CSF A

39 papers

YearTitle / Authors
2025$BitML^{x}$: Secure Cross-Chain Smart Contracts for Bitcoin-Style Cryptocurrencies.
Federico Badaloni, Sebastian Holler, Chrysoula Oikonomou, Pedro Moreno-Sanchez, Clara Schneidewind
202538th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, CA, USA, June 16-20, 2025
2025A Graded Modal Approach to Relaxed Semantic Declassification.
Vineet Rajani, Alex Coleman, Hrutvik Kanabar
2025A Novel Approach to Differential Privacy with Alpha Divergence.
Yifeng Liu, Zehua Wang
2025AGATE: Augmented Global Attested Trusted Execution in the Universal Composability Framework.
Lorenzo Martinico, Markulf Kohlweiss
2025Accountability, Involvement, and Mediation for Information Flow.
Elisavet Kozyri, Fred B. Schneider, Stephen Chong
2025Actual Knowledge Gain as Privacy Loss in Local Privacy Accounting.
Mingen Pan
2025An Extension of the Adversarial Threat Model in Quantitative Information Flow.
Mohammad A. Zarrabian, Parastoo Sadeghi
2025Atomic Transfer Graphs: Secure-by-Design Protocols for Heterogeneous Blockchain Ecosystems.
Stephan Dübler, Federico Badaloni, Pedro Moreno-Sanchez, Clara Schneidewind
2025Automated Analysis and Synthesis of Message Authentication Codes.
Stefan Milius, Dominik Paulus, Dominique Schröder, Lutz Schröder, Julian Thomas
2025Automatic Verification of Finite Variant Property Beyond Convergent Equational Theories.
Vincent Cheval, Caroline Fontaine
2025Cryptographically Assured Information Flow: Assured Remote Execution.
Scott L. Dyer, Christian A. Femrite, Joshua D. Guttman, Julian P. Lanson, Moses D. Liskov
2025Dynamic Group Signatures with Verifier-Local Revocation.
Callum London, Daniel Gardham, Constantin Catalin Dragan
2025FSLH: Flexible Mechanized Speculative Load Hardening.
Jonathan Baumann, Roberto Blanco, Léon Ducruet, Sebastian Harwig, Catalin Hritcu
2025Formal Analysis of Random Nonce Misuses in Cryptographic Protocols.
Gildas Avoine, Tristan Claverie, Stéphanie Delaune
2025Formal Robustness for Cyber-Physical Systems Under Timed Attacks.
Jian Xiang, Simone Tini, Ruggero Lanotte, Massimo Merro
2025Foundations of Multi-Designated Verifier Signature Comprehensive Formalization and New Constructions in Subset Simulation.
Keitaro Hashimoto, Kyosuke Yamashita, Keisuke Hara
2025Gradual Sensitivity Typing.
Damián Árquez, Matías Toro, Éric Tanter
2025Improving Count-Mean Sketch as the Leading Locally Differentially Private Frequency Estimator for Large Dictionaries.
Mingen Pan
2025Nominal State-Separating Proofs.
Markus Krabbe Larsen, Carsten Schürmann
2025Nonmalleable Progress Leakage.
Ethan Cecchetti
2025On DoS Vulnerability of Regular Expressions, with and Without Backreferences.
Tachio Terauchi
2025One For All: Formally Verifying Protocols which use Aggregate Signatures.
Xenia Hofmeier, Andrea Raguso, Ralf Sasse, Dennis Jackson, David A. Basin
2025Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers.
Bhagya Wimalasiri, Benjamin Dowling, Rabiah Alnashwan
2025Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents.
Léonard Brice, Jean-François Raskin, Mathieu Sassolas, Guillaume Scerri, Marie van den Bogaard
2025Privacy-Preserving Server-Supported Decryption.
Peeter Laud, Alisa Pankova, Jelizaveta Vakarjuk
2025Rethinking Attack Path Management: A New Metric for Choke Points in Attack Graphs.
Yumeng Zhang, Max Ward, Hung Nguyen
2025SMT-Based Automation for Overwhelming Truth.
David Baelde, Stéphanie Delaune, Stanislas Riou
2025Scalable Private Signaling.
Sashidhar Jakkamsetti, Zeyu Liu, Varun Madathil
2025Secrecy by Typing in the Computational Model.
Stéphanie Delaune, Clément Hérouard, Joseph Lallemand
2025Securing P4 Programs by Information Flow Control.
Anoud Alshnakat, Amir M. Ahmadian, Musard Balliu, Roberto Guanciale, Mads Dam
2025Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting.
Andreas Athanasiou, Konstantinos Chatzikokolakis, Catuscia Palamidessi
2025Session Types for the Concurrent Composition of Interactive Differential Privacy.
Victor Sannier, Patrick Baillot, Marco Gaboardi
2025Strands Rocq: Why is a Security Protocol Correct, Mechanically?
Matteo Busi, Riccardo Focardi, Flaminia L. Luccio
2025Symbolic Parallel Composition for Multi-language Protocol Verification.
Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati
2025Unveiling the (in)Security of Threshold FHE-Based Federated Learning: The Practical Impact of Recent CPAD Attacks.
Adda-Akram Bendoukha, Renaud Sirdey, Aymen Boudguiga, Nesrine Kaaniche
2025VRaaS: Verifiable Randomness as a Service on Blockchains.
Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan
2025Verifiable E-Voting with a Trustless Bulletin Board.
Daniel Rausch, Nicolas Huber, Ralf Küsters
2025Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application.
Thomas Haines, Rafieh Mosaheb, Johannes Müller, Reetika