| 2022 | 35th IEEE Computer Security Foundations Symposium, CSF 2022, Haifa, Israel, August 7-10, 2022 |
| 2022 | A Complete Characterization of Security for Linicrypt Block Cipher Modes. Tommy Hollenberg, Mike Rosulek, Lawrence Roy |
| 2022 | A Formal Model of Checked C. Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks |
| 2022 | A small bound on the number of sessions for security protocols. Véronique Cortier, Antoine Dallon, Stéphanie Delaune |
| 2022 | Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems. Lisa Oakley, Alina Oprea, Stavros Tripakis |
| 2022 | Adversary Safety by Construction in a Language of Cryptographic Protocols. Timothy M. Braje, Alice R. Lee, Andrew Wagner, Benjamin Kaiser, Daniel Park, Martine Kalke, Robert K. Cunningham, Adam Chlipala |
| 2022 | Applying consensus and replication securely with FLAQR. Priyanka Mondal, Maximilian Algehed, Owen Arden |
| 2022 | Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games. David Mestel |
| 2022 | Bringing State-Separating Proofs to EasyCrypt A Security Proof for Cryptobox. François Dupressoir, Konrad Kohbrok, Sabine Oechsner |
| 2022 | Collusion-Preserving Computation without a Mediator. Michele Ciampi, Yun Lu, Vassilis Zikas |
| 2022 | Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting. Petar Paradzik, Ante Derek |
| 2022 | Contingent payments from two-party signing and verification for abelian groups. Sergiu Bursuc, Sjouke Mauw |
| 2022 | Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant. David Baelde, Stéphanie Delaune, Adrien Koutsos, Solène Moreau |
| 2022 | DPL: A Language for GDPR Enforcement. Farzane Karami, David A. Basin, Einar Broch Johnsen |
| 2022 | Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol. Felipe Boeira, Mikael Asplund |
| 2022 | How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis. David Mestel, Johannes Müller, Pascal Reisert |
| 2022 | IFCIL: An Information Flow Configuration Language for SELinux. Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin |
| 2022 | Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes. Alisa Pankova, Peeter Laud |
| 2022 | Is Eve nearby? Analysing protocols under the distant-attacker assumption. Reynaldo Gil Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, Rolando Trujillo-Rasua |
| 2022 | Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing. Alexander May, Floyd Zweydinger |
| 2022 | Locked Circuit Indistinguishability: A Notion of Security for Logic Locking. Mohamed El Massad, Nahid Juma, Jonathan Shahen, Mariana Raykova, Siddharth Garg, Mahesh Tripunitara |
| 2022 | Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg |
| 2022 | Mapping Synthesis for Hyperproperties. Tzu-Han Hsu, Borzoo Bonakdarpour, Eunsuk Kang, Stavros Tripakis |
| 2022 | N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures. Thilo Weghorn, Si Liu, Christoph Sprenger, Adrian Perrig, David A. Basin |
| 2022 | Privacy as Reachability. Sébastien Gondron, Sebastian Mödersheim, Luca Viganò |
| 2022 | Prophecy Variables for Hyperproperty Verification. Raven Beutner, Bernd Finkbeiner |
| 2022 | Proving full-system security properties under multiple attacker models on capability machines. Thomas Van Strydonck, Aïna Linn Georges, Armaël Guéneau, Alix Trieu, Amin Timany, Frank Piessens, Lars Birkedal, Dominique Devriese |
| 2022 | SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation. Akram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg, Catalin Hritcu |
| 2022 | Symbolic protocol verification with dice: process equivalences in the presence of probabilities. Vincent Cheval, Raphaëlle Crubillé, Steve Kremer |
| 2022 | The Complexity of Verifying Boolean Programs as Differentially Private. Mark Bun, Marco Gaboardi, Ludmila Glinskih |
| 2022 | Towards a General-Purpose Dynamic Information Flow Policy. Peixuan Li, Danfeng Zhang |
| 2022 | Universal Optimality and Robust Utility Bounds for Metric Differential Privacy. Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding |
| 2022 | Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments. Ross Horne, Sjouke Mauw, Semen Yurkov |