PLAS provides a forum for exploring and evaluating the use of programming language and program analysis techniques for promoting security in the complete range of software systems, from compilers to machine-learned models and smart contracts. The workshop encourages proposals of new, speculative ideas, evaluations of new or known techniques in practical settings, and discussions of emerging threats and problems. We also host position papers that are radical, forward-looking, and lead to lively and insightful discussions influential to the future research at the intersection of programming languages and security.
The scope of PLAS includes, but is not limited to:
|
||
---|---|---|
16:00 - 16:05
|
Welcome and Opening Remarks | |
16:05 - 17:00
|
Keynote - Elaine Shi | |
17:00 - 17:10
|
Break 1 | |
17:10 - 18:25
|
Session 1 - Sensitivity Analysis and Security Protocols
|
Marco Gaboardi |
18:25 - 18:35
|
Break 2 | |
18:35 - 19:35
|
Session 2 - Information Flow Control
|
Marco Vassena |
19:35 - 19:45
|
Break 3 | |
19:45 - 21:00
|
Session 3 - Secure ISA and Memory Safety
|
Kristopher Micinski |
Bio: Elaine Shi is an Associate Professor at Carnegie Mellon University. Her research interests include cryptography, algorithms, and foundations of blockchains. Prior to CMU, she taught at the University of Maryland and Cornell University. She is a recipient of the Packard Fellowship, the Sloan Fellowship, the ONR YIP Award, the NSA best scientific cybersecurity paper award, and various other best paper awards.
Abstract. Programming cryptographic systems is error-prone and scales poorly in terms of human expertise. Can we enable ordinary programmers to create distributed programs that correctly use cryptography without requiring them to have a Ph.D. degree in cryptography? I will talk about the challenges towards realizing this dream and progress in tackling them. In particular, I will describe our work that aims to solve two major challenges along the way: 1) how to automatically convert programs to representations (e.g. circuits) recognized by modern cryptographic protocols such as multi-party computation and zero-knowledge; and 2) how to automatically synthesize a cryptographic protocol from a user-level program enriched with security annotations?
We invite both short papers and long papers. All submissions should be anonymous. For short papers, we especially encourage the submission of position papers that are likely to generate lively discussion as well as short papers covering ongoing and future work.
The workshop has no published workshop proceedings and there is no restriction on paper format other than the page limits stated above. Presenting a paper (either short or long) at the workshop does not preclude submission to or publication in other venues that are before, concurrent, or after the workshop. Papers presented at the workshop will be made available to workshop participants only.
Submissions can be made (in PDF format) via HotCRP