CSF A

29 papers

YearTitle / Authors
202033rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020
2020A Composable Security Treatment of the Lightning Network.
Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos
2020A Method for Proving Unlinkability of Stateful Protocols.
David Baelde, Stéphanie Delaune, Solène Moreau
2020Abstracting Faceted Execution.
Kristopher K. Micinski, David Darais, Thomas Gilray
2020Anonymous Lottery In The Proof-of-Stake Setting.
Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou
2020Authentication in Key-Exchange: Definitions, Relations and Composition.
Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi
2020Automated Analysis of PUF-based Protocols.
Riccardo Focardi, Flaminia L. Luccio
2020Clockwork: Tracking Remote Timing Attacks.
Iulia Bastys, Musard Balliu, Tamara Rezk, Andrei Sabelfeld
2020Controller Synthesis for Hyperproperties.
Borzoo Bonakdarpour, Bernd Finkbeiner
2020Dispute Resolution in Voting.
David A. Basin, Sasa Radomirovic, Lara Schmid
2020Exploiting attack-defense trees to find an optimal set of countermeasures.
Barbara Fila, Wojciech Widel
2020Fifty Shades of Ballot Privacy: Privacy against a Malicious Board.
Véronique Cortier, Joseph Lallemand, Bogdan Warinschi
2020First-Order Logic for Flow-Limited Authorization.
Andrew K. Hirsch, Pedro H. Azevedo de Amorim, Ethan Cecchetti, Ross Tate, Owen Arden
2020Language-Based Web Session Integrity.
Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta
2020Limiting the impact of unreliable randomness in deployed security protocols.
Liliya R. Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav Smyshlyaev, Nick Sullivan
2020Nontransitive Security Types for Coarse-grained Information Flow Control.
Yi Lu, Chenyi Zhang
2020Optimal Obfuscation Mechanisms via Machine Learning.
Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi
2020PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage.
Andreas Fischer, Jonas Janneck, Jörn Kussmaul, Nikolas Krätzschmar, Florian Kerschbaum, Eric Bodden
2020Provably Robust Decisions based on Potentially Malicious Sources of Information.
Tim Muller, Dongxia Wang, Jun Sun
2020Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors.
Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens
2020Reconciling progress-insensitive noninterference and declassification.
Johan Bay, Aslan Askarov
2020Rely/Guarantee Reasoning for Noninterference in Non-Blocking Algorithms.
Nicholas Coughlin, Graeme Smith
2020Runtime Enforcement for Control System Security.
Ruggero Lanotte, Massimo Merro, Andrei Munteanu
2020Securing Asynchronous Exceptions.
Carlos Tomé Cortiñas, Marco Vassena, Alejandro Russo
2020SoK: Techniques for Verifiable Mix Nets.
Thomas Haines, Johannes Müller
2020Transparent IFC Enforcement: Possibility and (In)Efficiency Results.
Maximilian Algehed, Cormac Flanagan
2020Types and Abstract Interpretation for Authorization Hook Advice.
Christian Skalka, David Darais, Trent Jaeger, Frank Capobianco
2020Universal Unconditional Verifiability in E-Voting without Trusted Parties.
Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan
2020VERONICA: Expressive and Precise Concurrent Information Flow Security.
Daniel Schoepe, Toby Murray, Andrei Sabelfeld