


default search action
30th CSF 2017: Santa Barbara, CA, USA
- 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3217-8

Invited Talk I
- Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov

, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. 1-6
Session 1: Security Economics
- Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley

:
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games. 7-21
Session 2: Information-flow Control
- Stefano Calzavara

, Ilya Grishchenko
, Adrien Koutsos
, Matteo Maffei:
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. 22-36 - Marco Vassena, Joachim Breitner, Alejandro Russo

:
Securing Concurrent Lazy Programs Against Information Leakage. 37-52 - Peixuan Li, Danfeng Zhang

:
Towards a Flow- and Path-Sensitive Information Flow Analysis. 53-67
Session 3: Computer-Aided Cryptography
- Bruno Blanchet

:
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols. 68-82 - Alley Stoughton

, Mayank Varia:
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model. 83-99 - Hubert Comon, Adrien Koutsos

:
Formal Computational Unlinkability Proofs of RFID Protocols. 100-114
Invited Talk II
- Rafael Pass

, Elaine Shi:
Rethinking Large-Scale Consensus. 115-129
Session 4A: Authentication and Key Management I
- Stéphanie Delaune, Steve Kremer

, Ludovic Robin:
Formal Verification of Protocols Based on Short Authenticated Strings. 130-143 - Vincent Cheval

, Véronique Cortier, Bogdan Warinschi:
Secure Composition of PKIs with Public Key Protocols. 144-158 - Alexandra Boldyreva, Shan Chen

, Pierre-Alain Dupont
, David Pointcheval
:
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange. 159-175
Session 4B: Authentication and Key Management II
- Riccardo Focardi

, Marco Squarcina:
Run-Time Attack Detection in Cryptographic APIs. 176-188 - Daniel Fett, Ralf Küsters, Guido Schmitz

:
The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines. 189-202
Session 6: Security Protocols
- Kevin Milner, Cas Cremers, Jiangshan Yu

, Mark Ryan
:
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications. 203-216 - Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin:

UC-Secure Non-interactive Public-Key Encryption. 217-233 - David Baelde

, Stéphanie Delaune, Ivan Gazeau, Steve Kremer
:
Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR. 234-248
Session 7: Privacy
- Li Zhou

, Mingsheng Ying
:
Differential Privacy in Quantum Computation. 249-262 - Ilya Mironov

:
Rényi Differential Privacy. 263-275 - Per A. Hallgren, Claudio Orlandi

, Andrei Sabelfeld:
PrivatePool: Privacy-Preserving Ridesharing. 276-291 - Michael Backes, Manuel Gomez-Rodriguez

, Praveen Manoharan
, Bartlomiej Surma:
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks. 292-304
Session 8: Quantitative Information-Flow Analysis
- M. H. R. Khouzani, Pasquale Malacaria:

Leakage-Minimal Design: Universality, Limitations, and Applications. 305-317 - David M. Smith, Geoffrey Smith:

Tight Bounds on Information Leakage from Repeated Independent Runs. 318-327 - Quoc-Sang Phan

, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan:
Synthesis of Adaptive Side-Channel Attacks. 328-342 - Marco Guarnieri

, Srdjan Marinovic, David A. Basin:
Securing Databases from Probabilistic Inference. 343-359
Session 9: Distributed Systems
- Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia:

A Universally Composable Treatment of Network Time. 360-375 - Ivan Gazeau, Tom Chothia, Dominic Duggan:

Types for Location and Data Security in Cloud Environments. 376-391
Session 10A: Security and Compilation
- Marco Patrignani

, Deepak Garg:
Secure Compilation and Hyperproperty Preservation. 392-404 - Gilles Barthe

, Sandrine Blazy
, Vincent Laporte, David Pichardie, Alix Trieu
:
Verified Translation Validation of Static Analyses. 405-419
Session 10B: Embedded and Cyber-physical Security
- Hyoukjun Kwon

, William Harris, Hadi Esmaeilzadeh
:
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants. 420-435 - Ruggero Lanotte

, Massimo Merro, Riccardo Muradore
, Luca Viganò
:
A Formal Approach to Cyber-Physical Attacks. 436-450
Session 11: Security Protocols II
- Andreas Viktor Hess, Sebastian Mödersheim

:
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL. 451-463 - Emanuele D'Osualdo

, Luke Ong, Alwen Tiu:
Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-Bounded Processes. 464-480 - Véronique Cortier, Antoine Dallon, Stéphanie Delaune:

SAT-Equiv: An Efficient Tool for Equivalence Properties. 481-494

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














