| 2018 | 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018 |
| 2018 | A Cryptographic Look at Multi-party Channels. Patrick Eugster, Giorgia Azzurra Marson, Bertram Poettering |
| 2018 | A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif. Vincent Cheval, Véronique Cortier, Mathieu Turuani |
| 2018 | A Permission-Dependent Type System for Secure Information Flow Analysis. Hongxu Chen, Alwen Tiu, Zhiwu Xu, Yang Liu |
| 2018 | A Typing Result for Stateful Protocols. Andreas V. Hess, Sebastian Mödersheim |
| 2018 | Alethea: A Provably Secure Random Sample Voting Protocol. David A. Basin, Sasa Radomirovic, Lara Schmid |
| 2018 | An Extensive Formal Analysis of Multi-factor Authentication Protocols. Charlie Jacomme, Steve Kremer |
| 2018 | Assuming You Know: Epistemic Semantics of Relational Annotations for Expressive Flow Policies. Andrey Chudnov, David A. Naumann |
| 2018 | Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR. Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse |
| 2018 | Backdoored Hash Functions: Immunizing HMAC and HKDF. Marc Fischlin, Christian Janson, Sogol Mazaheri |
| 2018 | Composition Theorems for CryptoVerif and Application to TLS 1.3. Bruno Blanchet |
| 2018 | Computer-Aided Proofs for Multiparty Computation with Active Security. Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub |
| 2018 | Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks. José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela |
| 2018 | Formal Security Proof of CMAC and Its Variants. Cécile Baritel-Ruet, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire |
| 2018 | Guided Design of Attack Trees: A System-Based Approach. Maxime Audinot, Sophie Pinchinat, Barbara Kordy |
| 2018 | Inductive Invariants for Noninterference in Multi-agent Workflows. Christian Müller, Helmut Seidl, Eugen Zalinescu |
| 2018 | Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility. Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Anna Pazii |
| 2018 | Invited Paper: Secure Boot and Remote Attestation in the Sanctum Processor. Ilia Lebedev, Kyle Hogan, Srinivas Devadas |
| 2018 | KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine. Everett Hildenbrandt, Manasvi Saxena, Nishant Rodrigues, Xiaoran Zhu, Philip Daian, Dwight Guth, Brandon M. Moore, Daejun Park, Yi Zhang, Andrei Stefanescu, Grigore Rosu |
| 2018 | Knowledge-Based Security of Dynamic Secrets for Reactive Programs. McKenna McCall, Hengrun Zhang, Limin Jia |
| 2018 | Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios. Véronique Cortier, Constantin Catalin Dragan, François Dupressoir, Bogdan Warinschi |
| 2018 | Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting. Samuel Yeom, Irene Giacomelli, Matt Fredrikson, Somesh Jha |
| 2018 | Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic "Constant-Time". Gilles Barthe, Benjamin Grégoire, Vincent Laporte |
| 2018 | Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks. Marc Fischlin, Sogol Mazaheri |
| 2018 | Symbolic Security of Garbled Circuits. Baiyu Li, Daniele Micciancio |
| 2018 | Symbolic Side-Channel Analysis for Probabilistic Programs. Pasquale Malacaria, M. H. R. Khouzani, Corina S. Pasareanu, Quoc-Sang Phan, Kasper Søe Luckow |
| 2018 | The Complexity of Monitoring Hyperproperties. Borzoo Bonakdarpour, Bernd Finkbeiner |
| 2018 | Types for Information Flow Control: Labeling Granularity and Semantic Models. Vineet Rajani, Deepak Garg |