Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3264820acmconferencesBook PagePublication PagespldiConference Proceedingsconference-collections
PLAS '18: Proceedings of the 13th Workshop on Programming Languages and Analysis for Security
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security Toronto Canada October 15 - 19, 2018
ISBN:
978-1-4503-5993-1
Published:
15 October 2018
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 14 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 13th ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS 2018), co-located with the 25th ACM Conference on Computer and Communications Security (ACM CCS 2018). Over its now more than ten-year history, PLAS has provided a unique forum for researchers and practitioners to exchange ideas about programming language and program analysis techniques with the goal of improving the security of software systems.

This year, PLAS received high quality submissions attesting the continued vitality of the community whose work sits at the intersection of programming languages and security. PLAS 2018 welcomed the submission of both long research papers as well as short papers presenting preliminary or exploratory work aiming at generating lively discussions at the workshop. PLAS 2018 attracted 10 submissions-of which, 6 were short papers-from 8 countries (Belgium, Estonia, France, Israel, Japan, Sweden, United Kingdom, USA), with authors spanning both academia and industry.

Skip Table Of Content Section
SESSION: Invited Talk
invited-talk
Public Access
Formal Verification of Differential Privacy

Differential Privacy offers ways to answer statistical queries about sensitive data while providing strong provable privacy guarantees ensuring that the presence or absence of a single individual in the data has a negligible statistical effect on the ...

SESSION: Session on Differential Privacy
research-article
Public Access
Sensitivity Analysis of SQL Queries

The sensitivity of a function is the maximum change of its output for a unit change of its input. In this paper we present a method for determining the sensitivity of SQL queries, seen as functions from databases to datasets, where the change is ...

short-paper
Geometric Noise for Locally Private Counting Queries

Local differential privacy (LDP) is a variant of differential privacy (DP) where the noise is added directly on the individual records, before being collected. The main advantage with respect to DP is that we do not need a trusted third party to collect ...

SESSION: Session on Information Flow
short-paper
Prudent Design Principles for Information Flow Control

Recent years have seen a proliferation of research on information flow control. While the progress has been tremendous, it has also given birth to a bewildering breed of concepts, policies, conditions, and enforcement mechanisms. Thus, when designing ...

short-paper
A Perspective on the Dependency Core Calculus

This paper presents a simple but equally expressive vari- ant on the terminating fragment of the Dependency Core Calculus (DCC) of Abadi et al. [2]. DCC is a concise and elegant calculus for tracking dependency. The calculus has applications in, among ...

research-article
Securing Compilation Against Memory Probing

A common security recommendation is to reduce the in-memory lifetime of secret values, in order to reduce the risk that an attacker can obtain secret data by probing memory. To mitigate this risk, secret values can be overwritten, at source level, after ...

SESSION: Invited Talk
invited-talk
Public Access
Network Verification: Successes, Challenges, and Opportunities

Formal verification of computer networks has become a reality in recent years, with the emergence of a large number of domain-specific property-checking tools. Although early tools were limited to stateless data planes, recent work has shown how to ...

SESSION: Session on Analysis of Binary Code
short-paper
Binary Similarity Detection Using Machine Learning

Finding similar procedures in stripped binaries has various use cases in the domains of cyber security and intellectual property. Previous works have attended this problem and came up with approaches that either trade throughput for accuracy or address ...

short-paper
Context-Sensitive Flow Graph and Projective Single Assignment Form for Resolving Context-Dependency of Binary Code

Program analysis on binary code is considered as difficult because one has to resolve destinations of indirect jumps. However, there is another difficulty of context-dependency that matters when one processes binary programs that are not compiler ...

Contributors
  • Federal University of Minas Gerais
  • University of Rennes
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

PLAS '18 Paper Acceptance Rate 2 of 4 submissions, 50%;
Overall Acceptance Rate 43 of 77 submissions, 56%
YearSubmittedAcceptedRate
PLAS '184250%
PLAS '1710880%
PLAS '1611655%
PLAS'159556%
PLAS'1410660%
PLAS '1314857%
PLAS '0919842%
Overall774356%