| 2019 | 32nd IEEE Computer Security Foundations Symposium, CSF 2019, Hoboken, NJ, USA, June 25-28, 2019 |
| 2019 | A Formal Approach to Secure Speculation. Kevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan |
| 2019 | Analysis of Deterministic Longest-Chain Protocols. Elaine Shi |
| 2019 | Automated Verification of Accountability in Security Protocols. Robert Künnemann, Ilkan Esiyok, Michael Backes |
| 2019 | BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device. Véronique Cortier, Alicia Filipiak, Joseph Lallemand |
| 2019 | Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement. Elisavet Kozyri, Fred B. Schneider, Andrew Bedford, Josée Desharnais, Nadia Tawbi |
| 2019 | Canonical Representations of k-Safety Hyperproperties. Bernd Finkbeiner, Lennart Haas, Hazem Torfah |
| 2019 | Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy. Konstantinos Chatzikokolakis, Natasha Fernandes, Catuscia Palamidessi |
| 2019 | Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. Adrien Koutsos |
| 2019 | Deterministic Channel Design for Minimum Leakage. Arthur Américo, M. H. R. Khouzani, Pasquale Malacaria |
| 2019 | EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. Ran Canetti, Alley Stoughton, Mayank Varia |
| 2019 | Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains. Barbara Fila, Wojciech Widel |
| 2019 | Formalizing Constructive Cryptography using CryptHOL. Andreas Lochbihler, S. Reza Sefidgar, David A. Basin, Ueli Maurer |
| 2019 | Games for Security Under Adaptive Adversaries. Timos Antonopoulos, Tachio Terauchi |
| 2019 | How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11. Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes |
| 2019 | Information Flow Control for Distributed Trusted Execution Environments. Anitha Gollamudi, Stephen Chong, Owen Arden |
| 2019 | Information-Flow Preservation in Compiler Optimisations. Frédéric Besson, Alexandre Dang, Thomas P. Jensen |
| 2019 | Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation. Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy Thibault |
| 2019 | On the Meaning and Purpose of Attack Trees. Heiko Mantel, Christian W. Probst |
| 2019 | Optimising Faceted Secure Multi-Execution. Maximilian Algehed, Alejandro Russo, Cormac Flanagan |
| 2019 | Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman. Cas Cremers, Dennis Jackson |
| 2019 | Quantifying Information Flow in Interactive Systems. David Mestel |
| 2019 | Re-Thinking Untraceability in the CryptoNote-Style Blockchain. Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo |
| 2019 | Resource-Bounded Intruders in Denial of Service Attacks. Abraão Aires Urquiza, Musab A. Alturki, Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott |
| 2019 | Securing Cross-App Interactions in IoT Platforms. Musard Balliu, Massimo Merro, Michele Pasqua |
| 2019 | Static Enforcement of Security in Runtime Systems. Mathias Vorreiter Pedersen, Aslan Askarov |
| 2019 | Symbolic Methods in Computational Cryptography Proofs. Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub |
| 2019 | Temporal Safety for Stack Allocated Memory on Capability Machines. Stelios Tsampas, Dominique Devriese, Frank Piessens |
| 2019 | Time-Dependent Decision-Making and Decentralization in Proof-of-Work Cryptocurrencies. Yevhen Zolotavkin, Julián García, Joseph K. Liu |
| 2019 | Timing Leaks and Coarse-Grained Clocks. Panagiotis Vasilikos, Hanne Riis Nielson, Flemming Nielson, Boris Köpf |
| 2019 | Using Information Flow to Design an ISA that Controls Timing Channels. Drew Zagieboylo, G. Edward Suh, Andrew C. Myers |