- 2019
- Konstantinos Chatzikokolakis, Natasha Fernandes
, Catuscia Palamidessi
:
Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy. CSF 2019: 442-457 - Carmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani
, Jérémy Thibault:
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation. CSF 2019: 256-271 - Maximilian Algehed, Alejandro Russo
, Cormac Flanagan:
Optimising Faceted Secure Multi-Execution. CSF 2019: 1-16 - Arthur Américo, M. H. R. Khouzani, Pasquale Malacaria:
Deterministic Channel Design for Minimum Leakage. CSF 2019: 428-441 - Timos Antonopoulos, Tachio Terauchi
:
Games for Security Under Adaptive Adversaries. CSF 2019: 216-229 - Musard Balliu, Massimo Merro, Michele Pasqua
:
Securing Cross-App Interactions in IoT Platforms. CSF 2019: 319-334 - Gilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub:
Symbolic Methods in Computational Cryptography Proofs. CSF 2019: 136-151 - Frédéric Besson, Alexandre Dang, Thomas P. Jensen:
Information-Flow Preservation in Compiler Optimisations. CSF 2019: 230-242 - Ran Canetti, Alley Stoughton, Mayank Varia:
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security. CSF 2019: 167-183 - Véronique Cortier, Alicia Filipiak, Joseph Lallemand:
BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device. CSF 2019: 367-381 - Cas Cremers, Dennis Jackson
:
Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman. CSF 2019: 78-93 - Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11. CSF 2019: 62-77 - Barbara Fila, Wojciech Widel
:
Efficient Attack-Defense Tree Analysis using Pareto Attribute Domains. CSF 2019: 200-215 - Bernd Finkbeiner, Lennart Haas, Hazem Torfah
:
Canonical Representations of k-Safety Hyperproperties. CSF 2019: 17-31 - Anitha Gollamudi
, Stephen Chong, Owen Arden:
Information Flow Control for Distributed Trusted Execution Environments. CSF 2019: 304-318 - Adrien Koutsos:
Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. CSF 2019: 48-61 - Elisavet Kozyri, Fred B. Schneider, Andrew Bedford, Josée Desharnais
, Nadia Tawbi
:
Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement. CSF 2019: 351-366 - Robert Künnemann, Ilkan Esiyok, Michael Backes:
Automated Verification of Accountability in Security Protocols. CSF 2019: 397-413 - Andreas Lochbihler, S. Reza Sefidgar, David A. Basin, Ueli Maurer:
Formalizing Constructive Cryptography using CryptHOL. CSF 2019: 152-166 - Heiko Mantel, Christian W. Probst:
On the Meaning and Purpose of Attack Trees. CSF 2019: 184-199 - David Mestel:
Quantifying Information Flow in Interactive Systems. CSF 2019: 414-427 - Mathias Vorreiter Pedersen, Aslan Askarov:
Static Enforcement of Security in Runtime Systems. CSF 2019: 335-350 - Elaine Shi:
Analysis of Deterministic Longest-Chain Protocols. CSF 2019: 122-135 - Stelios Tsampas
, Dominique Devriese
, Frank Piessens:
Temporal Safety for Stack Allocated Memory on Capability Machines. CSF 2019: 243-255 - Abraão Aires Urquiza, Musab A. AlTurki, Max I. Kanovich, Tajana Ban Kirigin
, Vivek Nigam
, Andre Scedrov, Carolyn L. Talcott:
Resource-Bounded Intruders in Denial of Service Attacks. CSF 2019: 382-396 - Panagiotis Vasilikos, Hanne Riis Nielson
, Flemming Nielson
, Boris Köpf:
Timing Leaks and Coarse-Grained Clocks. CSF 2019: 32-47 - Jiangshan Yu
, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-Thinking Untraceability in the CryptoNote-Style Blockchain. CSF 2019: 94-107 - Drew Zagieboylo, G. Edward Suh, Andrew C. Myers:
Using Information Flow to Design an ISA that Controls Timing Channels. CSF 2019: 272-287 - Yevhen Zolotavkin, Julián García, Joseph Liu:
Time-Dependent Decision-Making and Decentralization in Proof-of-Work Cryptocurrencies. CSF 2019: 108-121