Abstract is missing.
- Timing-Sensitive Noninterference through CompositionWillard Rafnsson, Limin Jia, Lujo Bauer. 3-25 [doi]
- Quantifying Vulnerability of Secret Generation Using Hyper-DistributionsMário S. Alvim, Piotr Mardziel, Michael W. Hicks. 26-48 [doi]
- A Principled Approach to Tracking Information Flow in the Presence of LibrariesDaniel Hedin, Alexander Sjösten, Frank Piessens, Andrei Sabelfeld. 49-70 [doi]
- Secure Multi-party Computation: Information Flow of Outputs and Game TheoryPatrick Ah-Fat, Michael Huth. 71-92 [doi]
- Automated Verification of Dynamic Root of Trust ProtocolsSergiu Bursuc, Christian Johansen, Shiwei Xu. 95-116 [doi]
- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful ProtocolsJannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse. 117-140 [doi]
- On Communication Models When Verifying Equivalence PropertiesKushal Babel, Vincent Cheval, Steve Kremer. 141-163 [doi]
- A Survey of Attacks on Ethereum Smart Contracts (SoK)Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli. 164-186 [doi]
- Security Analysis of Cache Replacement PoliciesPablo Cañones, Boris Köpf, Jan Reineke. 189-209 [doi]
- Model Checking Exact Cost for Attack ScenariosZaruhi Aslanyan, Flemming Nielson. 210-231 [doi]
- Postulates for Revocation SchemesMarcos Cramer, Giovanni Casini. 232-252 [doi]
- Defense in Depth Formulation and Usage in Dynamic Access ControlRidha Khédri, Owain Jones, Mohammed Alabbad. 253-274 [doi]
- Compositional Synthesis of Leakage Resilient ProgramsArthur Blot, Masaki Yamamoto, Tachio Terauchi. 277-297 [doi]
- Combining Differential Privacy and Mutual Information for Analyzing Leakages in WorkflowsMartin Pettai, Peeter Laud. 298-319 [doi]