


default search action
29th CSF 2016: Lisbon, Portugal
- IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-2607-4

Invited Talks and Invited Papers
- Andrew W. Appel

:
Modular Verification for Computer Security. 1-8 - Úlfar Erlingsson:

Data-Driven Software Security: Models and Methods. 9-15 - Ross J. Anderson:

Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only). 16
Software Security
- Marco Patrignani

, Dominique Devriese
, Frank Piessens:
On Modular and Fully-Abstract Compilation. 17-30 - Sergiu Costea, Bogdan Warinschi:

Secure Software Licensing: Models, Constructions, and Proofs. 31-44 - Yannis Juglaret, Catalin Hritcu, Arthur Azevedo de Amorim, Boris Eng, Benjamin C. Pierce:

Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. 45-60
Quantitative Security
- M. H. R. Khouzani, Pasquale Malacaria:

Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design. 61-76 - Mário S. Alvim

, Konstantinos Chatzikokolakis, Annabelle McIver
, Carroll Morgan, Catuscia Palamidessi
, Geoffrey Smith:
Axioms for Information Leakage. 77-92 - Nicolás E. Bordenabe, Geoffrey Smith:

Correlated Secrets in Quantitative Information Flow. 93-104 - Zaruhi Aslanyan, Flemming Nielson

, David Parker:
Quantitative Verification and Synthesis of Attack-Defence Scenarios. 105-119
Access Control I
- David A. Basin, Søren Debois

, Thomas T. Hildebrandt:
In the Nick of Time: Proactive Prevention of Obligation Violations. 120-134 - Owen Arden, Andrew C. Myers:

A Calculus for Flow-Limited Authorization. 135-149 - Vineet Rajani

, Deepak Garg, Tamara Rezk:
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. 150-163
Protocols and Distributed Systems I
- Katriel Cohn-Gordon, Cas Cremers, Luke Garratt:

On Post-compromise Security. 164-178 - Stefano Calzavara

, Riccardo Focardi
, Niklas Grimm, Matteo Maffei:
Micro-policies for Web Session Security. 179-193 - Pedro Adão

, Riccardo Focardi
, Joshua D. Guttman
, Flaminia L. Luccio
:
Localizing Firewall Security Policies. 194-209
Information Flow I
- Mounir Assaf, David A. Naumann

:
Calculational Design of Information Flow Monitors. 210-224 - Frédéric Besson, Nataliia Bielova

, Thomas P. Jensen:
Hybrid Monitoring of Attacker Knowledge. 225-238 - Shreya Agrawal, Borzoo Bonakdarpour:

Runtime Verification of k-Safety Hyperproperties in HyperLTL. 239-252 - Simon Greiner, Daniel Grahl

:
Non-interference with What-Declassification in Component-Based Systems. 253-267
Computer-Aided Cryptography
- Cédric Fournet, Chantal Keller, Vincent Laporte:

A Certified Compiler for Verifiable Computing. 268-280 - Guillaume Scerri, Ryan Stanley-Oakes:

Analysis of Key Wrapping APIs: Generic Policies, Computational Security. 281-295 - Jean Karim Zinzindohoue, Evmorfia-Iro Bartzia, Karthikeyan Bhargavan:

A Verified Extensible Library of Elliptic Curves. 296-309
Protocols and Distributed Systems Il
- Bruno Blanchet

, Ben Smyth:
Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers. 310-324 - David A. Basin, Sasa Radomirovic

, Lara Schmid:
Modeling Human Errors in Security Protocols. 325-340 - Ralf Küsters, Johannes Müller

, Enrico Scapin, Tomasz Truderung:
sElect: A Lightweight Verifiable Remote Voting System. 341-354
Privacy and Economics
- Xi Wu, Matthew Fredrikson

, Somesh Jha, Jeffrey F. Naughton:
A Methodology for Formalizing Model-Inversion Attacks. 355-370 - Jeremiah Blocki

, Anupam Datta:
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. 371-386
Information Flow II
- Corina S. Pasareanu, Quoc-Sang Phan

, Pasquale Malacaria:
Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT. 387-400 - Filippo Del Tedesco, David Sands, Alejandro Russo

:
Fault-Resilient Non-interference. 401-416 - Toby C. Murray, Robert Sison

, Edward Pierzchalski, Christine Rizkallah
:
Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. 417-431
Access Control II
- Marcos Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, Marc Denecker

:
Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete. 432-442 - Petar Tsankov, Mohammad Torabi Dashti

, David A. Basin:
Access Control Synthesis for Physical Spaces. 443-457 - Stefano Calzavara

, Alvise Rabitti, Enrico Steffinlongo, Michele Bugliesi
:
Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems. 458-470

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














