IEEE Computer Security Foundations Symposium, CSF 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR

David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer

Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications

Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Securing Concurrent Lazy Programs Against Information Leakage

Marco Vassena, Joachim Breitner, Alejandro Russo

Securing Concurrent Lazy Programs Against Information Leakage

Details
Discussion Comments: 0
Verification: Authors have not verified information

UC-Secure Non-interactive Public-Key Encryption

Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin

UC-Secure Non-interactive Public-Key Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure Compilation and Hyperproperty Preservation

Marco Patrignani, Deepak Garg

Secure Compilation and Hyperproperty Preservation

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Universally Composable Treatment of Network Time

Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia

A Universally Composable Treatment of Network Time

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards a Flow- and Path-Sensitive Information Flow Analysis

Peixuan Li, Danfeng Zhang

Towards a Flow- and Path-Sensitive Information Flow Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Verified Translation Validation of Static Analyses

Gilles Barthe, Sandrine Blazy, Vincent Laporte, David Pichardie, Alix Trieu

Verified Translation Validation of Static Analyses

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reconciling Privacy and Utility in Continuous-Time Diffusion Networks

Michael Backes, Manuel Gomez-Rodriguez, Praveen Manoharan, Bartlomiej Surma

Reconciling Privacy and Utility in Continuous-Time Diffusion Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Leakage-Minimal Design: Universality, Limitations, and Applications

M. H. R. Khouzani, Pasquale Malacaria

Leakage-Minimal Design: Universality, Limitations, and Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Formal Computational Unlinkability Proofs of RFID Protocols

Hubert Comon, Adrien Koutsos

Formal Computational Unlinkability Proofs of RFID Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines

Daniel Fett, Ralf Küsters, Guido Schmitz

The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines

Details
Discussion Comments: 0
Verification: Authors have not verified information

Formal Verification of Protocols Based on Short Authenticated Strings

Stéphanie Delaune, Steve Kremer, Ludovic Robin

Formal Verification of Protocols Based on Short Authenticated Strings

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tight Bounds on Information Leakage from Repeated Independent Runs

David M. Smith, Geoffrey Smith

Tight Bounds on Information Leakage from Repeated Independent Runs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rethinking Large-Scale Consensus

Rafael Pass, Elaine Shi

Rethinking Large-Scale Consensus

Details
Discussion Comments: 0
Verification: Authors have not verified information

Run-Time Attack Detection in Cryptographic APIs

Riccardo Focardi, Marco Squarcina

Run-Time Attack Detection in Cryptographic APIs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Types for Location and Data Security in Cloud Environments

Ivan Gazeau, Tom Chothia, Dominic Duggan

Types for Location and Data Security in Cloud Environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Human Computing for Handling Strong Corruptions in Authenticated Key Exchange

Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval

Human Computing for Handling Strong Corruptions in Authenticated Key Exchange

Details
Discussion Comments: 0
Verification: Authors have not verified information

How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games

Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley

How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure Composition of PKIs with Public Key Protocols

Vincent Cheval, Véronique Cortier, Bogdan Warinschi

Secure Composition of PKIs with Public Key Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Formal Approach to Cyber-Physical Attacks

Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò

A Formal Approach to Cyber-Physical Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Differential Privacy in Quantum Computation

Li Zhou, Mingsheng Ying

Differential Privacy in Quantum Computation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model

Alley Stoughton, Mayank Varia

Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL

Andreas Viktor Hess, Sebastian Mödersheim

Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL

Details
Discussion Comments: 0
Verification: Authors have not verified information

SAT-Equiv: An Efficient Tool for Equivalence Properties

Véronique Cortier, Antoine Dallon, Stéphanie Delaune

SAT-Equiv: An Efficient Tool for Equivalence Properties

Details
Discussion Comments: 0
Verification: Authors have not verified information

PrivatePool: Privacy-Preserving Ridesharing

Per A. Hallgren, Claudio Orlandi, Andrei Sabelfeld

PrivatePool: Privacy-Preserving Ridesharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols

Bruno Blanchet

Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols

Details
Discussion Comments: 0
Verification: Author has not verified information

Synthesis of Adaptive Side-Channel Attacks

Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan

Synthesis of Adaptive Side-Channel Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications

Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei

A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants

Hyoukjun Kwon, William Harris, Hadi Esmaeilzadeh

Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Protection of Private Information in Machine Learning Systems: Two Recent Approches

Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang

On the Protection of Private Information in Machine Learning Systems: Two Recent Approches

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes

Emanuele D'Osualdo, Luke Ong, Alwen Tiu

Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Securing Databases from Probabilistic Inference

Marco Guarnieri, Srdjan Marinovic, David A. Basin

Securing Databases from Probabilistic Inference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rényi Differential Privacy

Ilya Mironov

Rényi Differential Privacy

Details
Discussion Comments: 0
Verification: Author has not verified information