:facetid:toc:\"db/conf/csfw/csfw2018.bht\"OK:facetid:toc:db/conf/csfw/csfw2018.bhtChristian Müller 0008Helmut SeidlEugen ZalinescuInductive Invariants for Noninterference in Multi-agent Workflows.CSF247-2612018Conference and Workshop Papersclosedconf/csfw/0008SZ1810.1109/CSF.2018.00025https://doi.org/10.1109/CSF.2018.00025https://dblp.org/rec/conf/csfw/0008SZ18URL#2540271José Bacelar AlmeidaManuel BarbosaGilles BartheHugo Pacheco 0001Vitor Pereira 0002Bernardo PortelaEnforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks.CSF132-1462018Conference and Workshop Papersclosedconf/csfw/AlmeidaBB0PP1810.1109/CSF.2018.00017https://doi.org/10.1109/CSF.2018.00017https://dblp.org/rec/conf/csfw/AlmeidaBB0PP18URL#2540272Mário S. AlvimKonstantinos Chatzikokolakis 0001Catuscia PalamidessiAnna PaziiInvited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility.CSF262-2672018Conference and Workshop Papersclosedconf/csfw/Alvim0PP1810.1109/CSF.2018.00026https://doi.org/10.1109/CSF.2018.00026https://dblp.org/rec/conf/csfw/Alvim0PP18URL#2540273Maxime AudinotSophie PinchinatBarbara KordyGuided Design of Attack Trees: A System-Based Approach.CSF61-752018Conference and Workshop Papersclosedconf/csfw/AudinotPK1810.1109/CSF.2018.00012https://doi.org/10.1109/CSF.2018.00012https://dblp.org/rec/conf/csfw/AudinotPK18URL#2540274Cécile Baritel-RuetFrançois DupressoirPierre-Alain FouqueBenjamin GrégoireFormal Security Proof of CMAC and Its Variants.CSF91-1042018Conference and Workshop Papersclosedconf/csfw/Baritel-RuetDFG1810.1109/CSF.2018.00014https://doi.org/10.1109/CSF.2018.00014https://dblp.org/rec/conf/csfw/Baritel-RuetDFG18URL#2540275Gilles BartheBenjamin GrégoireVincent LaporteSecure Compilation of Side-Channel Countermeasures: The Case of Cryptographic "Constant-Time".CSF328-3432018Conference and Workshop Papersclosedconf/csfw/BartheGL1810.1109/CSF.2018.00031https://doi.org/10.1109/CSF.2018.00031https://dblp.org/rec/conf/csfw/BartheGL18URL#2540276David A. BasinSasa RadomirovicLara SchmidAlethea: A Provably Secure Random Sample Voting Protocol.CSF283-2972018Conference and Workshop Papersclosedconf/csfw/BasinRS1810.1109/CSF.2018.00028https://doi.org/10.1109/CSF.2018.00028https://dblp.org/rec/conf/csfw/BasinRS18URL#2540277Bruno BlanchetComposition Theorems for CryptoVerif and Application to TLS 1.3.CSF16-302018Conference and Workshop Papersclosedconf/csfw/Blanchet1810.1109/CSF.2018.00009https://doi.org/10.1109/CSF.2018.00009https://dblp.org/rec/conf/csfw/Blanchet18URL#2540278Borzoo BonakdarpourBernd FinkbeinerThe Complexity of Monitoring Hyperproperties.CSF162-1742018Conference and Workshop Papersclosedconf/csfw/BonakdarpourF1810.1109/CSF.2018.00019https://doi.org/10.1109/CSF.2018.00019https://dblp.org/rec/conf/csfw/BonakdarpourF18URL#2540279Hongxu Chen 0001Alwen TiuZhiwu Xu 0001Yang Liu 0003A Permission-Dependent Type System for Secure Information Flow Analysis.CSF218-2322018Conference and Workshop Papersclosedconf/csfw/ChenTXL1810.1109/CSF.2018.00023https://doi.org/10.1109/CSF.2018.00023https://dblp.org/rec/conf/csfw/ChenTXL18URL#2540280Vincent ChevalVéronique CortierMathieu TuruaniA Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif.CSF344-3582018Conference and Workshop Papersclosedconf/csfw/ChevalCT1810.1109/CSF.2018.00032https://doi.org/10.1109/CSF.2018.00032https://dblp.org/rec/conf/csfw/ChevalCT18URL#2540281Andrey ChudnovDavid A. NaumannAssuming You Know: Epistemic Semantics of Relational Annotations for Expressive Flow Policies.CSF189-2032018Conference and Workshop Papersclosedconf/csfw/ChudnovN1810.1109/CSF.2018.00021https://doi.org/10.1109/CSF.2018.00021https://dblp.org/rec/conf/csfw/ChudnovN18URL#2540282Véronique CortierConstantin Catalin DraganFrançois DupressoirBogdan WarinschiMachine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios.CSF298-3122018Conference and Workshop Papersclosedconf/csfw/CortierDDW1810.1109/CSF.2018.00029https://doi.org/10.1109/CSF.2018.00029https://dblp.org/rec/conf/csfw/CortierDDW18URL#2540283Jannik DreierLucca HirschiSasa RadomirovicRalf SasseAutomated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR.CSF359-3732018Conference and Workshop Papersclosedconf/csfw/DreierHRS1810.1109/CSF.2018.00033https://doi.org/10.1109/CSF.2018.00033https://dblp.org/rec/conf/csfw/DreierHRS18URL#2540284Patrick EugsterGiorgia Azzurra MarsonBertram PoetteringA Cryptographic Look at Multi-party Channels.CSF31-452018Conference and Workshop Papersclosedconf/csfw/EugsterMP1810.1109/CSF.2018.00010https://doi.org/10.1109/CSF.2018.00010https://dblp.org/rec/conf/csfw/EugsterMP18URL#2540285Marc FischlinChristian JansonSogol MazaheriBackdoored Hash Functions: Immunizing HMAC and HKDF.CSF105-1182018Conference and Workshop Papersclosedconf/csfw/FischlinJM1810.1109/CSF.2018.00015https://doi.org/10.1109/CSF.2018.00015https://dblp.org/rec/conf/csfw/FischlinJM18URL#2540286Marc FischlinSogol MazaheriSelf-Guarding Cryptographic Protocols against Algorithm Substitution Attacks.CSF76-902018Conference and Workshop Papersclosedconf/csfw/FischlinM1810.1109/CSF.2018.00013https://doi.org/10.1109/CSF.2018.00013https://dblp.org/rec/conf/csfw/FischlinM18URL#2540287Helene HaaghAleksandr KarbyshevSabine OechsnerBas SpittersPierre-Yves StrubComputer-Aided Proofs for Multiparty Computation with Active Security.CSF119-1312018Conference and Workshop Papersclosedconf/csfw/HaaghKOSS1810.1109/CSF.2018.00016https://doi.org/10.1109/CSF.2018.00016https://dblp.org/rec/conf/csfw/HaaghKOSS18URL#2540288Andreas V. HessSebastian MödersheimA Typing Result for Stateful Protocols.CSF374-3882018Conference and Workshop Papersclosedconf/csfw/HessM1810.1109/CSF.2018.00034https://doi.org/10.1109/CSF.2018.00034https://dblp.org/rec/conf/csfw/HessM18URL#2540289Everett HildenbrandtManasvi SaxenaNishant RodriguesXiaoran ZhuPhilip DaianDwight GuthBrandon M. MooreDaejun Park 0001Yi ZhangAndrei StefanescuGrigore RosuKEVM: A Complete Formal Semantics of the Ethereum Virtual Machine.CSF204-2172018Conference and Workshop Papersclosedconf/csfw/HildenbrandtSRZ1810.1109/CSF.2018.00022https://doi.org/10.1109/CSF.2018.00022https://dblp.org/rec/conf/csfw/HildenbrandtSRZ18URL#2540290Charlie JacommeSteve KremerAn Extensive Formal Analysis of Multi-factor Authentication Protocols.CSF1-152018Conference and Workshop Papersclosedconf/csfw/JacommeK1810.1109/CSF.2018.00008https://doi.org/10.1109/CSF.2018.00008https://dblp.org/rec/conf/csfw/JacommeK18URL#2540291Ilia LebedevKyle HoganSrinivas DevadasInvited Paper: Secure Boot and Remote Attestation in the Sanctum Processor.CSF46-602018Conference and Workshop Papersclosedconf/csfw/LebedevHD1810.1109/CSF.2018.00011https://doi.org/10.1109/CSF.2018.00011https://dblp.org/rec/conf/csfw/LebedevHD18URL#2540292Baiyu LiDaniele MicciancioSymbolic Security of Garbled Circuits.CSF147-1612018Conference and Workshop Papersclosedconf/csfw/LiM1810.1109/CSF.2018.00018https://doi.org/10.1109/CSF.2018.00018https://dblp.org/rec/conf/csfw/LiM18URL#2540293Pasquale MalacariaM. H. R. KhouzaniCorina S. PasareanuQuoc-Sang PhanKasper Søe LuckowSymbolic Side-Channel Analysis for Probabilistic Programs.CSF313-3272018Conference and Workshop Papersclosedconf/csfw/MalacariaKPPL1810.1109/CSF.2018.00030https://doi.org/10.1109/CSF.2018.00030https://dblp.org/rec/conf/csfw/MalacariaKPPL18URL#2540294McKenna McCallHengrun Zhang 0002Limin Jia 0001Knowledge-Based Security of Dynamic Secrets for Reactive Programs.CSF175-1882018Conference and Workshop Papersclosedconf/csfw/McCallZJ1810.1109/CSF.2018.00020https://doi.org/10.1109/CSF.2018.00020https://dblp.org/rec/conf/csfw/McCallZJ18URL#2540295Vineet RajaniDeepak Garg 0001Types for Information Flow Control: Labeling Granularity and Semantic Models.CSF233-2462018Conference and Workshop Papersclosedconf/csfw/Rajani01810.1109/CSF.2018.00024https://doi.org/10.1109/CSF.2018.00024https://dblp.org/rec/conf/csfw/Rajani018URL#2540296Samuel YeomIrene GiacomelliMatt FredriksonSomesh JhaPrivacy Risk in Machine Learning: Analyzing the Connection to Overfitting.CSF268-2822018Conference and Workshop Papersclosedconf/csfw/YeomGFJ1810.1109/CSF.2018.00027https://doi.org/10.1109/CSF.2018.00027https://dblp.org/rec/conf/csfw/YeomGFJ18URL#254029731st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018CSFIEEE Computer Society2018Editorshipconf/csfw/2018https://ieeexplore.ieee.org/xpl/conhome/8428826/proceedinghttps://dblp.org/rec/conf/csfw/2018URL#2682601