Abstract is missing.
- Modular Verification for Computer SecurityAndrew W. Appel. 1-8 [doi]
- Data-Driven Software Security: Models and MethodsÚlfar Erlingsson. 9-15 [doi]
- Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only)Ross Anderson. 16 [doi]
- On Modular and Fully-Abstract CompilationMarco Patrignani, Dominique Devriese, Frank Piessens. 17-30 [doi]
- Secure Software Licensing: Models, Constructions, and ProofsSergiu Costea, Bogdan Warinschi. 31-44 [doi]
- Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing CompilationYannis Juglaret, Catalin Hritcu, Arthur Azevedo de Amorim, Boris Eng, Benjamin C. Pierce. 45-60 [doi]
- Relative Perfect Secrecy: Universally Optimal Strategies and Channel DesignM. H. R. Khouzani, Pasquale Malacaria. 61-76 [doi]
- Axioms for Information LeakageMário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith. 77-92 [doi]
- Correlated Secrets in Quantitative Information FlowNicolás E. Bordenabe, Geoffrey Smith. 93-104 [doi]
- Quantitative Verification and Synthesis of Attack-Defence ScenariosZaruhi Aslanyan, Flemming Nielson, David Parker. 105-119 [doi]
- In the Nick of Time: Proactive Prevention of Obligation ViolationsDavid A. Basin, Søren Debois, Thomas T. Hildebrandt. 120-134 [doi]
- A Calculus for Flow-Limited AuthorizationOwen Arden, Andrew C. Myers. 135-149 [doi]
- On Access Control, Capabilities, Their Equivalence, and Confused Deputy AttacksVineet Rajani, Deepak Garg 0001, Tamara Rezk. 150-163 [doi]
- On Post-compromise SecurityKatriel Cohn-Gordon, Cas J. F. Cremers, Luke Garratt. 164-178 [doi]
- Micro-policies for Web Session SecurityStefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei. 179-193 [doi]
- Localizing Firewall Security PoliciesPedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio. 194-209 [doi]
- Calculational Design of Information Flow MonitorsMounir Assaf, David A. Naumann. 210-224 [doi]
- Hybrid Monitoring of Attacker KnowledgeFrédéric Besson, Nataliia Bielova, Thomas P. Jensen. 225-238 [doi]
- Runtime Verification of k-Safety Hyperproperties in HyperLTLShreya Agrawal, Borzoo Bonakdarpour. 239-252 [doi]
- Non-interference with What-Declassification in Component-Based SystemsSimon Greiner, Daniel Grahl. 253-267 [doi]
- A Certified Compiler for Verifiable ComputingCédric Fournet, Chantal Keller, Vincent Laporte. 268-280 [doi]
- Analysis of Key Wrapping APIs: Generic Policies, Computational SecurityGuillaume Scerri, Ryan Stanley-Oakes. 281-295 [doi]
- A Verified Extensible Library of Elliptic CurvesJean Karim Zinzindohoue, Evmorfia-Iro Bartzia, Karthikeyan Bhargavan. 296-309 [doi]
- Automated Reasoning for Equivalences in the Applied Pi Calculus with BarriersBruno Blanchet, Ben Smyth. 310-324 [doi]
- Modeling Human Errors in Security ProtocolsDavid A. Basin, Sasa Radomirovic, Lara Schmid. 325-340 [doi]
- sElect: A Lightweight Verifiable Remote Voting SystemRalf Küsters, Johannes Mueller, Enrico Scapin, Tomasz Truderung. 341-354 [doi]
- A Methodology for Formalizing Model-Inversion AttacksXi Wu 0001, Matthew Fredrikson, Somesh Jha, Jeffrey F. Naughton. 355-370 [doi]
- CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password ProtectionJeremiah Blocki, Anupam Datta. 371-386 [doi]
- Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMTCorina S. Pasareanu, Quoc-Sang Phan, Pasquale Malacaria. 387-400 [doi]
- Fault-Resilient Non-interferenceFilippo Del Tedesco, David Sands, Alejandro Russo. 401-416 [doi]
- Compositional Verification and Refinement of Concurrent Value-Dependent NoninterferenceToby C. Murray, Robert Sison, Edward Pierzchalski, Christine Rizkallah. 417-431 [doi]
- Resilient Delegation Revocation with Precedence for Predecessors Is NP-CompleteMarcos Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, Marc Denecker. 432-442 [doi]
- Access Control Synthesis for Physical SpacesPetar Tsankov, Mohammad Torabi Dashti, David A. Basin. 443-457 [doi]
- Static Detection of Collusion Attacks in ARBAC-Based Workflow SystemsStefano Calzavara, Alvise Rabitti, Enrico Steffinlongo, Michele Bugliesi. 458-470 [doi]