CSF A

31 papers

YearTitle / Authors
201932nd IEEE Computer Security Foundations Symposium, CSF 2019, Hoboken, NJ, USA, June 25-28, 2019
2019A Formal Approach to Secure Speculation.
Kevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan
2019Analysis of Deterministic Longest-Chain Protocols.
Elaine Shi
2019Automated Verification of Accountability in Security Protocols.
Robert Künnemann, Ilkan Esiyok, Michael Backes
2019BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device.
Véronique Cortier, Alicia Filipiak, Joseph Lallemand
2019Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement.
Elisavet Kozyri, Fred B. Schneider, Andrew Bedford, Josée Desharnais, Nadia Tawbi
2019Canonical Representations of k-Safety Hyperproperties.
Bernd Finkbeiner, Lennart Haas, Hazem Torfah
2019Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy.
Konstantinos Chatzikokolakis, Natasha Fernandes, Catuscia Palamidessi
2019Decidability of a Sound Set of Inference Rules for Computational Indistinguishability.
Adrien Koutsos
2019Deterministic Channel Design for Minimum Leakage.
Arthur Américo, M. H. R. Khouzani, Pasquale Malacaria
2019EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security.
Ran Canetti, Alley Stoughton, Mayank Varia
2019Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains.
Barbara Fila, Wojciech Widel
2019Formalizing Constructive Cryptography using CryptHOL.
Andreas Lochbihler, S. Reza Sefidgar, David A. Basin, Ueli Maurer
2019Games for Security Under Adaptive Adversaries.
Timos Antonopoulos, Tachio Terauchi
2019How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11.
Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes
2019Information Flow Control for Distributed Trusted Execution Environments.
Anitha Gollamudi, Stephen Chong, Owen Arden
2019Information-Flow Preservation in Compiler Optimisations.
Frédéric Besson, Alexandre Dang, Thomas P. Jensen
2019Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation.
Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy Thibault
2019On the Meaning and Purpose of Attack Trees.
Heiko Mantel, Christian W. Probst
2019Optimising Faceted Secure Multi-Execution.
Maximilian Algehed, Alejandro Russo, Cormac Flanagan
2019Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman.
Cas Cremers, Dennis Jackson
2019Quantifying Information Flow in Interactive Systems.
David Mestel
2019Re-Thinking Untraceability in the CryptoNote-Style Blockchain.
Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo
2019Resource-Bounded Intruders in Denial of Service Attacks.
Abraão Aires Urquiza, Musab A. Alturki, Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott
2019Securing Cross-App Interactions in IoT Platforms.
Musard Balliu, Massimo Merro, Michele Pasqua
2019Static Enforcement of Security in Runtime Systems.
Mathias Vorreiter Pedersen, Aslan Askarov
2019Symbolic Methods in Computational Cryptography Proofs.
Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub
2019Temporal Safety for Stack Allocated Memory on Capability Machines.
Stelios Tsampas, Dominique Devriese, Frank Piessens
2019Time-Dependent Decision-Making and Decentralization in Proof-of-Work Cryptocurrencies.
Yevhen Zolotavkin, Julián García, Joseph K. Liu
2019Timing Leaks and Coarse-Grained Clocks.
Panagiotis Vasilikos, Hanne Riis Nielson, Flemming Nielson, Boris Köpf
2019Using Information Flow to Design an ISA that Controls Timing Channels.
Drew Zagieboylo, G. Edward Suh, Andrew C. Myers