


default search action
38th CSF 2025: Santa Cruz, CA, USA
- 38th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, CA, USA, June 16-20, 2025. IEEE 2025, ISBN 979-8-3315-1081-7
- Scott L. Dyer, Christian A. Femrite, Joshua D. Guttman, Julian P. Lanson, Moses D. Liskov:
Cryptographically Assured Information Flow: Assured Remote Execution. 1-16 - Stéphanie Delaune, Clément Hérouard, Joseph Lallemand:
Secrecy by Typing in the Computational Model. 17-32 - Matteo Busi, Riccardo Focardi, Flaminia L. Luccio:
Strands Rocq: Why is a Security Protocol Correct, Mechanically? 33-48 - Lorenzo Martinico, Markulf Kohlweiss:
AGATE: Augmented Global Attested Trusted Execution in the Universal Composability Framework. 49-64 - Andreas Athanasiou, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting. 65-80 - Mingen Pan:
Actual Knowledge Gain as Privacy Loss in Local Privacy Accounting. 81-96 - Mingen Pan:
Improving Count-Mean Sketch as the Leading Locally Differentially Private Frequency Estimator for Large Dictionaries. 97-112 - Victor Sannier, Patrick Baillot, Marco Gaboardi:
Session Types for the Concurrent Composition of Interactive Differential Privacy. 113-126 - Peeter Laud, Alisa Pankova, Jelizaveta Vakarjuk:
Privacy-Preserving Server-Supported Decryption. 127-142 - Sashidhar Jakkamsetti, Zeyu Liu, Varun Madathil:
Scalable Private Signaling. 143-158 - Keitaro Hashimoto, Kyosuke Yamashita, Keisuke Hara:
Foundations of Multi-Designated Verifier Signature Comprehensive Formalization and New Constructions in Subset Simulation. 159-174 - Léonard Brice, Jean-François Raskin, Mathieu Sassolas, Guillaume Scerri, Marie van den Bogaard:
Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents. 175-189 - Tachio Terauchi:
On DoS Vulnerability of Regular Expressions, with and Without Backreferences. 190-204 - Yumeng Zhang, Max Ward, Hung Nguyen:
Rethinking Attack Path Management: A New Metric for Choke Points in Attack Graphs. 205-219 - Bhagya Wimalasiri, Benjamin Dowling, Rabiah Alnashwan:
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers. 220-235 - Jian Xiang, Simone Tini, Ruggero Lanotte, Massimo Merro:
Formal Robustness for Cyber-Physical Systems Under Timed Attacks. 236-251 - Elisavet Kozyri, Fred B. Schneider, Stephen Chong:
Accountability, Involvement, and Mediation for Information Flow. 252-267 - Vineet Rajani, Alex Coleman, Hrutvik Kanabar:
A Graded Modal Approach to Relaxed Semantic Declassification. 268-283 - Anoud Alshnakat, Amir M. Ahmadian, Musard Balliu, Roberto Guanciale, Mads Dam:
Securing P4 Programs by Information Flow Control. 284-299 - Stephan Dübler, Federico Badaloni, Pedro Moreno-Sanchez, Clara Schneidewind:
Atomic Transfer Graphs: Secure-by-Design Protocols for Heterogeneous Blockchain Ecosystems. 300-315 - Federico Badaloni, Sebastian Holler, Chrysoula Oikonomou, Pedro Moreno-Sanchez, Clara Schneidewind:
$BitML^{x}$: Secure Cross-Chain Smart Contracts for Bitcoin-Style Cryptocurrencies. 316-330 - Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan:
VRaaS: Verifiable Randomness as a Service on Blockchains. 331-346 - Xenia Hofmeier, Andrea Raguso, Ralf Sasse, Dennis Jackson, David A. Basin:
One For All: Formally Verifying Protocols which use Aggregate Signatures. 347-362 - Markus Krabbe Larsen, Carsten Schürmann:
Nominal State-Separating Proofs. 363-377 - Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati:
Symbolic Parallel Composition for Multi-language Protocol Verification. 378-393 - Gildas Avoine, Tristan Claverie, Stéphanie Delaune:
Formal Analysis of Random Nonce Misuses in Cryptographic Protocols. 394-409 - Yifeng Liu, Zehua Wang:
A Novel Approach to Differential Privacy with Alpha Divergence. 410-424 - Adda-Akram Bendoukha, Renaud Sirdey, Aymen Boudguiga, Nesrine Kaaniche:
Unveiling the (in)Security of Threshold FHE-Based Federated Learning: The Practical Impact of Recent CPAD Attacks. 425-440 - Thomas Haines, Rafieh Mosaheb, Johannes Müller, Reetika:
Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application. 441-456 - Daniel Rausch, Nicolas Huber, Ralf Küsters:
Verifiable E-Voting with a Trustless Bulletin Board. 457-472 - Callum London, Daniel Gardham, Constantin Catalin Dragan:
Dynamic Group Signatures with Verifier-Local Revocation. 473-488 - Stefan Milius, Dominik Paulus, Dominique Schröder, Lutz Schröder, Julian Thomas:
Automated Analysis and Synthesis of Message Authentication Codes. 489-504 - David Baelde, Stéphanie Delaune, Stanislas Riou:
SMT-Based Automation for Overwhelming Truth. 505-520 - Vincent Cheval, Caroline Fontaine:
Automatic Verification of Finite Variant Property Beyond Convergent Equational Theories. 521-536 - Ethan Cecchetti:
Nonmalleable Progress Leakage. 537-552 - Damián Árquez, Matías Toro, Éric Tanter:
Gradual Sensitivity Typing. 553-568 - Jonathan Baumann, Roberto Blanco, Léon Ducruet, Sebastian Harwig, Catalin Hritcu:
FSLH: Flexible Mechanized Speculative Load Hardening. 569-584 - Mohammad A. Zarrabian, Parastoo Sadeghi:
An Extension of the Adversarial Threat Model in Quantitative Information Flow. 585-600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.