default search action
29th CSF 2016: Lisbon, Portugal
- IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-2607-4
Invited Talks and Invited Papers
- Andrew W. Appel:
Modular Verification for Computer Security. 1-8 - Úlfar Erlingsson:
Data-Driven Software Security: Models and Methods. 9-15 - Ross J. Anderson:
Are the Real Limits to Scale a Matter of Science, or Engineering, or of Something Else? (Abstract only). 16
Software Security
- Marco Patrignani, Dominique Devriese, Frank Piessens:
On Modular and Fully-Abstract Compilation. 17-30 - Sergiu Costea, Bogdan Warinschi:
Secure Software Licensing: Models, Constructions, and Proofs. 31-44 - Yannis Juglaret, Catalin Hritcu, Arthur Azevedo de Amorim, Boris Eng, Benjamin C. Pierce:
Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. 45-60
Quantitative Security
- M. H. R. Khouzani, Pasquale Malacaria:
Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design. 61-76 - Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith:
Axioms for Information Leakage. 77-92 - Nicolás E. Bordenabe, Geoffrey Smith:
Correlated Secrets in Quantitative Information Flow. 93-104 - Zaruhi Aslanyan, Flemming Nielson, David Parker:
Quantitative Verification and Synthesis of Attack-Defence Scenarios. 105-119
Access Control I
- David A. Basin, Søren Debois, Thomas T. Hildebrandt:
In the Nick of Time: Proactive Prevention of Obligation Violations. 120-134 - Owen Arden, Andrew C. Myers:
A Calculus for Flow-Limited Authorization. 135-149 - Vineet Rajani, Deepak Garg, Tamara Rezk:
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks. 150-163
Protocols and Distributed Systems I
- Katriel Cohn-Gordon, Cas Cremers, Luke Garratt:
On Post-compromise Security. 164-178 - Stefano Calzavara, Riccardo Focardi, Niklas Grimm, Matteo Maffei:
Micro-policies for Web Session Security. 179-193 - Pedro Adão, Riccardo Focardi, Joshua D. Guttman, Flaminia L. Luccio:
Localizing Firewall Security Policies. 194-209
Information Flow I
- Mounir Assaf, David A. Naumann:
Calculational Design of Information Flow Monitors. 210-224 - Frédéric Besson, Nataliia Bielova, Thomas P. Jensen:
Hybrid Monitoring of Attacker Knowledge. 225-238 - Shreya Agrawal, Borzoo Bonakdarpour:
Runtime Verification of k-Safety Hyperproperties in HyperLTL. 239-252 - Simon Greiner, Daniel Grahl:
Non-interference with What-Declassification in Component-Based Systems. 253-267
Computer-Aided Cryptography
- Cédric Fournet, Chantal Keller, Vincent Laporte:
A Certified Compiler for Verifiable Computing. 268-280 - Guillaume Scerri, Ryan Stanley-Oakes:
Analysis of Key Wrapping APIs: Generic Policies, Computational Security. 281-295 - Jean Karim Zinzindohoue, Evmorfia-Iro Bartzia, Karthikeyan Bhargavan:
A Verified Extensible Library of Elliptic Curves. 296-309
Protocols and Distributed Systems Il
- Bruno Blanchet, Ben Smyth:
Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers. 310-324 - David A. Basin, Sasa Radomirovic, Lara Schmid:
Modeling Human Errors in Security Protocols. 325-340 - Ralf Küsters, Johannes Müller, Enrico Scapin, Tomasz Truderung:
sElect: A Lightweight Verifiable Remote Voting System. 341-354
Privacy and Economics
- Xi Wu, Matthew Fredrikson, Somesh Jha, Jeffrey F. Naughton:
A Methodology for Formalizing Model-Inversion Attacks. 355-370 - Jeremiah Blocki, Anupam Datta:
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. 371-386
Information Flow II
- Corina S. Pasareanu, Quoc-Sang Phan, Pasquale Malacaria:
Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT. 387-400 - Filippo Del Tedesco, David Sands, Alejandro Russo:
Fault-Resilient Non-interference. 401-416 - Toby C. Murray, Robert Sison, Edward Pierzchalski, Christine Rizkallah:
Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. 417-431
Access Control II
- Marcos Cramer, Pieter Van Hertum, Ruben Lapauw, Ingmar Dasseville, Marc Denecker:
Resilient Delegation Revocation with Precedence for Predecessors Is NP-Complete. 432-442 - Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Access Control Synthesis for Physical Spaces. 443-457 - Stefano Calzavara, Alvise Rabitti, Enrico Steffinlongo, Michele Bugliesi:
Static Detection of Collusion Attacks in ARBAC-Based Workflow Systems. 458-470
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.