CSF A

35 papers

YearTitle / Authors
2016A Calculus for Flow-Limited Authorization.
Owen Arden, Andrew C. Myers
2016A Certified Compiler for Verifiable Computing.
Cédric Fournet, Chantal Keller, Vincent Laporte
2016A Methodology for Formalizing Model-Inversion Attacks.
Xi Wu, Matthew Fredrikson, Somesh Jha, Jeffrey F. Naughton
2016A Verified Extensible Library of Elliptic Curves.
Jean Karim Zinzindohoue, Evmorfia-Iro Bartzia, Karthikeyan Bhargavan
2016Access Control Synthesis for Physical Spaces.
Petar Tsankov, Mohammad Torabi Dashti, David A. Basin
2016Analysis of Key Wrapping APIs: Generic Policies, Computational Security.
Guillaume Scerri, Ryan Stanley-Oakes
2016Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only).
Ross J. Anderson
2016Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers.
Bruno Blanchet, Ben Smyth
2016Axioms for Information Leakage.
Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith
2016Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation.
Yannis Juglaret, Catalin Hritcu, Arthur Azevedo de Amorim, Boris Eng, Benjamin C. Pierce
2016CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection.
Jeremiah Blocki, Anupam Datta
2016Calculational Design of Information Flow Monitors.
Mounir Assaf, David A. Naumann
2016Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference.
Toby C. Murray, Robert Sison, Edward Pierzchalski, Christine Rizkallah
2016Correlated Secrets in Quantitative Information Flow.
Nicolás E. Bordenabe, Geoffrey Smith
2016Data-Driven Software Security: Models and Methods.
Úlfar Erlingsson
2016Fault-Resilient Non-interference.
Filippo Del Tedesco, David Sands, Alejandro Russo
2016Hybrid Monitoring of Attacker Knowledge.
Frédéric Besson, Nataliia Bielova, Thomas P. Jensen
2016IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016
2016In the Nick of Time: Proactive Prevention of Obligation Violations.
David A. Basin, Søren Debois, Thomas T. Hildebrandt
2016Localizing Firewall Security Policies.
Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio
2016Micro-policies for Web Session Security.
Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei
2016Modeling Human Errors in Security Protocols.
David A. Basin, Sasa Radomirovic, Lara Schmid
2016Modular Verification for Computer Security.
Andrew W. Appel
2016Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT.
Corina S. Pasareanu, Quoc-Sang Phan, Pasquale Malacaria
2016Non-interference with What-Declassification in Component-Based Systems.
Simon Greiner, Daniel Grahl
2016On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
Vineet Rajani, Deepak Garg, Tamara Rezk
2016On Modular and Fully-Abstract Compilation.
Marco Patrignani, Dominique Devriese, Frank Piessens
2016On Post-compromise Security.
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
2016Quantitative Verification and Synthesis of Attack-Defence Scenarios.
Zaruhi Aslanyan, Flemming Nielson, David Parker
2016Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design.
M. H. R. Khouzani, Pasquale Malacaria
2016Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete.
Marcos Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, Marc Denecker
2016Runtime Verification of k-Safety Hyperproperties in HyperLTL.
Shreya Agrawal, Borzoo Bonakdarpour
2016Secure Software Licensing: Models, Constructions, and Proofs.
Sergiu Costea, Bogdan Warinschi
2016Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems.
Stefano Calzavara, Alvise Rabitti, Enrico Steffinlongo, Michele Bugliesi
2016sElect: A Lightweight Verifiable Remote Voting System.
Ralf Küsters, Johannes Müller, Enrico Scapin, Tomasz Truderung