CSF A

39 papers

YearTitle / Authors
2023$\pi_{\mathbf{RA}}$: A $\pi\text{-calculus}$ for Verifying Protocols that Use Remote Attestation.
Emiel Lanckriet, Matteo Busi, Dominique Devriese
202336th IEEE Computer Security Foundations Symposium, CSF 2023, Dubrovnik, Croatia, July 10-14, 2023
2023A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow Integrity.
Matthieu Baty, Pierre Wilke, Guillaume Hiet, Arnaud Fontaine, Alix Trieu
2023A State-Separating Proof for Yao's Garbling Scheme.
Chris Brzuska, Sabine Oechsner
2023Analyzing the Shuffle Model Through the Lens of Quantitative Information Flow.
Mireya Jurado, Ramon G. Gonze, Mário S. Alvim, Catuscia Palamidessi
2023Basilic: Resilient-Optimal Consensus Protocols with Benign and Deceitful Faults.
Alejandro Ranchal-Pedrosa, Vincent Gramoli
2023Bayes Security: A Not So Average Metric.
Konstantinos Chatzikokolakis, Giovanni Cherubin, Catuscia Palamidessi, Carmela Troncoso
2023Collusion-Deterrent Threshold Information Escrow.
Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate
2023Cross-Chain Swaps with Preferences.
Eric Chan, Marek Chrobak, Mohsen Lesani
2023Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE.
Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
2023Election Verifiability in Receipt-Free Voting Protocols.
Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
2023Election Verifiability with ProVerif.
Vincent Cheval, Véronique Cortier, Alexandre Debant
2023Extending the Authentication Hierarchy with One-Way Agreement.
Johannes Wilson, Mikael Asplund, Niklas Johansson
2023Formalizing Stack Safety as a Security Property.
Sean Noble Anderson, Roberto Blanco, Leonidas Lampropoulos, Benjamin C. Pierce, Andrew Tolmach
2023From Bounded to Unbounded: Privacy Amplification via Shuffling with Dummies.
Shun Takagi, Fumiyuki Kato, Yang Cao, Masatoshi Yoshikawa
2023General-Purpose Secure Conflict-free Replicated Data Types.
Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes
2023High-Assurance Field Inversion for Curve-Based Cryptography.
Benjamin Salling Hvass, Diego F. Aranha, Bas Spitters
2023HoRStify: Sound Security Analysis of Smart Contracts.
Sebastian Holler, Sebastian Biewer, Clara Schneidewind
2023Indistinguishability Beyond Diff-Equivalence in ProVerif.
Vincent Cheval, Itsaka Rakotonirina
2023Investigating Membership Inference Attacks under Data Dependencies.
Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum
2023Keep Spending: Beyond Optimal Cyber-Security Investment.
Yunxiao Zhang, Pasquale Malacaria
2023OblivIO: Securing Reactive Programs by Oblivious Execution with Bounded Traffic Overheads.
Jeppe Fredsgaard Blaabjerg, Aslan Askarov
2023On Sustainable Ring-Based Anonymous Systems.
Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo
2023On the (De) centralization of FruitChains.
Aikaterini-Panagiota Stouka, Thomas Zacharias
2023On the Incoercibility of Digital Signatures.
Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia
2023Optimally Hiding Object Sizes with Constrained Padding.
Andrew C. Reed, Michael K. Reiter
2023Preimage Awareness in Linicrypt.
Zahra Javar, Bruce M. Kapron
2023Proving Unlinkability Using ProVerif Through Desynchronised Bi-Processes.
David Baelde, Alexandre Debant, Stéphanie Delaune
2023Robust Safety for Move.
Marco Patrignani, Sam Blackshear
2023Securing Optimized Code Against Power Side Channels.
Rodothea-Myrsini Tsoupidi, Roberto Castañeda Lozano, Elena Troubitsyna, Panagiotis Papadimitratos
2023Smart Contract Synthesis Modulo Hyperproperties.
Norine Coenen, Bernd Finkbeiner, Jana Hofmann, Julia J. Tillman
2023SoK: Delay-Based Cryptography.
Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia
2023SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap.
Sayanton V. Dibbo
2023Statement-Oblivious Threshold Witness Encryption.
Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
2023Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis.
Cas Cremers, Charlie Jacomme, Philip Lukert
2023Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers.
Farzaneh Derakhshan, Zichao Zhang, Amit Vasudevan, Limin Jia
2023Towards a Game-Theoretic Security Analysis of Off-Chain Protocols.
Sophie Rain, Georgia Avarikioti, Laura Kovács, Matteo Maffei
2023Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information.
Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan
2023Zero-Knowledge in EasyCrypt.
Denis Firsov, Dominique Unruh