Abstract is missing.
- Optimising Faceted Secure Multi-ExecutionMaximilian Algehed, Alejandro Russo, Cormac Flanagan. 1-16 [doi]
- Canonical Representations of k-Safety HyperpropertiesBernd Finkbeiner, Lennart Haas, Hazem Torfah. 17-31 [doi]
- Timing Leaks and Coarse-Grained ClocksPanagiotis Vasilikos, Hanne Riis Nielson, Flemming Nielson, Boris Köpf. 32-47 [doi]
- Decidability of a Sound Set of Inference Rules for Computational IndistinguishabilityAdrien Koutsos. 48-61 [doi]
- How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes 0001. 62-77 [doi]
- Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-HellmanCas Cremers, Dennis Jackson. 78-93 [doi]
- Re-Thinking Untraceability in the CryptoNote-Style BlockchainJiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo. 94-107 [doi]
- Time-Dependent Decision-Making and Decentralization in Proof-of-Work CryptocurrenciesYevhen Zolotavkin, Julián García, Joseph Liu. 108-121 [doi]
- Analysis of Deterministic Longest-Chain ProtocolsElaine Shi. 122-135 [doi]
- Symbolic Methods in Computational Cryptography ProofsGilles Barthe, Benjamin Grégoire, Charlie Jacomme, Steve Kremer, Pierre-Yves Strub. 136-151 [doi]
- Formalizing Constructive Cryptography using CryptHOLAndreas Lochbihler, S. Reza Sefidgar, David A. Basin, Ueli Maurer. 152-166 [doi]
- EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable SecurityRan Canetti, Alley Stoughton, Mayank Varia. 167-183 [doi]
- On the Meaning and Purpose of Attack TreesHeiko Mantel, Christian W. Probst. 184-199 [doi]
- Efficient Attack-Defense Tree Analysis using Pareto Attribute DomainsBarbara Fila, Wojciech Widel. 200-215 [doi]
- Games for Security Under Adaptive AdversariesTimos Antonopoulos, Tachio Terauchi. 216-229 [doi]
- Information-Flow Preservation in Compiler OptimisationsFrédéric Besson, Alexandre Dang, Thomas P. Jensen. 230-242 [doi]
- Temporal Safety for Stack Allocated Memory on Capability MachinesStelios Tsampas, Dominique Devriese, Frank Piessens. 243-255 [doi]
- Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure CompilationCarmine Abate, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani, Jérémy Thibault. 256-271 [doi]
- Using Information Flow to Design an ISA that Controls Timing ChannelsDrew Zagieboylo, G. Edward Suh, Andrew C. Myers. 272-287 [doi]
- A Formal Approach to Secure SpeculationKevin Cheang, Cameron Rasmussen, Sanjit A. Seshia, Pramod Subramanyan. 288-303 [doi]
- Information Flow Control for Distributed Trusted Execution EnvironmentsAnitha Gollamudi, Stephen Chong, Owen Arden. 304-318 [doi]
- Securing Cross-App Interactions in IoT PlatformsMusard Balliu, Massimo Merro, Michele Pasqua. 319-334 [doi]
- Static Enforcement of Security in Runtime SystemsMathias Vorreiter Pedersen, Aslan Askarov. 335-350 [doi]
- Beyond Labels: Permissiveness for Dynamic Information Flow EnforcementElisavet Kozyri, Fred B. Schneider, Andrew Bedford, Josée Desharnais, Nadia Tawbi. 351-366 [doi]
- BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting DeviceVéronique Cortier, Alicia Filipiak, Joseph Lallemand. 367-381 [doi]
- Resource-Bounded Intruders in Denial of Service AttacksAbraão Aires Urquiza, Musab A. AlTurki, Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott. 382-396 [doi]
- Automated Verification of Accountability in Security ProtocolsRobert Künnemann, Ilkan Esiyok, Michael Backes 0001. 397-413 [doi]
- Quantifying Information Flow in Interactive SystemsDavid Mestel. 414-427 [doi]
- Deterministic Channel Design for Minimum LeakageArthur Américo, M. H. R. Khouzani, Pasquale Malacaria. 428-441 [doi]
- Comparing Systems: Max-Case Refinement Orders and Application to Differential PrivacyKonstantinos Chatzikokolakis 0001, Natasha Fernandes, Catuscia Palamidessi. 442-457 [doi]