Proceedings Computer Security Foundations Workshop IV