


default search action
35th CSF 2022: Haifa, Israel
- 35th IEEE Computer Security Foundations Symposium, CSF 2022, Haifa, Israel, August 7-10, 2022. IEEE 2022, ISBN 978-1-6654-8417-6

- Petar Paradzik, Ante Derek:

Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting. 1-16 - Reynaldo Gil Pons, Ross Horne, Sjouke Mauw, Alwen Tiu, Rolando Trujillo-Rasua

:
Is Eve nearby? Analysing protocols under the distant-attacker assumption. 17-32 - Véronique Cortier, Antoine Dallon, Stéphanie Delaune:

A small bound on the number of sessions for security protocols. 33-48 - Liyi Li

, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn
, Michael Hicks:
A Formal Model of Checked C. 49-63 - Akram El-Korashy, Roberto Blanco, Jérémy Thibault, Adrien Durier, Deepak Garg, Catalin Hritcu:

SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation. 64-79 - Thomas Van Strydonck, Aïna Linn Georges, Armaël Guéneau, Alix Trieu, Amin Timany

, Frank Piessens, Lars Birkedal
, Dominique Devriese
:
Proving full-system security properties under multiple attacker models on capability machines. 80-95 - Alisa Pankova, Peeter Laud:

Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes. 96-111 - Farzane Karami, David A. Basin

, Einar Broch Johnsen:
DPL: A Language for GDPR Enforcement. 112-129 - Sébastien Gondron, Sebastian Mödersheim

, Luca Viganò:
Privacy as Reachability. 130-146 - Thilo Weghorn, Si Liu

, Christoph Sprenger
, Adrian Perrig, David A. Basin
:
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures. 147-162 - Priyanka Mondal

, Maximilian Algehed, Owen Arden:
Applying consensus and replication securely with FLAQR. 163-178 - David Mestel, Johannes Müller

, Pascal Reisert
:
How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis. 179-194 - Sergiu Bursuc, Sjouke Mauw:

Contingent payments from two-party signing and verification for abelian groups. 195-210 - Michele Ciampi, Yun Lu, Vassilis Zikas:

Collusion-Preserving Computation without a Mediator. 211-226 - François Dupressoir, Konrad Kohbrok, Sabine Oechsner

:
Bringing State-Separating Proofs to EasyCrypt A Security Proof for Cryptobox. 227-242 - Lorenzo Ceragioli

, Letterio Galletta, Pierpaolo Degano, David A. Basin
:
IFCIL: An Information Flow Configuration Language for SELinux. 243-259 - Peixuan Li, Danfeng Zhang

:
Towards a General-Purpose Dynamic Information Flow Policy. 260-275 - David Mestel:

Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games. 276-288 - David Baelde, Stéphanie Delaune, Adrien Koutsos

, Solène Moreau:
Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant. 289-304 - Felipe Boeira, Mikael Asplund

:
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol. 305-318 - Vincent Cheval

, Raphaëlle Crubillé, Steve Kremer:
Symbolic protocol verification with dice: process equivalences in the presence of probabilities. 319-334 - Constantin Catalin Dragan

, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan
, Peter B. Rønne
, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. 335-347 - Natasha Fernandes

, Annabelle McIver
, Catuscia Palamidessi, Ming Ding:
Universal Optimality and Robust Utility Bounds for Metric Differential Privacy. 348-363 - Ross Horne, Sjouke Mauw, Semen Yurkov:

Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments. 364-379 - Lisa Oakley, Alina Oprea, Stavros Tripakis:

Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems. 380-395 - Mark Bun

, Marco Gaboardi
, Ludmila Glinskih:
The Complexity of Verifying Boolean Programs as Differentially Private. 396-411 - Timothy M. Braje, Alice R. Lee, Andrew Wagner

, Benjamin Kaiser, Daniel Park, Martine Kalke, Robert K. Cunningham, Adam Chlipala:
Adversary Safety by Construction in a Language of Cryptographic Protocols. 412-427 - Alexander May, Floyd Zweydinger:

Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing. 428-438 - Tommy Hollenberg, Mike Rosulek, Lawrence Roy:

A Complete Characterization of Security for Linicrypt Block Cipher Modes. 439-454 - Mohamed El Massad, Nahid Juma, Jonathan Shahen, Mariana Raykova, Siddharth Garg

, Mahesh Tripunitara:
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking. 455-470 - Raven Beutner, Bernd Finkbeiner:

Prophecy Variables for Hyperproperty Verification. 471-485 - Tzu-Han Hsu, Borzoo Bonakdarpour, Eunsuk Kang, Stavros Tripakis:

Mapping Synthesis for Hyperproperties. 486-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














