Proceedings of the Computer Security Foundations Workshop II,