CSF A

26 papers

YearTitle / Authors
201225th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012
Stephen Chong
2012A Framework for the Cryptographic Verification of Java-Like Programs.
Ralf Küsters, Tomasz Truderung, Juergen Graf
2012Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties.
Benedikt Schmidt, Simon Meier, Cas Cremers, David A. Basin
2012Automatically Verified Mechanized Proof of One-Encryption Key Exchange.
Bruno Blanchet
2012Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization.
Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna
2012Constructing Optimistic Multi-party Contract Signing Protocols.
Barbara Kordy, Sasa Radomirovic
2012Discovering Concrete Attacks on Website Authorization by Formal Analysis.
Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffeis
2012ENCoVer: Symbolic Exploration for Information Flow Security.
Musard Balliu, Mads Dam, Gurvan Le Guernic
2012Generic Indifferentiability Proofs of Hash Designs.
Marion Daubignard, Pierre-Alain Fouque, Yassine Lakhnech
2012Gran: Model Checking Grsecurity RBAC Policies.
Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Marco Squarcina
2012Information-Flow Control for Programming on Encrypted Data.
John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman
2012Information-Flow Security for a Core of JavaScript.
Daniel Hedin, Andrei Sabelfeld
2012Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction.
Valerio Genovese, Deepak Garg, Daniele Rispoli
2012Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies.
Aslan Askarov, Stephen Chong
2012Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication.
Zhengqin Luo, Tamara Rezk
2012Measuring Information Leakage Using Generalized Gain Functions.
Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Geoffrey Smith
2012Provably Secure and Practical Onion Routing.
Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi
2012Refining Key Establishment.
Christoph Sprenger, David A. Basin
2012Secure Compilation to Modern Processors.
Pieter Agten, Raoul Strackx, Bart Jacobs, Frank Piessens
2012Secure Information Flow for Concurrent Programs under Total Store Order.
Jeffrey A. Vaughan, Todd D. Millstein
2012Securing Interactive Programs.
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
2012Security Analysis of Role-Based Access Control through Program Verification.
Anna Lisa Ferrara, P. Madhusudan, Gennaro Parlato
2012Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings.
Alisa Pankova, Peeter Laud
2012The Thermodynamics of Confidentiality.
Pasquale Malacaria, Fabrizio Smeraldi
2012Verified Security of Merkle-Damgård.
Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella-Béguelin
2012Verifying Privacy-Type Properties in a Modular Way.
Myrto Arapinis, Vincent Cheval, Stéphanie Delaune