


default search action
38th CSF 2025: Santa Cruz, CA, USA
- 38th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, CA, USA, June 16-20, 2025. IEEE 2025, ISBN 979-8-3315-1081-7

- Scott L. Dyer, Christian A. Femrite, Joshua D. Guttman, Julian P. Lanson, Moses D. Liskov:

Cryptographically Assured Information Flow: Assured Remote Execution. 1-16 - Stéphanie Delaune, Clément Hérouard, Joseph Lallemand:

Secrecy by Typing in the Computational Model. 17-32 - Matteo Busi, Riccardo Focardi, Flaminia L. Luccio:

Strands Rocq: Why is a Security Protocol Correct, Mechanically? 33-48 - Lorenzo Martinico, Markulf Kohlweiss:

AGATE: Augmented Global Attested Trusted Execution in the Universal Composability Framework. 49-64 - Andreas Athanasiou, Konstantinos Chatzikokolakis, Catuscia Palamidessi:

Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting. 65-80 - Mingen Pan:

Actual Knowledge Gain as Privacy Loss in Local Privacy Accounting. 81-96 - Mingen Pan:

Improving Count-Mean Sketch as the Leading Locally Differentially Private Frequency Estimator for Large Dictionaries. 97-112 - Victor Sannier

, Patrick Baillot, Marco Gaboardi:
Session Types for the Concurrent Composition of Interactive Differential Privacy. 113-126 - Peeter Laud, Alisa Pankova, Jelizaveta Vakarjuk

:
Privacy-Preserving Server-Supported Decryption. 127-142 - Sashidhar Jakkamsetti, Zeyu Liu, Varun Madathil:

Scalable Private Signaling. 143-158 - Keitaro Hashimoto, Kyosuke Yamashita

, Keisuke Hara:
Foundations of Multi-Designated Verifier Signature Comprehensive Formalization and New Constructions in Subset Simulation. 159-174 - Léonard Brice, Jean-François Raskin, Mathieu Sassolas, Guillaume Scerri, Marie van den Bogaard:

Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents. 175-189 - Tachio Terauchi

:
On DoS Vulnerability of Regular Expressions, with and Without Backreferences. 190-204 - Yumeng Zhang, Max Ward, Hung Nguyen:

Rethinking Attack Path Management: A New Metric for Choke Points in Attack Graphs. 205-219 - Bhagya Wimalasiri

, Benjamin Dowling, Rabiah Alnashwan:
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers. 220-235 - Jian Xiang, Simone Tini, Ruggero Lanotte, Massimo Merro:

Formal Robustness for Cyber-Physical Systems Under Timed Attacks. 236-251 - Elisavet Kozyri, Fred B. Schneider, Stephen Chong:

Accountability, Involvement, and Mediation for Information Flow. 252-267 - Vineet Rajani

, Alex Coleman, Hrutvik Kanabar:
A Graded Modal Approach to Relaxed Semantic Declassification. 268-283 - Anoud Alshnakat, Amir M. Ahmadian, Musard Balliu, Roberto Guanciale, Mads Dam:

Securing P4 Programs by Information Flow Control. 284-299 - Stephan Dübler, Federico Badaloni, Pedro Moreno-Sanchez, Clara Schneidewind:

Atomic Transfer Graphs: Secure-by-Design Protocols for Heterogeneous Blockchain Ecosystems. 300-315 - Federico Badaloni, Sebastian Holler, Chrysoula Oikonomou, Pedro Moreno-Sanchez, Clara Schneidewind:

$BitML^{x}$: Secure Cross-Chain Smart Contracts for Bitcoin-Style Cryptocurrencies. 316-330 - Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan:

VRaaS: Verifiable Randomness as a Service on Blockchains. 331-346 - Xenia Hofmeier, Andrea Raguso, Ralf Sasse, Dennis Jackson, David A. Basin:

One For All: Formally Verifying Protocols which use Aggregate Signatures. 347-362 - Markus Krabbe Larsen, Carsten Schürmann:

Nominal State-Separating Proofs. 363-377 - Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati:

Symbolic Parallel Composition for Multi-language Protocol Verification. 378-393 - Gildas Avoine, Tristan Claverie, Stéphanie Delaune:

Formal Analysis of Random Nonce Misuses in Cryptographic Protocols. 394-409 - Yifeng Liu, Zehua Wang:

A Novel Approach to Differential Privacy with Alpha Divergence. 410-424 - Adda-Akram Bendoukha, Renaud Sirdey, Aymen Boudguiga, Nesrine Kaaniche:

Unveiling the (in)Security of Threshold FHE-Based Federated Learning: The Practical Impact of Recent CPAD Attacks. 425-440 - Thomas Haines, Rafieh Mosaheb, Johannes Müller, Reetika:

Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application. 441-456 - Daniel Rausch, Nicolas Huber, Ralf Küsters:

Verifiable E-Voting with a Trustless Bulletin Board. 457-472 - Callum London, Daniel Gardham, Constantin Catalin Dragan:

Dynamic Group Signatures with Verifier-Local Revocation. 473-488 - Stefan Milius, Dominik Paulus, Dominique Schröder, Lutz Schröder, Julian Thomas:

Automated Analysis and Synthesis of Message Authentication Codes. 489-504 - David Baelde, Stéphanie Delaune, Stanislas Riou:

SMT-Based Automation for Overwhelming Truth. 505-520 - Vincent Cheval, Caroline Fontaine:

Automatic Verification of Finite Variant Property Beyond Convergent Equational Theories. 521-536 - Ethan Cecchetti

:
Nonmalleable Progress Leakage. 537-552 - Damián Árquez, Matías Toro, Éric Tanter:

Gradual Sensitivity Typing. 553-568 - Jonathan Baumann, Roberto Blanco, Léon Ducruet, Sebastian Harwig, Catalin Hritcu:

FSLH: Flexible Mechanized Speculative Load Hardening. 569-584 - Mohammad A. Zarrabian, Parastoo Sadeghi:

An Extension of the Adversarial Threat Model in Quantitative Information Flow. 585-600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














