Abstract is missing.
- An Extensive Formal Analysis of Multi-factor Authentication ProtocolsCharlie Jacomme, Steve Kremer. 1-15 [doi]
- Composition Theorems for CryptoVerif and Application to TLS 1.3Bruno Blanchet. 16-30 [doi]
- A Cryptographic Look at Multi-party ChannelsPatrick Eugster, Giorgia Azzurra Marson, Bertram Poettering. 31-45 [doi]
- Invited Paper: Secure Boot and Remote Attestation in the Sanctum ProcessorIlia A. Lebedev, Kyle Hogan, Srinivas Devadas. 46-60 [doi]
- Guided Design of Attack Trees: A System-Based ApproachMaxime Audinot, Sophie Pinchinat, Barbara Kordy. 61-75 [doi]
- Self-Guarding Cryptographic Protocols against Algorithm Substitution AttacksMarc Fischlin, Sogol Mazaheri. 76-90 [doi]
- Formal Security Proof of CMAC and Its VariantsCecile Baritel-Ruet, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire. 91-104 [doi]
- Backdoored Hash Functions: Immunizing HMAC and HKDFMarc Fischlin, Christian Janson, Sogol Mazaheri. 105-118 [doi]
- Computer-Aided Proofs for Multiparty Computation with Active SecurityHelene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub. 119-131 [doi]
- Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC FrameworksJosé Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco 0001, Vitor Pereira, Bernardo Portela. 132-146 [doi]
- Symbolic Security of Garbled CircuitsBaiyu Li, Daniele Micciancio. 147-161 [doi]
- The Complexity of Monitoring HyperpropertiesBorzoo Bonakdarpour, Bernd Finkbeiner. 162-174 [doi]
- Knowledge-Based Security of Dynamic Secrets for Reactive ProgramsMcKenna McCall, Hengrun Zhang, Limin Jia. 175-188 [doi]
- Assuming You Know: Epistemic Semantics of Relational Annotations for Expressive Flow PoliciesAndrey Chudnov, David A. Naumann. 189-203 [doi]
- KEVM: A Complete Formal Semantics of the Ethereum Virtual MachineEverett Hildenbrandt, Manasvi Saxena, Nishant Rodrigues, Xiaoran Zhu, Philip Daian, Dwight Guth, Brandon M. Moore, Daejun Park 0001, Yi Zhang, Andrei Stefanescu, Grigore Rosu. 204-217 [doi]
- A Permission-Dependent Type System for Secure Information Flow AnalysisHongxu Chen, Alwen Tiu, Zhiwu Xu, Yang Liu. 218-232 [doi]
- Types for Information Flow Control: Labeling Granularity and Semantic ModelsVineet Rajani, Deepak Garg 0001. 233-246 [doi]
- Inductive Invariants for Noninterference in Multi-agent WorkflowsChristian Müller 0008, Helmut Seidl, Eugen Zalinescu. 247-261 [doi]
- Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with UtilityMário S. Alvim, Konstantinos Chatzikokolakis 0001, Catuscia Palamidessi, Anna Pazii. 262-267 [doi]
- Privacy Risk in Machine Learning: Analyzing the Connection to OverfittingSamuel Yeom, Irene Giacomelli, Matt Fredrikson, Somesh Jha. 268-282 [doi]
- Alethea: A Provably Secure Random Sample Voting ProtocolDavid A. Basin, Sasa Radomirovic, Lara Schmid. 283-297 [doi]
- Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for BeleniosVéronique Cortier, Constantin Catalin Dragan, François Dupressoir, Bogdan Warinschi. 298-312 [doi]
- Symbolic Side-Channel Analysis for Probabilistic ProgramsPasquale Malacaria, M. H. R. Khouzani, Corina S. Pasareanu, Quoc-Sang Phan, Kasper Søe Luckow. 313-327 [doi]
- Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic "Constant-Time"Gilles Barthe, Benjamin Grégoire, Vincent Laporte. 328-343 [doi]
- A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerifVincent Cheval, Véronique Cortier, Mathieu Turuani. 344-358 [doi]
- Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive ORJannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse. 359-373 [doi]
- A Typing Result for Stateful ProtocolsAndreas Hess, Sebastian Mödersheim. 374-388 [doi]