| 2023 | $\pi_{\mathbf{RA}}$: A $\pi\text{-calculus}$ for Verifying Protocols that Use Remote Attestation. Emiel Lanckriet, Matteo Busi, Dominique Devriese |
| 2023 | 36th IEEE Computer Security Foundations Symposium, CSF 2023, Dubrovnik, Croatia, July 10-14, 2023 |
| 2023 | A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow Integrity. Matthieu Baty, Pierre Wilke, Guillaume Hiet, Arnaud Fontaine, Alix Trieu |
| 2023 | A State-Separating Proof for Yao's Garbling Scheme. Chris Brzuska, Sabine Oechsner |
| 2023 | Analyzing the Shuffle Model Through the Lens of Quantitative Information Flow. Mireya Jurado, Ramon G. Gonze, Mário S. Alvim, Catuscia Palamidessi |
| 2023 | Basilic: Resilient-Optimal Consensus Protocols with Benign and Deceitful Faults. Alejandro Ranchal-Pedrosa, Vincent Gramoli |
| 2023 | Bayes Security: A Not So Average Metric. Konstantinos Chatzikokolakis, Giovanni Cherubin, Catuscia Palamidessi, Carmela Troncoso |
| 2023 | Collusion-Deterrent Threshold Information Escrow. Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate |
| 2023 | Cross-Chain Swaps with Preferences. Eric Chan, Marek Chrobak, Mohsen Lesani |
| 2023 | Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE. Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini |
| 2023 | Election Verifiability in Receipt-Free Voting Protocols. Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang |
| 2023 | Election Verifiability with ProVerif. Vincent Cheval, Véronique Cortier, Alexandre Debant |
| 2023 | Extending the Authentication Hierarchy with One-Way Agreement. Johannes Wilson, Mikael Asplund, Niklas Johansson |
| 2023 | Formalizing Stack Safety as a Security Property. Sean Noble Anderson, Roberto Blanco, Leonidas Lampropoulos, Benjamin C. Pierce, Andrew Tolmach |
| 2023 | From Bounded to Unbounded: Privacy Amplification via Shuffling with Dummies. Shun Takagi, Fumiyuki Kato, Yang Cao, Masatoshi Yoshikawa |
| 2023 | General-Purpose Secure Conflict-free Replicated Data Types. Bernardo Portela, Hugo Pacheco, Pedro Jorge, Rogério Pontes |
| 2023 | High-Assurance Field Inversion for Curve-Based Cryptography. Benjamin Salling Hvass, Diego F. Aranha, Bas Spitters |
| 2023 | HoRStify: Sound Security Analysis of Smart Contracts. Sebastian Holler, Sebastian Biewer, Clara Schneidewind |
| 2023 | Indistinguishability Beyond Diff-Equivalence in ProVerif. Vincent Cheval, Itsaka Rakotonirina |
| 2023 | Investigating Membership Inference Attacks under Data Dependencies. Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum |
| 2023 | Keep Spending: Beyond Optimal Cyber-Security Investment. Yunxiao Zhang, Pasquale Malacaria |
| 2023 | OblivIO: Securing Reactive Programs by Oblivious Execution with Bounded Traffic Overheads. Jeppe Fredsgaard Blaabjerg, Aslan Askarov |
| 2023 | On Sustainable Ring-Based Anonymous Systems. Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo |
| 2023 | On the (De) centralization of FruitChains. Aikaterini-Panagiota Stouka, Thomas Zacharias |
| 2023 | On the Incoercibility of Digital Signatures. Ashley Fraser, Lydia Garms, Elizabeth A. Quaglia |
| 2023 | Optimally Hiding Object Sizes with Constrained Padding. Andrew C. Reed, Michael K. Reiter |
| 2023 | Preimage Awareness in Linicrypt. Zahra Javar, Bruce M. Kapron |
| 2023 | Proving Unlinkability Using ProVerif Through Desynchronised Bi-Processes. David Baelde, Alexandre Debant, Stéphanie Delaune |
| 2023 | Robust Safety for Move. Marco Patrignani, Sam Blackshear |
| 2023 | Securing Optimized Code Against Power Side Channels. Rodothea-Myrsini Tsoupidi, Roberto Castañeda Lozano, Elena Troubitsyna, Panagiotis Papadimitratos |
| 2023 | Smart Contract Synthesis Modulo Hyperproperties. Norine Coenen, Bernd Finkbeiner, Jana Hofmann, Julia J. Tillman |
| 2023 | SoK: Delay-Based Cryptography. Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia |
| 2023 | SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap. Sayanton V. Dibbo |
| 2023 | Statement-Oblivious Threshold Witness Encryption. Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser |
| 2023 | Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis. Cas Cremers, Charlie Jacomme, Philip Lukert |
| 2023 | Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers. Farzaneh Derakhshan, Zichao Zhang, Amit Vasudevan, Limin Jia |
| 2023 | Towards a Game-Theoretic Security Analysis of Off-Chain Protocols. Sophie Rain, Georgia Avarikioti, Laura Kovács, Matteo Maffei |
| 2023 | Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information. Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan |
| 2023 | Zero-Knowledge in EasyCrypt. Denis Firsov, Dominique Unruh |