HCSS'15

file

Visible to the public HCSS 2015 Artifacts

Contents include slide presentations, posters, and proceedings booklet.

file

Visible to the public Private Disclosure of Information

Abstract:

The healthcare domain is prime for investigating privacy. Any information about the subject's physical, cognitive and/or mental states is private. A medical technology with increasing attention is health tele-monitoring, where a technology is used to collect health-related data about patients, which are later submitted to a medical staff for monitoring. The data are then used to assess the health-status of patients and provide them with feedback and/or intervention.

file

Visible to the public High Assurance Cryptography Synthesis with Cryptol

Abstract:

HCSS participants, in the main, know about Galois' Cryptol language and system and its capabilities. In short, Cryptol is a domain-specific language for programming, executing, testing, and formally reasoning about streams of bits. Cryptol particularly excels at specifying and reasoning about cryptographic algorithms. As summarized last year at HCSS, Galois has "rebooted" Cryptol and created, from the ground up, a new Open Source Cryptol release: Cryptol version 2.

file

Visible to the public A Cut Principle for Information Flow

Abstract:

We view a distributed system as a graph of active locations with unidirectional channels between them, through which they pass messages. In this context, the graph structure of a system constrains the propagation ofinformation through it.

file

Visible to the public Bringing Hardware Hacking to Life

Abstract:

But is it practical? This question is always banded about to dismiss some research publication showing an advanced attack such as side-channel power analysis or glitching. Most of these publications are using university-backed labs or expensive commercial equipment, leading to the assumption an attacker wouldalso require such equipment.