default search action
32nd CSF 2019: Hoboken, NJ, USA
- 32nd IEEE Computer Security Foundations Symposium, CSF 2019, Hoboken, NJ, USA, June 25-28, 2019. IEEE 2019, ISBN 978-1-7281-1407-1
Session 1: Information Flow
- Maximilian Algehed, Alejandro Russo, Cormac Flanagan:
Optimising Faceted Secure Multi-Execution. 1-16 - Bernd Finkbeiner, Lennart Haas, Hazem Torfah:
Canonical Representations of k-Safety Hyperproperties. 17-31 - Panagiotis Vasilikos, Hanne Riis Nielson, Flemming Nielson, Boris Köpf:
Timing Leaks and Coarse-Grained Clocks. 32-47
Session 2: Security Protocols I
- Adrien Koutsos:
Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. 48-61 - Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11. 62-77 - Cas Cremers, Dennis Jackson:
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman. 78-93
Session 3: Blockchain
- Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-Thinking Untraceability in the CryptoNote-Style Blockchain. 94-107 - Yevhen Zolotavkin, Julián García, Joseph Liu:
Time-Dependent Decision-Making and Decentralization in Proof-of-Work Cryptocurrencies. 108-121 - Elaine Shi:
Analysis of Deterministic Longest-Chain Protocols. 122-135
Session 4: Computer-Aided Crypto
- Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub:
Symbolic Methods in Computational Cryptography Proofs. 136-151 - Andreas Lochbihler, S. Reza Sefidgar, David A. Basin, Ueli Maurer:
Formalizing Constructive Cryptography using CryptHOL. 152-166 - Ran Canetti, Alley Stoughton, Mayank Varia:
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. 167-183
Session 5: Formal Methods and Verification - Attacker Model
- Heiko Mantel, Christian W. Probst:
On the Meaning and Purpose of Attack Trees. 184-199 - Barbara Fila, Wojciech Widel:
Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains. 200-215 - Timos Antonopoulos, Tachio Terauchi:
Games for Security Under Adaptive Adversaries. 216-229
Session 6: Formal Methods and Verification - Secure Compilation
- Frédéric Besson, Alexandre Dang, Thomas P. Jensen:
Information-Flow Preservation in Compiler Optimisations. 230-242 - Stelios Tsampas, Dominique Devriese, Frank Piessens:
Temporal Safety for Stack Allocated Memory on Capability Machines. 243-255 - Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy Thibault:
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation. 256-271
Session 7: Hardware-Based Security
- Drew Zagieboylo, G. Edward Suh, Andrew C. Myers:
Using Information Flow to Design an ISA that Controls Timing Channels. 272-287 - Kevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan:
A Formal Approach to Secure Speculation. 288-303 - Anitha Gollamudi, Stephen Chong, Owen Arden:
Information Flow Control for Distributed Trusted Execution Environments. 304-318
Session 8: Language-Based Security
- Musard Balliu, Massimo Merro, Michele Pasqua:
Securing Cross-App Interactions in IoT Platforms. 319-334 - Mathias Vorreiter Pedersen, Aslan Askarov:
Static Enforcement of Security in Runtime Systems. 335-350 - Elisavet Kozyri, Fred B. Schneider, Andrew Bedford, Josée Desharnais, Nadia Tawbi:
Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement. 351-366
Session 9: Security Protocols II
- Véronique Cortier, Alicia Filipiak, Joseph Lallemand:
BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device. 367-381 - Abraão Aires Urquiza, Musab A. AlTurki, Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
Resource-Bounded Intruders in Denial of Service Attacks. 382-396 - Robert Künnemann, Ilkan Esiyok, Michael Backes:
Automated Verification of Accountability in Security Protocols. 397-413
Session 10: Quantitative Information Flow
- David Mestel:
Quantifying Information Flow in Interactive Systems. 414-427 - Arthur Américo, M. H. R. Khouzani, Pasquale Malacaria:
Deterministic Channel Design for Minimum Leakage. 428-441 - Konstantinos Chatzikokolakis, Natasha Fernandes, Catuscia Palamidessi:
Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy. 442-457
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.