default search action
30th CSF 2017: Santa Barbara, CA, USA
- 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3217-8
Invited Talk I
- Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. 1-6
Session 1: Security Economics
- Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley:
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games. 7-21
Session 2: Information-flow Control
- Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei:
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. 22-36 - Marco Vassena, Joachim Breitner, Alejandro Russo:
Securing Concurrent Lazy Programs Against Information Leakage. 37-52 - Peixuan Li, Danfeng Zhang:
Towards a Flow- and Path-Sensitive Information Flow Analysis. 53-67
Session 3: Computer-Aided Cryptography
- Bruno Blanchet:
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols. 68-82 - Alley Stoughton, Mayank Varia:
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model. 83-99 - Hubert Comon, Adrien Koutsos:
Formal Computational Unlinkability Proofs of RFID Protocols. 100-114
Invited Talk II
- Rafael Pass, Elaine Shi:
Rethinking Large-Scale Consensus. 115-129
Session 4A: Authentication and Key Management I
- Stéphanie Delaune, Steve Kremer, Ludovic Robin:
Formal Verification of Protocols Based on Short Authenticated Strings. 130-143 - Vincent Cheval, Véronique Cortier, Bogdan Warinschi:
Secure Composition of PKIs with Public Key Protocols. 144-158 - Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval:
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange. 159-175
Session 4B: Authentication and Key Management II
- Riccardo Focardi, Marco Squarcina:
Run-Time Attack Detection in Cryptographic APIs. 176-188 - Daniel Fett, Ralf Küsters, Guido Schmitz:
The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines. 189-202
Session 6: Security Protocols
- Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. 203-216 - Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin:
UC-Secure Non-interactive Public-Key Encryption. 217-233 - David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer:
Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. 234-248
Session 7: Privacy
- Li Zhou, Mingsheng Ying:
Differential Privacy in Quantum Computation. 249-262 - Ilya Mironov:
Rényi Differential Privacy. 263-275 - Per A. Hallgren, Claudio Orlandi, Andrei Sabelfeld:
PrivatePool: Privacy-Preserving Ridesharing. 276-291 - Michael Backes, Manuel Gomez-Rodriguez, Praveen Manoharan, Bartlomiej Surma:
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks. 292-304
Session 8: Quantitative Information-Flow Analysis
- M. H. R. Khouzani, Pasquale Malacaria:
Leakage-Minimal Design: Universality, Limitations, and Applications. 305-317 - David M. Smith, Geoffrey Smith:
Tight Bounds on Information Leakage from Repeated Independent Runs. 318-327 - Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. 328-342 - Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Securing Databases from Probabilistic Inference. 343-359
Session 9: Distributed Systems
- Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia:
A Universally Composable Treatment of Network Time. 360-375 - Ivan Gazeau, Tom Chothia, Dominic Duggan:
Types for Location and Data Security in Cloud Environments. 376-391
Session 10A: Security and Compilation
- Marco Patrignani, Deepak Garg:
Secure Compilation and Hyperproperty Preservation. 392-404 - Gilles Barthe, Sandrine Blazy, Vincent Laporte, David Pichardie, Alix Trieu:
Verified Translation Validation of Static Analyses. 405-419
Session 10B: Embedded and Cyber-physical Security
- Hyoukjun Kwon, William Harris, Hadi Esmaeilzadeh:
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants. 420-435 - Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò:
A Formal Approach to Cyber-Physical Attacks. 436-450
Session 11: Security Protocols II
- Andreas Viktor Hess, Sebastian Mödersheim:
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL. 451-463 - Emanuele D'Osualdo, Luke Ong, Alwen Tiu:
Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes. 464-480 - Véronique Cortier, Antoine Dallon, Stéphanie Delaune:
SAT-Equiv: An Efficient Tool for Equivalence Properties. 481-494
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.