


default search action
32nd CSF 2019: Hoboken, NJ, USA
- 32nd IEEE Computer Security Foundations Symposium, CSF 2019, Hoboken, NJ, USA, June 25-28, 2019. IEEE 2019, ISBN 978-1-7281-1407-1

Session 1: Information Flow
- Maximilian Algehed, Alejandro Russo

, Cormac Flanagan:
Optimising Faceted Secure Multi-Execution. 1-16 - Bernd Finkbeiner, Lennart Haas, Hazem Torfah

:
Canonical Representations of k-Safety Hyperproperties. 17-31 - Panagiotis Vasilikos, Hanne Riis Nielson

, Flemming Nielson
, Boris Köpf:
Timing Leaks and Coarse-Grained Clocks. 32-47
Session 2: Security Protocols I
- Adrien Koutsos

:
Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. 48-61 - Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:

How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11. 62-77 - Cas Cremers, Dennis Jackson

:
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman. 78-93
Session 3: Blockchain
- Jiangshan Yu

, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-Thinking Untraceability in the CryptoNote-Style Blockchain. 94-107 - Yevhen Zolotavkin, Julián García, Joseph K. Liu:

Time-Dependent Decision-Making and Decentralization in Proof-of-Work Cryptocurrencies. 108-121 - Elaine Shi:

Analysis of Deterministic Longest-Chain Protocols. 122-135
Session 4: Computer-Aided Crypto
- Gilles Barthe, Benjamin Grégoire, Charlie Jacomme

, Steve Kremer
, Pierre-Yves Strub:
Symbolic Methods in Computational Cryptography Proofs. 136-151 - Andreas Lochbihler, S. Reza Sefidgar, David A. Basin, Ueli Maurer:

Formalizing Constructive Cryptography using CryptHOL. 152-166 - Ran Canetti, Alley Stoughton

, Mayank Varia:
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. 167-183
Session 5: Formal Methods and Verification - Attacker Model
- Heiko Mantel, Christian W. Probst:

On the Meaning and Purpose of Attack Trees. 184-199 - Barbara Fila, Wojciech Widel

:
Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains. 200-215 - Timos Antonopoulos, Tachio Terauchi

:
Games for Security Under Adaptive Adversaries. 216-229
Session 6: Formal Methods and Verification - Secure Compilation
- Frédéric Besson, Alexandre Dang, Thomas P. Jensen:

Information-Flow Preservation in Compiler Optimisations. 230-242 - Stelios Tsampas

, Dominique Devriese
, Frank Piessens:
Temporal Safety for Stack Allocated Memory on Capability Machines. 243-255 - Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani

, Jérémy Thibault
:
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation. 256-271
Session 7: Hardware-Based Security
- Drew Zagieboylo, G. Edward Suh, Andrew C. Myers:

Using Information Flow to Design an ISA that Controls Timing Channels. 272-287 - Kevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan:

A Formal Approach to Secure Speculation. 288-303 - Anitha Gollamudi

, Stephen Chong, Owen Arden:
Information Flow Control for Distributed Trusted Execution Environments. 304-318
Session 8: Language-Based Security
- Musard Balliu, Massimo Merro, Michele Pasqua

:
Securing Cross-App Interactions in IoT Platforms. 319-334 - Mathias Vorreiter Pedersen, Aslan Askarov:

Static Enforcement of Security in Runtime Systems. 335-350 - Elisavet Kozyri, Fred B. Schneider, Andrew Bedford, Josée Desharnais

, Nadia Tawbi
:
Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement. 351-366
Session 9: Security Protocols II
- Véronique Cortier, Alicia Filipiak, Joseph Lallemand:

BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device. 367-381 - Abraão Aires Urquiza, Musab A. AlTurki, Max I. Kanovich, Tajana Ban Kirigin

, Vivek Nigam
, Andre Scedrov, Carolyn L. Talcott:
Resource-Bounded Intruders in Denial of Service Attacks. 382-396 - Robert Künnemann, Ilkan Esiyok

, Michael Backes:
Automated Verification of Accountability in Security Protocols. 397-413
Session 10: Quantitative Information Flow
- David Mestel:

Quantifying Information Flow in Interactive Systems. 414-427 - Arthur Américo, M. H. R. Khouzani, Pasquale Malacaria:

Deterministic Channel Design for Minimum Leakage. 428-441 - Konstantinos Chatzikokolakis, Natasha Fernandes

, Catuscia Palamidessi
:
Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy. 442-457

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














