default search action
35th CSF 2022: Haifa, Israel
- 35th IEEE Computer Security Foundations Symposium, CSF 2022, Haifa, Israel, August 7-10, 2022. IEEE 2022, ISBN 978-1-6654-8417-6
- Petar Paradzik, Ante Derek:
Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting. 1-16 - Reynaldo Gil Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, Rolando Trujillo-Rasua:
Is Eve nearby? Analysing protocols under the distant-attacker assumption. 17-32 - Véronique Cortier, Antoine Dallon, Stéphanie Delaune:
A small bound on the number of sessions for security protocols. 33-48 - Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A Formal Model of Checked C. 49-63 - Akram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg, Catalin Hritcu:
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation. 64-79 - Thomas Van Strydonck, Aïna Linn Georges, Armaël Guéneau, Alix Trieu, Amin Timany, Frank Piessens, Lars Birkedal, Dominique Devriese:
Proving full-system security properties under multiple attacker models on capability machines. 80-95 - Alisa Pankova, Peeter Laud:
Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes. 96-111 - Farzane Karami, David A. Basin, Einar Broch Johnsen:
DPL: A Language for GDPR Enforcement. 112-129 - Sébastien Gondron, Sebastian Mödersheim, Luca Viganò:
Privacy as Reachability. 130-146 - Thilo Weghorn, Si Liu, Christoph Sprenger, Adrian Perrig, David A. Basin:
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures. 147-162 - Priyanka Mondal, Maximilian Algehed, Owen Arden:
Applying consensus and replication securely with FLAQR. 163-178 - David Mestel, Johannes Müller, Pascal Reisert:
How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis. 179-194 - Sergiu Bursuc, Sjouke Mauw:
Contingent payments from two-party signing and verification for abelian groups. 195-210 - Michele Ciampi, Yun Lu, Vassilis Zikas:
Collusion-Preserving Computation without a Mediator. 211-226 - François Dupressoir, Konrad Kohbrok, Sabine Oechsner:
Bringing State-Separating Proofs to EasyCrypt A Security Proof for Cryptobox. 227-242 - Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
IFCIL: An Information Flow Configuration Language for SELinux. 243-259 - Peixuan Li, Danfeng Zhang:
Towards a General-Purpose Dynamic Information Flow Policy. 260-275 - David Mestel:
Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games. 276-288 - David Baelde, Stéphanie Delaune, Adrien Koutsos, Solène Moreau:
Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant. 289-304 - Felipe Boeira, Mikael Asplund:
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol. 305-318 - Vincent Cheval, Raphaëlle Crubillé, Steve Kremer:
Symbolic protocol verification with dice: process equivalences in the presence of probabilities. 319-334 - Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. 335-347 - Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding:
Universal Optimality and Robust Utility Bounds for Metric Differential Privacy. 348-363 - Ross Horne, Sjouke Mauw, Semen Yurkov:
Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments. 364-379 - Lisa Oakley, Alina Oprea, Stavros Tripakis:
Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems. 380-395 - Mark Bun, Marco Gaboardi, Ludmila Glinskih:
The Complexity of Verifying Boolean Programs as Differentially Private. 396-411 - Timothy M. Braje, Alice R. Lee, Andrew Wagner, Benjamin Kaiser, Daniel Park, Martine Kalke, Robert K. Cunningham, Adam Chlipala:
Adversary Safety by Construction in a Language of Cryptographic Protocols. 412-427 - Alexander May, Floyd Zweydinger:
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing. 428-438 - Tommy Hollenberg, Mike Rosulek, Lawrence Roy:
A Complete Characterization of Security for Linicrypt Block Cipher Modes. 439-454 - Mohamed El Massad, Nahid Juma, Jonathan Shahen, Mariana Raykova, Siddharth Garg, Mahesh Tripunitara:
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking. 455-470 - Raven Beutner, Bernd Finkbeiner:
Prophecy Variables for Hyperproperty Verification. 471-485 - Tzu-Han Hsu, Borzoo Bonakdarpour, Eunsuk Kang, Stavros Tripakis:
Mapping Synthesis for Hyperproperties. 486-500
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.