture Notes in Computer Science 8341

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 5004

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Computer Science 6037

Lecture Notes in Artificial Intelligence 2155

Lecture Notes in Computer Science 4797

Lecture Notes in Computer Science 4214

Lecture Notes in Computer Science 5671

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science 5438

Lecture Notes in Computer Science 4883

Lecture Notes in Computer Science 10644

Research Reports ESPRIT

Lecture Notes in Computer Science 6647

Lecture Notes in Computer Science 5083

Lecture Notes in Computer Science 9804

Lecture Notes in Computer Science 6035

Lecture Notes in Computer Science 8036

The Archaeology of Anxiety

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 7149

Lecture Notes in Computer Science 3527

Arild Stubhaug. Gösta Mittag-Leffler. AManofConviction. Translated by Tiina Nunnally

Lecture Notes in Computer Science 4449

Lecture Notes in Computer Science 9635

Lecture Notes in Computer Science 3507

Lecture Notes in Computer Science 7679

Lecture Notes in Computer Science 5587

CoPDA Barbara Rita Barricelli Ali Gheitasy Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science 7734

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 10744

Lecture Notes in Computer Science 5581

Lecture Notes in Computer Science 6084

Emotional Engineering Volume 5

CoPDA Barbara Rita Barricelli Gerhard Fischer Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science 8031

Lecture Notes in Computer Science 7617

Lecture Notes in Artificial Intelligence 4327

German Yearbook on Business History 1986

Lecture Notes in Computer Science 6705

SERGIU KLAINERMAN CURRICULUM VITAE

Early Modern Philosophers and the Renaissance Legacy

Lecture Notes in Computer Science 9249

Gordon Stewart Curriculum Vitae

Lecture Notes in Computer Science 9211

Nonprofit and Civil Society Studies

Lecture Notes in Computer Science 6815

Lecture Notes in Computer Science 7896

Lecture Notes in Computer Science 7744

Lecture Notes in Computer Science 7137

Lecture Notes in Computer Science 7189

Curriculum Vitae Person Education Professional career

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

Lecture Notes in Computer Science 7309

Lecture Notes in Computer Science 5284

Lecture Notes in Computer Science 3925

Lecture Notes in Computer Science 9596

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Computer Science 7384

Lecture Notes in Computer Science 10852

Lecture Notes in Computer Science 3061

My Life with Eggs: Forty Years On

9.0 SCOR-RELATED MEETINGS

Lecture Notes in Computer Science 4006

High-Rise Living in Asian Cities

Lecture Notes in Computer Science 6697

Studies in Epistemology, Logic, Methodology, and Philosophy of Science

Lecture Notes in Computer Science 6092

American Literature. Narratives of Multiculturalism in Post-Imperial Turkey. Interamericana 10. Elena Furlanetto

Lecture Notes in Artificial Intelligence 6517

Housing markets, wealth and the business cycle

Curriculum Vitae for Marlis Buchman

Lecture Notes in Computer Science 6371

Lecture Notes in Computer Science 4935

gpehihpcl'upn sdii-gei tim GE ng Fiae^'ban*' and pq>-er ujeibel with contributions by

Homepage: volpe. Curriculum Vitae

Lecture Notes in Computer Science 8203

Lecture Notes in Computer Science 6527

Study. Review of External Market Valuations of Properties Located Abroad. HypZert Professional Group International. As at: November 2011

By Bodil Branner and Caroline Series Presented in Barcelona, September 2011.

Lecture Notes in Artificial Intelligence

Lecture Notes in Computer Science 6182

Ulrik M. Nyman - Curriculum Vitæ

Process Maturity Profile

TRAVEL FELLOWSHIP. John Belle traveling in England between studies at the Architectural Association in London.

Lecture Notes in Computer Science 4355

Lecture Notes in Computer Science

Transcription:

Lecture Notes in Computer Science 7140 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany

Gilles Barthe Anupam Datta Sandro Etalle (Eds.) Formal Aspects of Security and Trust 8th International Workshop, FAST 2011 Leuven, Belgium, September 12-14, 2011 Revised Selected Papers 13

Volume Editors Gilles Barthe Universidad Politecnica de Madrid IMDEA Software Institute Campus Montegancedo 28660 Boadilla del Monte, Madrid, Spain E-mail: gilles.barthe@imdea.org Anupam Datta Carnegie Mellon University NASA Research Park, Bldg. 23 (MS 23-11) P.O. Box 1 Moffet Field, CA 94035-0001, USA E-mail: danupam@cmu.edu Sandro Etalle Technical University of Eindhoven Faculty of Mathematics and Computer Science Embedded Systems Security Group P.O. Box 513 5600 MB Eindhoven, The Netherlands E-mail: s.etalle@tue.nl ISSN 0302-9743 e-issn 1611-3349 ISBN 978-3-642-29419-8 e-isbn 978-3-642-29420-4 DOI 10.1007/978-3-642-29420-4 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2012934839 CR Subject Classification (1998): C.2.0, K.6.5, D.4.6, E.3, K.4.4, H.3-4, J.1 LNCS Sublibrary: SL 4 Security and Cryptology Springer-Verlag Berlin Heidelberg 2012 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface The present volume contains the proceedings of the 8th International Workshop on Formal Aspects of Security and Trust (FAST 2011), held in Leuven, Belgium, September 12 14, 2011, in co-location with the 16th European Symposium on Research in Computer Security (ESORICS). FAST sought original papers focusing on formal aspects of the following topics: security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed trust management systems; trust-based reasoning; digital assets protection; data protection; privacy and ID issues; information flow analysis; language-based security; security and trust aspects of ubiquitous computing; validation/analysis tools; Web service security/trust/privacy; grid security; security risk assessment; and case studies. The Program Committee of FAST 2011 received 42 submissions in response to the Call for Papers. Our warmest thanks go to all the authors of submitted papers for sending their work to the conference. Each paper was reviewed by three members of the Program Committee; we thank all the external reviewers for their valuable efforts. Based on the review reports and electronic discussions, the Program Committee selected 15 papers for inclusion in the proceedings. The proceedings contain revised versions of these 15 accepted papers, and two papers that accompany invited lectures by Andrew D. Gordon (Microsoft Research and University of Edinburgh), and Frank Piessens (Katholieke Universiteit Leuven). We are grateful to the invited speakers for accepting to address the conference, and to the members of the Program Committee for their assistance in the paper selection. We are also grateful to the local organizers of ESORICS 2011 for providing a perfect environment for running the workshop, and to Andrei Voronkov for his EasyChair system. November 2011 Gilles Barthe Anupam Datta Sandro Etalle

Organization Program Committee Gilles Barthe Konstantinos Chatzikokolakis Stephen Chong Michael Clarkson Ricardo Corin Cas Cremers Anupam Datta Sandro Etalle Cédric Fournet Deepak Garg Peter Herrmann Bart Jacobs Christian Damsgaard Jensen Steve Kremer Fabio Martinelli Fabio Massacci Sjouke Mauw Ron van der Meyden Mogens Nielsen Mark Ryan Luca Viganò IMDEA Software Institute, Spain CNRS and Ecole Polytechnique, France Harvard University, USA George Washington University, USA Universidad Nacional de Córdoba, Argentina ETH Zurich, Switzerland Carnegie Mellon University, USA T.U. Eindhoven and University of Twente, The Netherlands Microsoft Research, USA Carnegie Mellon University, USA NTNU Trondheim, Norway Radboud University Nijmegen, The Netherlands Technical University of Denmark, Denmark LSV, ENS Cachan, CNRS, INRIA, France IIT-CNR, Italy University of Trento, Italy University of Luxembourg, Luxembourg University of New South Wales, Australia BRICS, University of Aarhus, Denmark University of Birmingham, UK University of Verona, Italy Additional Reviewers Alvim, Mario S. Barletta, Michele Bielova, Nataliia Bursuc, Sergiu Clavel, Manuel Costa, Gabriele De Ruiter, Joeri Dechesne, Francien Delaune, Stephanie Gadyatskaya, Olga Garcia, Flavio D. Harvan, Matus Huisman, Marieke Jeffrey, Alan Koleini, Masoud Kordy, Barbara Koshutanski, Hristo Kunnemann, Robert Lee, Matías D. Li, Ninghui Manzano, Felipe Matteucci, Ilaria

VIII Organization Melissen, Matthijs Mödersheim, Sebastian Paci, Federica Pagano, Miguel Pang, Jun Radomirović, Saša Ramanujam, R. Samardjiska, Simona Schmidt, Benedikt Shkaravska, Olha Su, Kaile Torabi Dashti, Mohammad Ullman, Jonathan Van Deursen, Ton Verdult, Roel Yautsiukhin, Artsiom

Table of Contents Verifying Cryptographic Code in C: Some Experience and the Csec Challenge... 1 Mihhail Aizatulin, François Dupressoir, Andrew D. Gordon, and Jan Jürjens Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation... 21 Willem De Groef, Dominique Devriese, and Frank Piessens Differential Privacy: On the Trade-Off between Utility and Information Leakage... 39 Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, and Catuscia Palamidessi On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow... 55 Luciano Bello and Eduardo Bonelli Min-Entropy Leakage of Channels in Cascade... 70 Barbara Espinoza and Geoffrey Smith Secure Recharge of Disposable RFID Tickets... 85 Riccardo Focardi and Flaminia L. Luccio Avoiding Delegation Subterfuge Using Linked Local Permission Names... 100 Simon N. Foley and Samane Abdi Verifiable Control Flow Policies for Java Bytecode... 115 Arnaud Fontaine, Samuel Hym, and Isabelle Simplot-Ryl Concepts and Proofs for Configuring PKCS#11... 131 Sibylle Fröschle and Nils Sommer Service Automata... 148 Richard Gay, Heiko Mantel, and Barbara Sprick Analysing Applications Layered on Unilaterally Authenticating Protocols... 164 Thomas Gibson-Robinson and Gavin Lowe Type-Based Enforcement of Secure Programming Guidelines Code Injection Prevention at SAP... 182 Robert Grabowski, Martin Hofmann, and Keqin Li

X Table of Contents TBA : A Hybrid of Logic and Extensional Access Control Systems... 198 Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders, and John C. Mitchell Diffie-Hellman without Difficulty... 214 Sebastian Mödersheim Is Cryptyc Able to Detect Insider Attacks?... 230 Behnam Sattarzadeh and Mehran S. Fallah Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes... 245 Ben Smyth, Mark Ryan, and Liqun Chen Risk Balance in Optimistic Non-repudiation Protocols... 263 Mohammad Torabi Dashti, Jan Cederquist, and Yanjing Wang Author Index... 279