[ The Types Forum (announcements only), 
     http://lists.seas.upenn.edu/mailman/listinfo/types-announce ]


                      Call for Participation

                   ACM SIGPLAN Fifth Workshop on
         Programming Languages and Analysis for Security
                           (PLAS 2010)

                          June 10, 2010
           Co-located with PLDI 2010, Toronto, Canada



Early registration deadline: May 10, 2010
Hotel reduced rate deadline: May 15, 2010

Register at the PLDI website: http://www.cs.stanford.edu/pldi10/


* Ranjit Jhala (University of California, San Diego)
* Nikhil Swamy (Microsoft Research)


PLAS aims to provide a forum for exploring and evaluating ideas on the
use of programming language and program analysis techniques to improve
the security of software systems. Strongly encouraged are proposals of
new, speculative ideas, evaluations of new or known techniques in
practical settings, and discussions of emerging threats and important
problems. Areas of interest include:

* Compiler-based security mechanisms or runtime-based security
  mechanisms such as inline reference monitors
* Program analysis techniques for discovering security vulnerabilities
* Automated introduction and/or verification of security enforcement
* Language-based verification of security properties in software
  including verification of cryptographic protocols
* Specifying and enforcing security policies for information flow and
  access control
* Model-driven approaches to security
* Security concerns for web programming languages
* Language design for security in new domains such as cloud computing
  and embedded platforms
* Applications, case studies, and implementations of these techniques


PLAS 2010 is pleased to offer a limited number of travel grants to
student attendees thanks to our sponsors. For details, please visit
the PLAS website.


Efficient, Context-Sensitive Detection for Real-World Semantic Attacks
Michael D Bond, Varun Srivastava, Kathryn Mckinley and Vitaly

Permissive Dynamic Information Flow Analysis
Tom Austin and Cormac Flanagan.

Attack Model for Verification of Interval Security Properties for
Smart Card C Codes
Pascal Berthomé, Karine Heydemann, Xavier Kauffman-Tourkestansky and
Jean-Francois Lalande.

A More Precise Security Type System for Dynamic Security Tests
Gregory Malecha and Stephen Chong.

Position Paper: The Case for JavaScript Transactions
Mohan Dhawan, Chung-Chieh Shan and Vinod Ganapathy.

Position Paper: Secure Information Flow Analysis for Hardware Design:
Using the Right Abstraction for the Job
Xun Li, Mohit Tiwari, Ben Hardekopf, Timothy Sherwood and Frederic T

Short Paper: Marker Interfaces and Overlay Type Systems
Adrian Mettler and David Wagner.

Restricted Delegation and Revocation in Language-Based Security
(Position Paper)
Doaa Hassan, Mohammadreza Mousavi and Michel Reniers.


Anindya Banerjee (IMDEA Software Institute) (co-chair)
Gilles Barthe (IMDEA Software Institute)
Avik Chaudhuri (University of Maryland)
Veronique Cortier (LORIA, CNRS)
Brendan Eich (Mozilla Corporation)
Ulfar Erlingsson (Microsoft Research and Reykjavik University)
Deepak Garg (Carnegie Mellon University) (co-chair)
Andrew D. Gordon (Microsoft Research)
Joshua Guttman (Worcester Polytechnic Institute)
Shriram Krishnamurthi (Brown University)
Sergio Maffeis (Imperial College London)
Todd Millstein (University of California, Los Angeles)
John Mitchell (Stanford University)
Marco Pistoia (IBM TJ Watson Research Center)
Andrei Sabelfeld (Chalmers University)
Zhendong Su (University of California, Davis)


IBM Research
IMDEA Software Institute
Microsoft Research
Mozilla Corporation

Reply via email to