Abstract is missing.
- Formal Verification of Differential PrivacyMarco Gaboardi. 1 [doi]
- Sensitivity Analysis of SQL QueriesPeeter Laud, Martin Pettai, Jaak Randmets. 2-12 [doi]
- Geometric Noise for Locally Private Counting QueriesLefki Kacem, Catuscia Palamidessi. 13-16 [doi]
- Prudent Design Principles for Information Flow ControlIulia Bastys, Frank Piessens, Andrei Sabelfeld. 17-23 [doi]
- A Perspective on the Dependency Core CalculusMaximilian Algehed. 24-28 [doi]
- Securing Compilation Against Memory ProbingFrédéric Besson, Alexandre Dang, Thomas Jensen. 29-40 [doi]
- Network Verification: Successes, Challenges, and OpportunitiesNate Foster. 41 [doi]
- Binary Similarity Detection Using Machine LearningNoam Shalev, Nimrod Partush. 42-47 [doi]
- Context-Sensitive Flow Graph and Projective Single Assignment Form for Resolving Context-Dependency of Binary CodeTomonori Izumida, Akira Mori, Masatomo Hashimoto. 48-53 [doi]