| 2016 | A Calculus for Flow-Limited Authorization. Owen Arden, Andrew C. Myers |
| 2016 | A Certified Compiler for Verifiable Computing. Cédric Fournet, Chantal Keller, Vincent Laporte |
| 2016 | A Methodology for Formalizing Model-Inversion Attacks. Xi Wu, Matthew Fredrikson, Somesh Jha, Jeffrey F. Naughton |
| 2016 | A Verified Extensible Library of Elliptic Curves. Jean Karim Zinzindohoue, Evmorfia-Iro Bartzia, Karthikeyan Bhargavan |
| 2016 | Access Control Synthesis for Physical Spaces. Petar Tsankov, Mohammad Torabi Dashti, David A. Basin |
| 2016 | Analysis of Key Wrapping APIs: Generic Policies, Computational Security. Guillaume Scerri, Ryan Stanley-Oakes |
| 2016 | Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only). Ross J. Anderson |
| 2016 | Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers. Bruno Blanchet, Ben Smyth |
| 2016 | Axioms for Information Leakage. Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith |
| 2016 | Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. Yannis Juglaret, Catalin Hritcu, Arthur Azevedo de Amorim, Boris Eng, Benjamin C. Pierce |
| 2016 | CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. Jeremiah Blocki, Anupam Datta |
| 2016 | Calculational Design of Information Flow Monitors. Mounir Assaf, David A. Naumann |
| 2016 | Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. Toby C. Murray, Robert Sison, Edward Pierzchalski, Christine Rizkallah |
| 2016 | Correlated Secrets in Quantitative Information Flow. Nicolás E. Bordenabe, Geoffrey Smith |
| 2016 | Data-Driven Software Security: Models and Methods. Úlfar Erlingsson |
| 2016 | Fault-Resilient Non-interference. Filippo Del Tedesco, David Sands, Alejandro Russo |
| 2016 | Hybrid Monitoring of Attacker Knowledge. Frédéric Besson, Nataliia Bielova, Thomas P. Jensen |
| 2016 | IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016 |
| 2016 | In the Nick of Time: Proactive Prevention of Obligation Violations. David A. Basin, Søren Debois, Thomas T. Hildebrandt |
| 2016 | Localizing Firewall Security Policies. Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio |
| 2016 | Micro-policies for Web Session Security. Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei |
| 2016 | Modeling Human Errors in Security Protocols. David A. Basin, Sasa Radomirovic, Lara Schmid |
| 2016 | Modular Verification for Computer Security. Andrew W. Appel |
| 2016 | Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT. Corina S. Pasareanu, Quoc-Sang Phan, Pasquale Malacaria |
| 2016 | Non-interference with What-Declassification in Component-Based Systems. Simon Greiner, Daniel Grahl |
| 2016 | On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. Vineet Rajani, Deepak Garg, Tamara Rezk |
| 2016 | On Modular and Fully-Abstract Compilation. Marco Patrignani, Dominique Devriese, Frank Piessens |
| 2016 | On Post-compromise Security. Katriel Cohn-Gordon, Cas Cremers, Luke Garratt |
| 2016 | Quantitative Verification and Synthesis of Attack-Defence Scenarios. Zaruhi Aslanyan, Flemming Nielson, David Parker |
| 2016 | Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design. M. H. R. Khouzani, Pasquale Malacaria |
| 2016 | Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete. Marcos Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, Marc Denecker |
| 2016 | Runtime Verification of k-Safety Hyperproperties in HyperLTL. Shreya Agrawal, Borzoo Bonakdarpour |
| 2016 | Secure Software Licensing: Models, Constructions, and Proofs. Sergiu Costea, Bogdan Warinschi |
| 2016 | Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems. Stefano Calzavara, Alvise Rabitti, Enrico Steffinlongo, Michele Bugliesi |
| 2016 | sElect: A Lightweight Verifiable Remote Voting System. Ralf Küsters, Johannes Müller, Enrico Scapin, Tomasz Truderung |