researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
algebra
C++
Meta-Environment
abstraction
access control
analysis
composition
data-flow
data-flow analysis
e-science
information models
logic
meta-model
model checking
protocol
role-based access control
rule-based
security
semantics
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
Alejandro Russo
Andre Scedrov
Andrei Sabelfeld
Andrew C. Myers
Anupam Datta
Bogdan Warinschi
Catherine Meadows
Catuscia Palamidessi
David A. Basin
Gavin Lowe
Geoffrey Smith
Gilles Barthe
John C. Mitchell
Matteo Maffei
Michael Backes
Riccardo Focardi
Stephen Chong
Steve Kremer
Stéphanie Delaune
Véronique Cortier
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
attacks
computer
control
cryptographic
flow
formal
foundations
ieee
information
model
policies
privacy
protocol
protocols
secure
security
systems
using
CSFW (csfw)
Editions
Publications
Viewing Publication 1 - 100 from 944
2023
Bayes Security: A Not So Average Metric
Konstantinos Chatzikokolakis 0001
,
Giovanni Cherubin
,
Catuscia Palamidessi
,
Carmela Troncoso
.
csfw 2023
:
388-406
[doi]
36th IEEE Computer Security Foundations Symposium, CSF 2023, Dubrovnik, Croatia, July 10-14, 2023
IEEE,
2023.
[doi]
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE
Adi Akavia
,
Ben Galili
,
Hayim Shaul
,
Mor Weiss
,
Zohar Yakhini
.
csfw 2023
:
489-504
[doi]
Formalizing Stack Safety as a Security Property
Sean Noble Anderson
,
Roberto Blanco
,
Leonidas Lampropoulos
,
Benjamin C. Pierce
,
Andrew Tolmach
.
csfw 2023
:
356-371
[doi]
Proving Unlinkability Using ProVerif Through Desynchronised Bi-Processes
David Baelde
,
Alexandre Debant
,
Stéphanie Delaune
.
csfw 2023
:
75-90
[doi]
Election Verifiability in Receipt-Free Voting Protocols
Sevdenur Baloglu
,
Sergiu Bursuc
,
Sjouke Mauw
,
Jun Pang 0001
.
csfw 2023
:
59-74
[doi]
A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow Integrity
Matthieu Baty
,
Pierre Wilke
,
Guillaume Hiet
,
Arnaud Fontaine
,
Alix Trieu
.
csfw 2023
:
372-387
[doi]
OblivIO: Securing Reactive Programs by Oblivious Execution with Bounded Traffic Overheads
Jeppe Fredsgaard Blaabjerg
,
Aslan Askarov
.
csfw 2023
:
292-307
[doi]
A State-Separating Proof for Yao's Garbling Scheme
Chris Brzuska
,
Sabine Oechsner
.
csfw 2023
:
137-152
[doi]
Cross-Chain Swaps with Preferences
Eric Chan
,
Marek Chrobak
,
Mohsen Lesani
.
csfw 2023
:
261-275
[doi]
Indistinguishability Beyond Diff-Equivalence in ProVerif
Vincent Cheval
,
Itsaka Rakotonirina
.
csfw 2023
:
184-199
[doi]
Election Verifiability with ProVerif
Vincent Cheval
,
Véronique Cortier
,
Alexandre Debant
.
csfw 2023
:
43-58
[doi]
On Sustainable Ring-Based Anonymous Systems
Sherman S. M. Chow
,
Christoph Egger 0001
,
Russell W. F. Lai
,
Viktoria Ronge
,
Ivy K. Y. Woo
.
csfw 2023
:
568-583
[doi]
Smart Contract Synthesis Modulo Hyperproperties
Norine Coenen
,
Bernd Finkbeiner
,
Jana Hofmann
,
Julia J. Tillman
.
csfw 2023
:
276-291
[doi]
Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis
Cas Cremers
,
Charlie Jacomme
,
Philip Lukert
.
csfw 2023
:
200-213
[doi]
Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers
Farzaneh Derakhshan
,
Zichao Zhang
,
Amit Vasudevan
,
Limin Jia 0001
.
csfw 2023
:
324-339
[doi]
SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap
Sayanton V. Dibbo
.
csfw 2023
:
439-456
[doi]
Statement-Oblivious Threshold Witness Encryption
Sebastian Faust
,
Carmit Hazay
,
David Kretzler
,
Benjamin Schlosser
.
csfw 2023
:
17-32
[doi]
Zero-Knowledge in EasyCrypt
Denis Firsov
,
Dominique Unruh
.
csfw 2023
:
1-16
[doi]
On the Incoercibility of Digital Signatures
Ashley Fraser
,
Lydia Garms
,
Elizabeth A. Quaglia
.
csfw 2023
:
153-168
[doi]
HoRStify: Sound Security Analysis of Smart Contracts
Sebastian Holler
,
Sebastian Biewer
,
Clara Schneidewind
.
csfw 2023
:
245-260
[doi]
Investigating Membership Inference Attacks under Data Dependencies
Thomas Humphries
,
Simon Oya
,
Lindsey Tulloch
,
Matthew Rafuse
,
Ian Goldberg
,
Urs Hengartner
,
Florian Kerschbaum
.
csfw 2023
:
473-488
[doi]
High-Assurance Field Inversion for Curve-Based Cryptography
Benjamin Salling Hvass
,
Diego F. Aranha
,
Bas Spitters
.
csfw 2023
:
552-567
[doi]
Preimage Awareness in Linicrypt
Zahra Javar
,
Bruce M. Kapron
.
csfw 2023
:
33-42
[doi]
Analyzing the Shuffle Model Through the Lens of Quantitative Information Flow
Mireya Jurado
,
Ramon G. Gonze
,
Mário S. Alvim
,
Catuscia Palamidessi
.
csfw 2023
:
423-438
[doi]
$\pi_{\mathbf{RA}}$: A $\pi\text{-calculus}$ for Verifying Protocols that Use Remote Attestation
Emiel Lanckriet
,
Matteo Busi 0001
,
Dominique Devriese
.
csfw 2023
:
537-551
[doi]
Collusion-Deterrent Threshold Information Escrow
Easwar Vivek Mangipudi
,
Donghang Lu
,
Alexandros Psomas 0001
,
Aniket Kate
.
csfw 2023
:
584-599
[doi]
SoK: Delay-Based Cryptography
Liam Medley
,
Angelique Faye Loe
,
Elizabeth A. Quaglia
.
csfw 2023
:
169-183
[doi]
Robust Safety for Move
Marco Patrignani
,
Sam Blackshear
.
csfw 2023
:
308-323
[doi]
Basilic: Resilient-Optimal Consensus Protocols with Benign and Deceitful Faults
Alejandro Ranchal Pedrosa
,
Vincent Gramoli
.
csfw 2023
:
91-106
[doi]
General-Purpose Secure Conflict-free Replicated Data Types
Bernardo Portela
,
Hugo Pacheco 0001
,
Pedro Jorge
,
Rogério Pontes
.
csfw 2023
:
521-536
[doi]
Towards a Game-Theoretic Security Analysis of Off-Chain Protocols
Sophie Rain
,
Georgia Avarikioti
,
Laura Kovács
,
Matteo Maffei
.
csfw 2023
:
107-122
[doi]
Optimally Hiding Object Sizes with Constrained Padding
Andrew C. Reed
,
Michael K. Reiter
.
csfw 2023
:
505-520
[doi]
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information
Shahnewaz Karim Sakib
,
George T. Amariucai
,
Yong Guan
.
csfw 2023
:
407-422
[doi]
On the (De) centralization of FruitChains
Aikaterini-Panagiota Stouka
,
Thomas Zacharias 0001
.
csfw 2023
:
229-244
[doi]
From Bounded to Unbounded: Privacy Amplification via Shuffling with Dummies
Shun Takagi
,
Fumiyuki Kato
,
Yang Cao 0011
,
Masatoshi Yoshikawa
.
csfw 2023
:
457-472
[doi]
Securing Optimized Code Against Power Side Channels
Rodothea-Myrsini Tsoupidi
,
Roberto Castañeda Lozano
,
Elena Troubitsyna
,
Panagiotis Papadimitratos
.
csfw 2023
:
340-355
[doi]
Extending the Authentication Hierarchy with One-Way Agreement
Johannes Wilson
,
Mikael Asplund
,
Niklas Johansson
.
csfw 2023
:
214-228
[doi]
Keep Spending: Beyond Optimal Cyber-Security Investment
Yunxiao Zhang
,
Pasquale Malacaria
.
csfw 2023
:
123-136
[doi]
2022
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing
Alexander May 0001
,
Floyd Zweydinger
.
csfw 2022
:
428-438
[doi]
35th IEEE Computer Security Foundations Symposium, CSF 2022, Haifa, Israel, August 7-10, 2022
IEEE,
2022.
[doi]
Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant
David Baelde
,
Stéphanie Delaune
,
Adrien Koutsos
,
Solène Moreau
.
csfw 2022
:
289-304
[doi]
Prophecy Variables for Hyperproperty Verification
Raven Beutner
,
Bernd Finkbeiner
.
csfw 2022
:
471-485
[doi]
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
Felipe Boeira
,
Mikael Asplund
.
csfw 2022
:
305-318
[doi]
Adversary Safety by Construction in a Language of Cryptographic Protocols
Timothy M. Braje
,
Alice R. Lee
,
Andrew Wagner
,
Benjamin Kaiser
,
Daniel Park
,
Martine Kalke
,
Robert K. Cunningham
,
Adam Chlipala
.
csfw 2022
:
412-427
[doi]
The Complexity of Verifying Boolean Programs as Differentially Private
Mark Bun
,
Marco Gaboardi
,
Ludmila Glinskih
.
csfw 2022
:
396-411
[doi]
Contingent payments from two-party signing and verification for abelian groups
Sergiu Bursuc
,
Sjouke Mauw
.
csfw 2022
:
195-210
[doi]
Contingent payments from two-party signing and verification for abelian groups
Sergiu Bursuc
,
Sjouke Mauw
.
csfw 2022
:
195-210
[doi]
IFCIL: An Information Flow Configuration Language for SELinux
Lorenzo Ceragioli
,
Letterio Galletta
,
Pierpaolo Degano
,
David A. Basin
.
csfw 2022
:
243-259
[doi]
Symbolic protocol verification with dice: process equivalences in the presence of probabilities
Vincent Cheval
,
Raphaëlle Crubillé
,
Steve Kremer
.
csfw 2022
:
319-334
[doi]
Collusion-Preserving Computation without a Mediator
Michele Ciampi
,
Yun Lu 0001
,
Vassilis Zikas
.
csfw 2022
:
211-226
[doi]
A small bound on the number of sessions for security protocols
Véronique Cortier
,
Antoine Dallon
,
Stéphanie Delaune
.
csfw 2022
:
33-48
[doi]
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co
Constantin Catalin Dragan
,
François Dupressoir
,
Ehsan Estaji
,
Kristian Gjøsteen
,
Thomas Haines
,
Peter Y. A. Ryan
,
Peter B. Rønne
,
Morten Rotvold Solberg
.
csfw 2022
:
335-347
[doi]
Bringing State-Separating Proofs to EasyCrypt A Security Proof for Cryptobox
François Dupressoir
,
Konrad Kohbrok
,
Sabine Oechsner
.
csfw 2022
:
227-242
[doi]
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation
Akram El-Korashy
,
Roberto Blanco
,
Jérémy Thibault
,
Adrien Durier
,
Deepak Garg 0001
,
Catalin Hritcu
.
csfw 2022
:
64-79
[doi]
Universal Optimality and Robust Utility Bounds for Metric Differential Privacy
Natasha Fernandes
,
Annabelle McIver
,
Catuscia Palamidessi
,
Ming Ding
.
csfw 2022
:
348-363
[doi]
Privacy as Reachability
Sébastien Gondron
,
Sebastian Mödersheim
,
Luca Viganò 0001
.
csfw 2022
:
130-146
[doi]
A Complete Characterization of Security for Linicrypt Block Cipher Modes
Tommy Hollenberg
,
Mike Rosulek
,
Lawrence Roy
.
csfw 2022
:
439-454
[doi]
Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments
Ross Horne
,
Sjouke Mauw
,
Semen Yurkov
.
csfw 2022
:
364-379
[doi]
Mapping Synthesis for Hyperproperties
Tzu-Han Hsu
,
Borzoo Bonakdarpour
,
Eunsuk Kang
,
Stavros Tripakis
.
csfw 2022
:
486-500
[doi]
DPL: A Language for GDPR Enforcement
Farzane Karami
,
David A. Basin
,
Einar Broch Johnsen
.
csfw 2022
:
112-129
[doi]
A Formal Model of Checked C
Liyi Li
,
Yiyun Liu
,
Deena L. Postol
,
Leonidas Lampropoulos
,
David Van Horn
,
Michael Hicks 0001
.
csfw 2022
:
49-63
[doi]
Towards a General-Purpose Dynamic Information Flow Policy
Peixuan Li
,
Danfeng Zhang
.
csfw 2022
:
260-275
[doi]
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking
Mohamed El Massad
,
Nahid Juma
,
Jonathan Shahen
,
Mariana Raykova 0001
,
Siddharth Garg
,
Mahesh Tripunitara
.
csfw 2022
:
455-470
[doi]
Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games
David Mestel
.
csfw 2022
:
276-288
[doi]
How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis
David Mestel
,
Johannes Müller 0001
,
Pascal Reisert
.
csfw 2022
:
179-194
[doi]
Applying consensus and replication securely with FLAQR
Priyanka Mondal
,
Maximilian Algehed
,
Owen Arden
.
csfw 2022
:
163-178
[doi]
Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems
Lisa Oakley
,
Alina Oprea
,
Stavros Tripakis
.
csfw 2022
:
380-395
[doi]
Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes
Alisa Pankova
,
Peeter Laud
.
csfw 2022
:
96-111
[doi]
Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting
Petar Paradzik
,
Ante Derek
.
csfw 2022
:
1-16
[doi]
Is Eve nearby? Analysing protocols under the distant-attacker assumption
Reynaldo Gil Pons
,
Ross Horne
,
Sjouke Mauw
,
Alwen Tiu
,
Rolando Trujillo-Rasua
.
csfw 2022
:
17-32
[doi]
Proving full-system security properties under multiple attacker models on capability machines
Thomas Van Strydonck
,
Aïna Linn Georges
,
Armaël Guéneau
,
Alix Trieu
,
Amin Timany
,
Frank Piessens
,
Lars Birkedal
,
Dominique Devriese
.
csfw 2022
:
80-95
[doi]
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures
Thilo Weghorn
,
Si Liu
,
Christoph Sprenger 0001
,
Adrian Perrig
,
David A. Basin
.
csfw 2022
:
147-162
[doi]
2021
34th IEEE Computer Security Foundations Symposium, CSF 2021, Dubrovnik, Croatia, June 21-25, 2021
IEEE,
2021.
[doi]
SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq
Carmine Abate
,
Philipp G. Haselwarter
,
Exequiel Rivas
,
Antoine Van Muylder
,
Théo Winterhalter
,
Catalin Hritcu
,
Kenji Maillard
,
Bas Spitters
.
csfw 2021
:
1-15
[doi]
DDUO: General-Purpose Dynamic Analysis for Differential Privacy
Chike Abuah
,
Alex Silence
,
David Darais
,
Joseph P. Near
.
csfw 2021
:
1-15
[doi]
Dynamic IFC Theorems for Free!
Maximilian Algehed
,
Jean-Philippe Bernardy
,
Catalin Hritcu
.
csfw 2021
:
1-14
[doi]
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios
Sevdenur Baloglu
,
Sergiu Bursuc
,
Sjouke Mauw
,
Jun Pang 0001
.
csfw 2021
:
1-15
[doi]
Computationally sound Bitcoin tokens
Massimo Bartoletti
,
Stefano Lande
,
Roberto Zunino
.
csfw 2021
:
1-15
[doi]
Gradual Security Types and Gradual Guarantees
Abhishek Bichhawat
,
McKenna McCall
,
Limin Jia 0001
.
csfw 2021
:
1-16
[doi]
Automating Audit with Policy Inference
Abhishek Bichhawat
,
Matt Fredrikson
,
Jean Yang
.
csfw 2021
:
1-16
[doi]
Towards Language-Based Mitigation of Traffic Analysis Attacks
Jeppe Fredsgaard Blaabjerg
,
Aslan Askarov
.
csfw 2021
:
1-15
[doi]
Mechanised Models and Proofs for Distance-Bounding
Ioana Boureanu
,
Constantin Catalin Dragan
,
François Dupressoir
,
David Gérault
,
Pascal Lafourcade 0001
.
csfw 2021
:
1-16
[doi]
Concise UC Zero-Knowledge Proofs for Oblivious Updatable Databases
Jan Camenisch
,
Maria Dubovitskaya
,
Alfredo Rial
.
csfw 2021
:
1-16
[doi]
Resource-Aware Session Types for Digital Contracts
Ankush Das
,
Stephanie Balzer
,
Jan Hoffmann 0002
,
Frank Pfenning
,
Ishani Santurkar
.
csfw 2021
:
1-16
[doi]
On the Soundness of Infrastructure Adversaries
Alexander Dax
,
Robert Künnemann
.
csfw 2021
:
1-16
[doi]
Machine-Checking Unforgeability Proofs for Signature Schemes with Tight Reductions to the Computational Diffie-Hellman Problem
François Dupressoir
,
Sara Zain
.
csfw 2021
:
1-15
[doi]
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
Denis Firsov
,
Henri Lakk
,
Ahto Truu
.
csfw 2021
:
1-13
[doi]
Vertical Composition and Sound Payload Abstraction for Stateful Protocols
Sébastien Gondron
,
Sebastian Mödersheim
.
csfw 2021
:
1-16
[doi]
Performing Security Proofs of Stateful Protocols
Andreas Viktor Hess
,
Sebastian Mödersheim
,
Achim D. Brucker
,
Anders Schlichtkrull
.
csfw 2021
:
1-16
[doi]
A Quantale of Information
Sebastian Hunt
,
David Sands 0001
.
csfw 2021
:
1-15
[doi]
Verifying Hyperproperties With TLA
Leslie Lamport
,
Fred B. Schneider
.
csfw 2021
:
1-16
[doi]
Formal Impact Metrics for Cyber-physical Attacks
Ruggero Lanotte
,
Massimo Merro
,
Andrei Munteanu
,
Simone Tini
.
csfw 2021
:
1-16
[doi]
Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags
Daiki Miyahara
,
Yuichi Komano
,
Takaaki Mizuki
,
Hideaki Sone
.
csfw 2021
:
1-16
[doi]
Verifying Accountability for Unbounded Sets of Participants
Kevin Morio
,
Robert Künnemann
.
csfw 2021
:
1-16
[doi]
Language Support for Secure Software Development with Enclaves
Aditya Oak
,
Amir M. Ahmadian
,
Musard Balliu
,
Guido Salvaneschi
.
csfw 2021
:
1-16
[doi]
A Coq proof of the correctness of X25519 in TweetNaCl
Peter Schwabe
,
Benoît Viguier
,
Timmy Weerwag
,
Freek Wiedijk
.
csfw 2021
:
1-16
[doi]
Formal security analysis of MPC-in-the-head zero-knowledge protocols
Nikolaj Sidorenco
,
Sabine Oechsner
,
Bas Spitters
.
csfw 2021
:
1-14
[doi]
Heuristic Approach for Countermeasure Selection Using Attack Graphs
Orly Stan
,
Ron Bitton
,
Michal Ezrets
,
Moran Dadon
,
Masaki Inokuchi
,
Yoshinobu Ohta
,
Tomohiko Yagyu
,
Yuval Elovici
,
Asaf Shabtai
.
csfw 2021
:
1-16
[doi]
Backwards-directed information flow analysis for concurrent programs
Kirsten Winter
,
Nicholas Coughlin
,
Graeme Smith
.
csfw 2021
:
1-16
[doi]
Sign in
or
sign up
to see more results.