CSF A

33 papers

YearTitle / Authors
202235th IEEE Computer Security Foundations Symposium, CSF 2022, Haifa, Israel, August 7-10, 2022
2022A Complete Characterization of Security for Linicrypt Block Cipher Modes.
Tommy Hollenberg, Mike Rosulek, Lawrence Roy
2022A Formal Model of Checked C.
Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks
2022A small bound on the number of sessions for security protocols.
Véronique Cortier, Antoine Dallon, Stéphanie Delaune
2022Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems.
Lisa Oakley, Alina Oprea, Stavros Tripakis
2022Adversary Safety by Construction in a Language of Cryptographic Protocols.
Timothy M. Braje, Alice R. Lee, Andrew Wagner, Benjamin Kaiser, Daniel Park, Martine Kalke, Robert K. Cunningham, Adam Chlipala
2022Applying consensus and replication securely with FLAQR.
Priyanka Mondal, Maximilian Algehed, Owen Arden
2022Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games.
David Mestel
2022Bringing State-Separating Proofs to EasyCrypt A Security Proof for Cryptobox.
François Dupressoir, Konrad Kohbrok, Sabine Oechsner
2022Collusion-Preserving Computation without a Mediator.
Michele Ciampi, Yun Lu, Vassilis Zikas
2022Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting.
Petar Paradzik, Ante Derek
2022Contingent payments from two-party signing and verification for abelian groups.
Sergiu Bursuc, Sjouke Mauw
2022Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant.
David Baelde, Stéphanie Delaune, Adrien Koutsos, Solène Moreau
2022DPL: A Language for GDPR Enforcement.
Farzane Karami, David A. Basin, Einar Broch Johnsen
2022Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol.
Felipe Boeira, Mikael Asplund
2022How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis.
David Mestel, Johannes Müller, Pascal Reisert
2022IFCIL: An Information Flow Configuration Language for SELinux.
Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin
2022Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes.
Alisa Pankova, Peeter Laud
2022Is Eve nearby? Analysing protocols under the distant-attacker assumption.
Reynaldo Gil Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, Rolando Trujillo-Rasua
2022Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing.
Alexander May, Floyd Zweydinger
2022Locked Circuit Indistinguishability: A Notion of Security for Logic Locking.
Mohamed El Massad, Nahid Juma, Jonathan Shahen, Mariana Raykova, Siddharth Garg, Mahesh Tripunitara
2022Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co.
Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg
2022Mapping Synthesis for Hyperproperties.
Tzu-Han Hsu, Borzoo Bonakdarpour, Eunsuk Kang, Stavros Tripakis
2022N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures.
Thilo Weghorn, Si Liu, Christoph Sprenger, Adrian Perrig, David A. Basin
2022Privacy as Reachability.
Sébastien Gondron, Sebastian Mödersheim, Luca Viganò
2022Prophecy Variables for Hyperproperty Verification.
Raven Beutner, Bernd Finkbeiner
2022Proving full-system security properties under multiple attacker models on capability machines.
Thomas Van Strydonck, Aïna Linn Georges, Armaël Guéneau, Alix Trieu, Amin Timany, Frank Piessens, Lars Birkedal, Dominique Devriese
2022SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation.
Akram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg, Catalin Hritcu
2022Symbolic protocol verification with dice: process equivalences in the presence of probabilities.
Vincent Cheval, Raphaëlle Crubillé, Steve Kremer
2022The Complexity of Verifying Boolean Programs as Differentially Private.
Mark Bun, Marco Gaboardi, Ludmila Glinskih
2022Towards a General-Purpose Dynamic Information Flow Policy.
Peixuan Li, Danfeng Zhang
2022Universal Optimality and Robust Utility Bounds for Metric Differential Privacy.
Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding
2022Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments.
Ross Horne, Sjouke Mauw, Semen Yurkov