| 2020 | 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020 |
| 2020 | A Composable Security Treatment of the Lightning Network. Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos |
| 2020 | A Method for Proving Unlinkability of Stateful Protocols. David Baelde, Stéphanie Delaune, Solène Moreau |
| 2020 | Abstracting Faceted Execution. Kristopher K. Micinski, David Darais, Thomas Gilray |
| 2020 | Anonymous Lottery In The Proof-of-Stake Setting. Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou |
| 2020 | Authentication in Key-Exchange: Definitions, Relations and Composition. Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi |
| 2020 | Automated Analysis of PUF-based Protocols. Riccardo Focardi, Flaminia L. Luccio |
| 2020 | Clockwork: Tracking Remote Timing Attacks. Iulia Bastys, Musard Balliu, Tamara Rezk, Andrei Sabelfeld |
| 2020 | Controller Synthesis for Hyperproperties. Borzoo Bonakdarpour, Bernd Finkbeiner |
| 2020 | Dispute Resolution in Voting. David A. Basin, Sasa Radomirovic, Lara Schmid |
| 2020 | Exploiting attack-defense trees to find an optimal set of countermeasures. Barbara Fila, Wojciech Widel |
| 2020 | Fifty Shades of Ballot Privacy: Privacy against a Malicious Board. Véronique Cortier, Joseph Lallemand, Bogdan Warinschi |
| 2020 | First-Order Logic for Flow-Limited Authorization. Andrew K. Hirsch, Pedro H. Azevedo de Amorim, Ethan Cecchetti, Ross Tate, Owen Arden |
| 2020 | Language-Based Web Session Integrity. Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta |
| 2020 | Limiting the impact of unreliable randomness in deployed security protocols. Liliya R. Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav Smyshlyaev, Nick Sullivan |
| 2020 | Nontransitive Security Types for Coarse-grained Information Flow Control. Yi Lu, Chenyi Zhang |
| 2020 | Optimal Obfuscation Mechanisms via Machine Learning. Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi |
| 2020 | PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage. Andreas Fischer, Jonas Janneck, Jörn Kussmaul, Nikolas Krätzschmar, Florian Kerschbaum, Eric Bodden |
| 2020 | Provably Robust Decisions based on Potentially Malicious Sources of Information. Tim Muller, Dongxia Wang, Jun Sun |
| 2020 | Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors. Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens |
| 2020 | Reconciling progress-insensitive noninterference and declassification. Johan Bay, Aslan Askarov |
| 2020 | Rely/Guarantee Reasoning for Noninterference in Non-Blocking Algorithms. Nicholas Coughlin, Graeme Smith |
| 2020 | Runtime Enforcement for Control System Security. Ruggero Lanotte, Massimo Merro, Andrei Munteanu |
| 2020 | Securing Asynchronous Exceptions. Carlos Tomé Cortiñas, Marco Vassena, Alejandro Russo |
| 2020 | SoK: Techniques for Verifiable Mix Nets. Thomas Haines, Johannes Müller |
| 2020 | Transparent IFC Enforcement: Possibility and (In)Efficiency Results. Maximilian Algehed, Cormac Flanagan |
| 2020 | Types and Abstract Interpretation for Authorization Hook Advice. Christian Skalka, David Darais, Trent Jaeger, Frank Capobianco |
| 2020 | Universal Unconditional Verifiability in E-Voting without Trusted Parties. Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan |
| 2020 | VERONICA: Expressive and Precise Concurrent Information Flow Security. Daniel Schoepe, Toby Murray, Andrei Sabelfeld |