| From 09:00 | Coffee & croissants | |
| 09:00-09:30 | Geoffrey Smith | Vulnerability Bounds for Cryptography under Timing Attacks |
| 09:30-10:00 | Mark Ryan | Analysing hardware-based security APIs |
| 10:00-10:30 | MohammadReza Mousavi | Delegation and Revocation in Language-Based Security |
| 10:30-11:00 | Steve Kremer | Deciding trace equivalence in cryptographic process calculi for a bounded number of sessions |
| 11:00-11:30 | Coffee break | |
| 11:30-12:00 | Josée Desharnais | Approximate bisimulation and a corresponding metric |
| 12:00-12:30 | Miguel E. Andrés | Conditional Probabilities over Probabilistic and Nondeterministic Systems |
| 12:30-14:00 | Lunch | |
| 14:00-14:30 | Philippe Darondeau | Opacity Control |
| 14:30-15:00 | Michele Boreale | Some remarks on indistinguishability and probability of error |
| 15:00-15:30 | Coffee break | |
| 15:30-16:00 | Catuscia Palamidessi | Information Theory and Information Flow |
| 16:00-16:30 | Mário S. Alvim | Interactive Information Flow |
| 16:30-17:00 | Romain Beauxis | Oblivious schedulers and information flow |