| 2025 | $BitML^{x}$: Secure Cross-Chain Smart Contracts for Bitcoin-Style Cryptocurrencies. Federico Badaloni, Sebastian Holler, Chrysoula Oikonomou, Pedro Moreno-Sanchez, Clara Schneidewind |
| 2025 | 38th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, CA, USA, June 16-20, 2025 |
| 2025 | A Graded Modal Approach to Relaxed Semantic Declassification. Vineet Rajani, Alex Coleman, Hrutvik Kanabar |
| 2025 | A Novel Approach to Differential Privacy with Alpha Divergence. Yifeng Liu, Zehua Wang |
| 2025 | AGATE: Augmented Global Attested Trusted Execution in the Universal Composability Framework. Lorenzo Martinico, Markulf Kohlweiss |
| 2025 | Accountability, Involvement, and Mediation for Information Flow. Elisavet Kozyri, Fred B. Schneider, Stephen Chong |
| 2025 | Actual Knowledge Gain as Privacy Loss in Local Privacy Accounting. Mingen Pan |
| 2025 | An Extension of the Adversarial Threat Model in Quantitative Information Flow. Mohammad A. Zarrabian, Parastoo Sadeghi |
| 2025 | Atomic Transfer Graphs: Secure-by-Design Protocols for Heterogeneous Blockchain Ecosystems. Stephan Dübler, Federico Badaloni, Pedro Moreno-Sanchez, Clara Schneidewind |
| 2025 | Automated Analysis and Synthesis of Message Authentication Codes. Stefan Milius, Dominik Paulus, Dominique Schröder, Lutz Schröder, Julian Thomas |
| 2025 | Automatic Verification of Finite Variant Property Beyond Convergent Equational Theories. Vincent Cheval, Caroline Fontaine |
| 2025 | Cryptographically Assured Information Flow: Assured Remote Execution. Scott L. Dyer, Christian A. Femrite, Joshua D. Guttman, Julian P. Lanson, Moses D. Liskov |
| 2025 | Dynamic Group Signatures with Verifier-Local Revocation. Callum London, Daniel Gardham, Constantin Catalin Dragan |
| 2025 | FSLH: Flexible Mechanized Speculative Load Hardening. Jonathan Baumann, Roberto Blanco, Léon Ducruet, Sebastian Harwig, Catalin Hritcu |
| 2025 | Formal Analysis of Random Nonce Misuses in Cryptographic Protocols. Gildas Avoine, Tristan Claverie, Stéphanie Delaune |
| 2025 | Formal Robustness for Cyber-Physical Systems Under Timed Attacks. Jian Xiang, Simone Tini, Ruggero Lanotte, Massimo Merro |
| 2025 | Foundations of Multi-Designated Verifier Signature Comprehensive Formalization and New Constructions in Subset Simulation. Keitaro Hashimoto, Kyosuke Yamashita, Keisuke Hara |
| 2025 | Gradual Sensitivity Typing. Damián Árquez, Matías Toro, Éric Tanter |
| 2025 | Improving Count-Mean Sketch as the Leading Locally Differentially Private Frequency Estimator for Large Dictionaries. Mingen Pan |
| 2025 | Nominal State-Separating Proofs. Markus Krabbe Larsen, Carsten Schürmann |
| 2025 | Nonmalleable Progress Leakage. Ethan Cecchetti |
| 2025 | On DoS Vulnerability of Regular Expressions, with and Without Backreferences. Tachio Terauchi |
| 2025 | One For All: Formally Verifying Protocols which use Aggregate Signatures. Xenia Hofmeier, Andrea Raguso, Ralf Sasse, Dennis Jackson, David A. Basin |
| 2025 | Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers. Bhagya Wimalasiri, Benjamin Dowling, Rabiah Alnashwan |
| 2025 | Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents. Léonard Brice, Jean-François Raskin, Mathieu Sassolas, Guillaume Scerri, Marie van den Bogaard |
| 2025 | Privacy-Preserving Server-Supported Decryption. Peeter Laud, Alisa Pankova, Jelizaveta Vakarjuk |
| 2025 | Rethinking Attack Path Management: A New Metric for Choke Points in Attack Graphs. Yumeng Zhang, Max Ward, Hung Nguyen |
| 2025 | SMT-Based Automation for Overwhelming Truth. David Baelde, Stéphanie Delaune, Stanislas Riou |
| 2025 | Scalable Private Signaling. Sashidhar Jakkamsetti, Zeyu Liu, Varun Madathil |
| 2025 | Secrecy by Typing in the Computational Model. Stéphanie Delaune, Clément Hérouard, Joseph Lallemand |
| 2025 | Securing P4 Programs by Information Flow Control. Anoud Alshnakat, Amir M. Ahmadian, Musard Balliu, Roberto Guanciale, Mads Dam |
| 2025 | Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting. Andreas Athanasiou, Konstantinos Chatzikokolakis, Catuscia Palamidessi |
| 2025 | Session Types for the Concurrent Composition of Interactive Differential Privacy. Victor Sannier, Patrick Baillot, Marco Gaboardi |
| 2025 | Strands Rocq: Why is a Security Protocol Correct, Mechanically? Matteo Busi, Riccardo Focardi, Flaminia L. Luccio |
| 2025 | Symbolic Parallel Composition for Multi-language Protocol Verification. Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati |
| 2025 | Unveiling the (in)Security of Threshold FHE-Based Federated Learning: The Practical Impact of Recent CPAD Attacks. Adda-Akram Bendoukha, Renaud Sirdey, Aymen Boudguiga, Nesrine Kaaniche |
| 2025 | VRaaS: Verifiable Randomness as a Service on Blockchains. Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan |
| 2025 | Verifiable E-Voting with a Trustless Bulletin Board. Daniel Rausch, Nicolas Huber, Ralf Küsters |
| 2025 | Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application. Thomas Haines, Rafieh Mosaheb, Johannes Müller, Reetika |