Loading…
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
Boeira, Felipe, Asplund, Mikael
Published in 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022) (01.08.2022)
Published in 2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022) (01.08.2022)
Get full text
Conference Proceeding
Loading…
DPL: A Language for GDPR Enforcement
Karami, Farzane, Basin, David, Johnsen, Einar Broch
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Prophecy Variables for Hyperproperty Verification
Beutner, Raven, Finkbeiner, Bernd
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Universal Optimality and Robust Utility Bounds for Metric Differential Privacy
Fernandes, Natasha, McIver, Annabelle, Palamidessi, Catuscia, Ding, Ming
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant
Baelde, David, Delaune, Stephanie, Koutsos, Adrien, Moreau, Solene
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Loading…
Proving full-system security properties under multiple attacker models on capability machines
Van Strydonck, Thomas, Georges, Aina Linn, Gueneau, Armael, Trieu, Alix, Timany, Amin, Piessens, Frank, Birkedal, Lars, Devriese, Dominique
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments
Horne, Ross, Mauw, Sjouke, Yurkov, Semen
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
The Complexity of Verifying Boolean Programs as Differentially Private
Bun, Mark, Gaboardi, Marco, Glinskih, Ludmila
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis
Mestel, David, Muller, Johannes, Reisert, Pascal
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co
Dragan, Constantin Catalin, Dupressoir, Francois, Estaji, Ehsan, Gjosteen, Kristian, Haines, Thomas, Ryan, Peter Y.A., Ronne, Peter B., Solberg, Morten Rotvold
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Privacy as Reachability
Gondron, Sebastien, Modersheim, Sebastian, Vigano, Luca
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Mapping Synthesis for Hyperproperties
Hsu, Tzu-Han, Bonakdarpour, Borzoo, Kang, Eunsuk, Tripakis, Stavros
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Is Eve nearby? Analysing protocols under the distant-attacker assumption
Gil-Pons, Reynaldo, Horne, Ross, Mauw, Sjouke, Tiu, Alwen, Trujillo-Rasua, Rolando
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Collusion-Preserving Computation without a Mediator
Ciampi, Michele, Lu, Yun, Zikas, Vassilis
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
A Formal Model of Checked C
Li, Liyi, Liu, Yiyun, Postol, Deena, Lampropoulos, Leonidas, Van Horn, David, Hicks, Michael
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Applying consensus and replication securely with FLAQR
Mondal, Priyanka, Algehed, Maximilian, Arden, Owen
Published in Proceedings (IEEE Computer Security Foundations Symposium) (01.08.2022)
Published in Proceedings (IEEE Computer Security Foundations Symposium) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Contingent payments from two-party signing and verification for abelian groups
Bursuc, Sergiu, Mauw, Sjouke
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
Bringing State-Separating Proofs to EasyCrypt A Security Proof for Cryptobox
Dupressoir, Francois, Kohbrok, Konrad, Oechsner, Sabine
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding
Loading…
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation
El-Korashy, Akram, Blanco, Roberto, Thibault, Jeremy, Durier, Adrien, Garg, Deepak, Hritcu, Catalin
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Published in 2022 IEEE 35th Computer Security Foundations Symposium (CSF) (01.08.2022)
Get full text
Conference Proceeding