It is our great pleasure to welcome you to the 13th ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS 2018), co-located with the 25th ACM Conference on Computer and Communications Security (ACM CCS 2018). Over its now more than ten-year history, PLAS has provided a unique forum for researchers and practitioners to exchange ideas about programming language and program analysis techniques with the goal of improving the security of software systems.
This year, PLAS received high quality submissions attesting the continued vitality of the community whose work sits at the intersection of programming languages and security. PLAS 2018 welcomed the submission of both long research papers as well as short papers presenting preliminary or exploratory work aiming at generating lively discussions at the workshop. PLAS 2018 attracted 10 submissions-of which, 6 were short papers-from 8 countries (Belgium, Estonia, France, Israel, Japan, Sweden, United Kingdom, USA), with authors spanning both academia and industry.
Proceeding Downloads
Formal Verification of Differential Privacy
Differential Privacy offers ways to answer statistical queries about sensitive data while providing strong provable privacy guarantees ensuring that the presence or absence of a single individual in the data has a negligible statistical effect on the ...
Sensitivity Analysis of SQL Queries
The sensitivity of a function is the maximum change of its output for a unit change of its input. In this paper we present a method for determining the sensitivity of SQL queries, seen as functions from databases to datasets, where the change is ...
Geometric Noise for Locally Private Counting Queries
Local differential privacy (LDP) is a variant of differential privacy (DP) where the noise is added directly on the individual records, before being collected. The main advantage with respect to DP is that we do not need a trusted third party to collect ...
Prudent Design Principles for Information Flow Control
Recent years have seen a proliferation of research on information flow control. While the progress has been tremendous, it has also given birth to a bewildering breed of concepts, policies, conditions, and enforcement mechanisms. Thus, when designing ...
A Perspective on the Dependency Core Calculus
This paper presents a simple but equally expressive vari- ant on the terminating fragment of the Dependency Core Calculus (DCC) of Abadi et al. [2]. DCC is a concise and elegant calculus for tracking dependency. The calculus has applications in, among ...
Securing Compilation Against Memory Probing
A common security recommendation is to reduce the in-memory lifetime of secret values, in order to reduce the risk that an attacker can obtain secret data by probing memory. To mitigate this risk, secret values can be overwritten, at source level, after ...
Network Verification: Successes, Challenges, and Opportunities
Formal verification of computer networks has become a reality in recent years, with the emergence of a large number of domain-specific property-checking tools. Although early tools were limited to stateless data planes, recent work has shown how to ...
Binary Similarity Detection Using Machine Learning
Finding similar procedures in stripped binaries has various use cases in the domains of cyber security and intellectual property. Previous works have attended this problem and came up with approaches that either trade throughput for accuracy or address ...
Context-Sensitive Flow Graph and Projective Single Assignment Form for Resolving Context-Dependency of Binary Code
Program analysis on binary code is considered as difficult because one has to resolve destinations of indirect jumps. However, there is another difficulty of context-dependency that matters when one processes binary programs that are not compiler ...
Index Terms
- Proceedings of the 13th Workshop on Programming Languages and Analysis for Security