Workshop on Foundations of Computer Security

June 29, 2013
Tulane University, New Orleans, Louisiana, USA

Affiliated with LICS'13 and CSF'13.

Call for papers | Important dates | Submission | Informal proceedings | PC members | Previous editions
Program | Registration | Informal proceedings

Background, aim and scope

Computer security is an established field of computer science of both theoretical and practical significance. In recent years, there has been increasing interest in logic-based foundations for various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application to confidentiality policies, system composition, and covert channel analysis.

The aim of the workshop FCS'13 is to provide a forum for continued activity in different areas of computer security, bringing computer security researchers in closer contact with the LICS community and giving LICS attendees an opportunity to talk to experts in computer security, on the one hand, and contribute to bridging the gap between logical methods and computer security foundations, on the other.

We are interested both in new results in theories of computer security and also in more exploratory presentations that examine open questions and raise fundamental concerns about existing theories, as well as in new results on developing and applying automated reasoning techniques and tools for the formal specification and analysis of security protocols. We thus solicit submissions of papers both on mature work and on work in progress.
Possible topics include, but are not limited to: 

Automated reasoning techniques
Composition issues
Formal specification
Foundations of verification
Information flow analysis
Language-based security
Logic-based design
Program transformation
Security models
Static analysis
Statistical methods
Trust management
for Access control and resource usage control
Availability and denial of service
Covert channels
Integrity and privacy
Intrusion detection
Malicious code
Mobile code
Mutual distrust
Security policies
Security protocols

All submissions will be peer-reviewed. Authors of accepted papers must guarantee that their paper will be presented at the workshop.


FCS'13 welcomes two kinds of submissions Short abstracts will receive as rigorous review as do full papers. Short abstracts may receive shorter talk slots at the workshop than do full papers, depending on the number of accepted submissions. All papers should be written in the Springer LNCS style available at the URL http://www.springer.de/comp/lncs/authors.html

The cover page should include title, names of authors, co-ordinates of the corresponding author, an abstract, and a list of keywords. Submissions that are clearly too long may be rejected immediately. Additional material intended for the referees but not for publication in the final version - for example details of proofs - may be placed in a clearly marked appendix that is not included in the page limit.

Authors are invited to submit their papers electronically, as portable document format (pdf); please, do not send files formatted for word processing packages (e.g., Microsoft Word or WordPerfect files). The only mechanism for paper submissions is via

the dedicated EasyChair submission web page.

Please, follow the instructions given there.

Invited speaker

Boris Köpf, IMDEA, Spain (Abstract)


The program is now available by following this link.


Registration is via the CSF/LICS/MFPS registration web site. Participation to the workshop is open to anybody willing to register. The early registration deadline is May 22.

Important dates

Submission: April 17, 2013 (extended!)
Notification of acceptance: May 15, 2013 (updated)
Final papers: June 6, 2013 (updated)
Workshop: June 29, 2013

Informal proceedings

The workshop has no published proceedings. Presenting a paper at the workshop should not preclude submission to or publication in other venues. The papers presented at the workshop are publicly available here, but this will not constitute an official proceedings.

Program Committee

Previous editions

Last modified on May 15, 2013.