csstalk

Liquid Information Flow Control

Modern applications handle sensitive user data in complex ways, subject to increasingly complex security policies. A promising approach to enforcing these policies is to use Information Flow Control (IFC) frameworks, which separate policy …

w0RLd w1dE W3b - The dangers of web security inconsistencies

Web application security is a complicated matter. To assist site operators in secure web application development, browser vendors offer client-side security mechanisms designed to offer robust protection against common threats. Unfortunately, prior …

Let's not make a fuzz about it

The work of Fuzz has pioneered the use of functional programming languages where types allow reasoning about the sensitivity of programs. Fuzz and subsequent work (e.g., DFuzz and Duet) use technical devices like linear types, modal types, and …

HMAC and 'Secure Preferences': Revisiting Chromium-Based Browsers Security

Google disabled years ago the possibility to freely modify some internal configuration parameters, so options like silently (un)install browser extensions, changing the home page or the search engine were banned. This capability was as simple as …

Security Assurance Cases for Road Vehicles: an Industry Perspective

How can security be assured in safety-cricial domains?

An Overview of Vehicular Security

This talk will give a first overview of research and activities trending in automotive security. We will look at future cooperative vehicle safety systems where cellular communications (i.e., 4G, 5G) and IEEE 802.11p are technologies enabling …

Decentralized Action Integrity for Trigger-Action Platforms

Securing OAuth tokens through security principles

When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise

Who: Catalin Hritcu from Inria Paris, France \ When: 14:00 - 15:00 Thursday {{ page.date | date_to_long_string }}\ Where: Room ES52, Linsen (Maskingränd 2).\ Title: {{ page.title }} Abstract:\ We propose a new formal criterion for evaluating secure compartmentalization schemes for unsafe languages like C and C++, expressing end-to-end security guarantees for software components that may become compromised after encountering undefined behavior—for example, by accessing an array out of bounds.

Risk Analysis of Privacy Policies

Who: Raúl Pardo Jimenez from IT University of Copenhagen, Denmark \ When: 11:00 - 12:00 Friday {{ page.date | date_to_long_string }}\ Where: Room 8103, EDIT building.\ Title: {{ page.title }}

The Simplest Multi-key Linearly Homomorphic Signature Scheme

Who: Elena Pagnin from Aarhus University, Denmark \ When: 10:00 - 11:00 Thursday {{ page.date | date_to_long_string }}\ Where: Room 8103, EDIT building.\ Title: {{ page.title }} Abstract:\ We consider the problem of outsourcing computation on data authenticated by different users.