default search action
25th CSF 2012: Cambridge, MA, USA
- Stephen Chong:
25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1918-8
Information-Flow Security I
- Daniel Hedin, Andrei Sabelfeld:
Information-Flow Security for a Core of JavaScript. 3-18 - Jeffrey A. Vaughan, Todd D. Millstein:
Secure Information Flow for Concurrent Programs under Total Store Order. 19-29 - Musard Balliu, Mads Dam, Gurvan Le Guernic:
ENCoVer: Symbolic Exploration for Information Flow Security. 30-44 - John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:
Information-Flow Control for Programming on Encrypted Data. 45-60
Symbolic Protocol Verification I
- Alisa Pankova, Peeter Laud:
Symbolic Analysis of Cryptographic Protocols Containing Bilinear Pairings. 63-77 - Benedikt Schmidt, Simon Meier, Cas Cremers, David A. Basin:
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties. 78-94 - Myrto Arapinis, Vincent Cheval, Stéphanie Delaune:
Verifying Privacy-Type Properties in a Modular Way. 95-109
Access Control
- Anna Lisa Ferrara, P. Madhusudan, Gennaro Parlato:
Security Analysis of Role-Based Access Control through Program Verification. 113-125 - Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Marco Squarcina:
Gran: Model Checking Grsecurity RBAC Policies. 126-138 - Valerio Genovese, Deepak Garg, Daniele Rispoli:
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction. 139-153
Systems Security
- Zhengqin Luo, Tamara Rezk:
Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication. 157-170 - Pieter Agten, Raoul Strackx, Bart Jacobs, Frank Piessens:
Secure Compilation to Modern Processors. 171-185 - Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna:
Cache-Leakage Resilient OS Isolation in an Idealized Model of Virtualization. 186-197 - Ralf Küsters, Tomasz Truderung, Juergen Graf:
A Framework for the Cryptographic Verification of Java-Like Programs. 198-212
Symbolic Protocol Verification II
- Barbara Kordy, Sasa Radomirovic:
Constructing Optimistic Multi-party Contract Signing Protocols. 215-229 - Christoph Sprenger, David A. Basin:
Refining Key Establishment. 230-246 - Chetan Bansal, Karthikeyan Bhargavan, Sergio Maffeis:
Discovering Concrete Attacks on Website Authorization by Formal Analysis. 247-262
Information Theory
- Mário S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Geoffrey Smith:
Measuring Information Leakage Using Generalized Gain Functions. 265-279 - Pasquale Malacaria, Fabrizio Smeraldi:
The Thermodynamics of Confidentiality. 280-290
Information-Flow Security II
- Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld:
Securing Interactive Programs. 293-307 - Aslan Askarov, Stephen Chong:
Learning is Change in Knowledge: Knowledge-Based Security for Dynamic Policies. 308-322
Proving Cryptography
- Bruno Blanchet:
Automatically Verified Mechanized Proof of One-Encryption Key Exchange. 325-339 - Marion Daubignard, Pierre-Alain Fouque, Yassine Lakhnech:
Generic Indifferentiability Proofs of Hash Designs. 340-353 - Michael Backes, Gilles Barthe, Matthias Berg, Benjamin Grégoire, César Kunz, Malte Skoruppa, Santiago Zanella Béguelin:
Verified Security of Merkle-Damgård. 354-368 - Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. 369-385
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.