default search action
33rd CSF 2020: Boston, MA, USA
- 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020. IEEE 2020, ISBN 978-1-7281-6572-1
E-Voting
- David A. Basin, Sasa Radomirovic, Lara Schmid:
Dispute Resolution in Voting. 1-16 - Véronique Cortier, Joseph Lallemand, Bogdan Warinschi:
Fifty Shades of Ballot Privacy: Privacy against a Malicious Board. 17-32 - Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Universal Unconditional Verifiability in E-Voting without Trusted Parties. 33-48 - Thomas Haines, Johannes Müller:
SoK: Techniques for Verifiable Mix Nets. 49-64
Information Flow (I)
- Maximilian Algehed, Cormac Flanagan:
Transparent IFC Enforcement: Possibility and (In)Efficiency Results. 65-78 - Daniel Schoepe, Toby Murray, Andrei Sabelfeld:
VERONICA: Expressive and Precise Concurrent Information Flow Security. 79-94 - Johan Bay, Aslan Askarov:
Reconciling progress-insensitive noninterference and declassification. 95-106
Language-Based Security
- Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei, Mauro Tempesta:
Language-Based Web Session Integrity. 107-122 - Andrew K. Hirsch, Pedro H. Azevedo de Amorim, Ethan Cecchetti, Ross Tate, Owen Arden:
First-Order Logic for Flow-Limited Authorization. 123-138 - Christian Skalka, David Darais, Trent Jaeger, Frank Capobianco:
Types and Abstract Interpretation for Authorization Hook Advice. 139-152
Privacy
- Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Optimal Obfuscation Mechanisms via Machine Learning. 153-168 - David Baelde, Stéphanie Delaune, Solène Moreau:
A Method for Proving Unlinkability of Stateful Protocols. 169-183
Information Flow (II)
- Kristopher K. Micinski, David Darais, Thomas Gilray:
Abstracting Faceted Execution. 184-198 - Yi Lu, Chenyi Zhang:
Nontransitive Security Types for Coarse-grained Information Flow Control. 199-213 - Carlos Tomé Cortiñas, Marco Vassena, Alejandro Russo:
Securing Asynchronous Exceptions. 214-229
Secure Systems
- Andreas Fischer, Jonas Janneck, Jörn Kussmaul, Nikolas Krätzschmar, Florian Kerschbaum, Eric Bodden:
PASAPTO: Policy-aware Security and Performance Trade-off Analysis-Computation on Encrypted Data with Restricted Leakage. 230-245 - Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
Runtime Enforcement for Control System Security. 246-261 - Matteo Busi, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg, Frank Piessens:
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors. 262-276
Applied Cryptography and Protocol Analysis
- Liliya R. Akhmetzyanova, Cas Cremers, Luke Garratt, Stanislav Smyshlyaev, Nick Sullivan:
Limiting the impact of unreliable randomness in deployed security protocols. 277-287 - Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi:
Authentication in Key-Exchange: Definitions, Relations and Composition. 288-303 - Riccardo Focardi, Flaminia L. Luccio:
Automated Analysis of PUF-based Protocols. 304-317
Blockchain
- Foteini Baldimtsi, Varun Madathil, Alessandra Scafuro, Linfeng Zhou:
Anonymous Lottery In The Proof-of-Stake Setting. 318-333 - Aggelos Kiayias, Orfeas Stefanos Thyfronitis Litos:
A Composable Security Treatment of the Lightning Network. 334-349
Information Flow (III)
- Iulia Bastys, Musard Balliu, Tamara Rezk, Andrei Sabelfeld:
Clockwork: Tracking Remote Timing Attacks. 350-365 - Borzoo Bonakdarpour, Bernd Finkbeiner:
Controller Synthesis for Hyperproperties. 366-379 - Nicholas Coughlin, Graeme Smith:
Rely/Guarantee Reasoning for Noninterference in Non-Blocking Algorithms. 380-394
Attack Modeling
- Barbara Fila, Wojciech Widel:
Exploiting attack-defense trees to find an optimal set of countermeasures. 395-410 - Tim Muller, Dongxia Wang, Jun Sun:
Provably Robust Decisions based on Potentially Malicious Sources of Information. 411-424
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.