Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CSF
CSF 2022
Generate Citations
2022 IEEE 35th Computer Security Foundations Symposium (CSF)
Aug 07 2022 to Aug 11 2022
Haifa, undefined, IL
ISBN: 978-1-6654-8417-6
Table of Contents
Conditional Observational Equivalence and Off-Line Guessing Attacks in Multiset Rewriting
Freely available from IEEE.
pp. 1-16
by
Petar Paradžik
,
Ante Derek
Title Page i
Freely available from IEEE.
pp. 1-1
Is Eve Nearby? Analysing Protocols under the Distant-Attacker Assumption
Freely available from IEEE.
pp. 17-32
by
Reynaldo Gil-Pons
,
Ross Horne
,
Sjouke Mauw
,
Alwen Tiu
,
Rolando Trujillo-Rasua
Title Page iii
Freely available from IEEE.
pp. 1-1
A Small Bound on the Number of Sessions for Security Protocols
Freely available from IEEE.
pp. 33-48
by
Cortier Véronique
,
Dallon Antoine
,
Delaune Stéphanie
Copyright
Freely available from IEEE.
pp. 1-1
A Formal Model of Checked C
Freely available from IEEE.
pp. 49-63
by
Liyi Li
,
Yiyun Liu
,
Deena Postol
,
Leonidas Lampropoulos
,
David Van Horn
,
Michael Hicks
Table of Contents
Freely available from IEEE.
pp. v-ix
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation
Freely available from IEEE.
pp. 64-79
by
Akram El-Korashy
,
Roberto Blanco
,
Jérémy Thibault
,
Adrien Durier
,
Deepak Garg
,
Catalin Hritcu
Welcome to CSF 2022, the 34th IEEE Computer Security Foundations Symposium!
Freely available from IEEE.
pp. ix-ix
Proving Full-System Security Properties under Multiple Attacker Models on Capability Machines
Freely available from IEEE.
pp. 80-95
by
Thomas Van Strydonck
,
Ai¨na Linn Georges
,
Armaël Guéneau
,
Alix Trieu
,
Amin Timany
,
Frank Piessens
,
Lars Birkedal
,
Dominique Devriese
CSF 2022 Committees
Freely available from IEEE.
pp. x-xi
Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting
Freely available from IEEE.
pp. 1-16
by
Petar Paradžik
,
Ante Derek
Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes
Freely available from IEEE.
pp. 96-111
by
Alisa Pankova
,
Peeter Laud
Is Eve nearby? Analysing protocols under the distant-attacker assumption
Freely available from IEEE.
pp. 17-32
by
Reynaldo Gil-Pons
,
Ross Horne
,
Sjouke Mauw
,
Alwen Tiu
,
Rolando Trujillo-Rasua
DPL: A Language for GDPR Enforcement
Freely available from IEEE.
pp. 112-129
by
Farzane Karami
,
David Basin
,
Einar Broch Johnsen
A small bound on the number of sessions for security protocols
Freely available from IEEE.
pp. 33-48
by
Véronique Cortier
,
Antoine Dallon
,
Stéphanie Delaune
Privacy as Reachability
Freely available from IEEE.
pp. 130-146
by
Sébastien Gondron
,
Sebastian Mödersheim
,
Luca Viganò
A Formal Model of Checked C
Freely available from IEEE.
pp. 49-63
by
Liyi Li
,
Yiyun Liu
,
Deena Postol
,
Leonidas Lampropoulos
,
David Van Horn
,
Michael Hicks
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures
Freely available from IEEE.
pp. 147-162
by
Thilo Weghorn
,
Si Liu
,
Christoph Sprenger
,
Adrian Perrig
,
David Basin
SecurePtrs: Proving Secure Compilation with Data-Flow Back-Translation and Turn-Taking Simulation
Freely available from IEEE.
pp. 64-79
by
Akram El-Korashy
,
Roberto Blanco
,
Jérémy Thibault
,
Adrien Durier
,
Deepak Garg
,
Cătălin Hriţcu
Applying Consensus and Replication Securely with FLAQR
Freely available from IEEE.
pp. 163-178
by
Priyanka Mondal
,
Maximilian Algehed
,
Owen Arden
Proving full-system security properties under multiple attacker models on capability machines
Freely available from IEEE.
pp. 80-95
by
Thomas Van Strydonck
,
Aïna Linn Georges
,
Armaël Gueneau
,
Alix Trieu
,
Amin Timany
,
Frank Piessens
,
Lars Birkedal
,
Dominique Devriese
Contingent Payments from Two-Party Signing and Verification for Abelian Groups
Freely available from IEEE.
pp. 179-194
by
Sergiu Bursuc
,
Sjouke Mauw
Interpreting Epsilon of Differential Privacy in Terms of Advantage in Guessing or Approximating Sensitive Attributes
Freely available from IEEE.
pp. 96-111
by
Alisa Pankova
,
Peeter Laud
Collusion-Preserving Computation without a Mediator
Freely available from IEEE.
pp. 195-210
by
Michele Ciampi
,
Yun Lu
,
Vassilis Zikas
DPL: A Language for GDPR Enforcement
Freely available from IEEE.
pp. 112-129
by
Farzane Karami
,
David Basin
,
Einar Broch Johnsen
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox
Freely available from IEEE.
pp. 211-226
by
François Dupressoir
,
Konrad Kohbrok
,
Sabine Oechsner
Privacy as Reachability
Freely available from IEEE.
pp. 130-146
by
Sébastien Gondron
,
Sebastian Mödersheim
,
Luca Viganò
IFCIL: An Information Flow Configuration Language for SELinux
Freely available from IEEE.
pp. 227-243
by
Lorenzo Ceragioli
,
Letterio Galletta
,
Pierpaolo Degano
,
David Basin
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures
Freely available from IEEE.
pp. 147-162
by
Thilo Weghorn
,
Si Liu
,
Christoph Sprenger
,
Adrian Perrig
,
David Basin
Towards a General-Purpose Dynamic Information Flow Policy
Freely available from IEEE.
pp. 244-259
by
Peixuan Li
,
Danfeng Zhang
Applying consensus and replication securely with FLAQR
Freely available from IEEE.
pp. 163-178
by
Priyanka Mondal
,
Maximilian Algehed
,
Owen Arden
Beware of Greeks Bearing Entanglement? Quantum Covert Channels, Information Flow and Non-Local Games
Freely available from IEEE.
pp. 260-272
by
David Mestel
Contingent payments from two-party signing and verification for abelian groups
Freely available from IEEE.
pp. 195-210
by
Sergiu Bursuc
,
Sjouke Mauw
Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant
Freely available from IEEE.
pp. 273-288
by
David Baelde
,
Stéphanie Delaune
,
Adrien Koutsos
,
Solène Moreau
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
Freely available from IEEE.
pp. 289-302
by
Felipe Boeira
,
Mikael Asplund
Collusion-Preserving Computation without a Mediator
Freely available from IEEE.
pp. 211-226
by
Michele Ciampi
,
Yun Lu
,
Vassilis Zikas
Symbolic Protocol Verification with Dice: Process Equivalences in the Presence of Probabilities
Freely available from IEEE.
pp. 303-318
by
Vincent Cheval
,
Raphaëlle Crubillé
,
Steve Kremer
Bringing State-Separating Proofs to EasyCrypt A Security Proof for Cryptobox
Freely available from IEEE.
pp. 227-242
by
François Dupressoir
,
Konrad Kohbrok
,
Sabine Oechsner
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co
Freely available from IEEE.
pp. 319-331
by
Constantin Catalin Dragan
,
François Dupressoir
,
Ehsan Estaji
,
Kristian Gjøsteen
,
Thomas Haines
,
Peter Y. A. Ryan
,
Peter B. Rønne
,
Morten Rotvold Solberg
IFCIL: An Information Flow Configuration Language for SELinux
Freely available from IEEE.
pp. 243-259
by
Lorenzo Ceragioli
,
Letterio Galletta
,
Pierpaolo Degano
,
David Basin
Universal Optimality and Robust Utility Bounds for Metric Differential Privacy
Freely available from IEEE.
pp. 332-347
by
Natasha Fernandes
,
Annabelle McIver
,
Catuscia Palamidessi
,
Ming Ding
Towards a General-Purpose Dynamic Information Flow Policy
Freely available from IEEE.
pp. 260-275
by
Peixuan Li
,
Danfeng Zhang
Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments
Freely available from IEEE.
pp. 348-363
by
Ross Horne
,
Sjouke Mauw
,
Semen Yurkov
Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games
Freely available from IEEE.
pp. 276-288
by
David Mestel
Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems
Freely available from IEEE.
pp. 364-379
by
Lisa Oakley
,
Alina Oprea
,
Stavros Tripakis
Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant
Freely available from IEEE.
pp. 289-304
by
David Baelde
,
Stéphanie Delaune
,
Adrien Koutsos
,
Solène Moreau
The Complexity of Verifying Boolean Programs as Differentially Private
Freely available from IEEE.
pp. 380-395
by
Mark Bun
,
Marco Gaboardi
,
Ludmila Glinskih
Exploiting Partial Order of Keys to Verify Security of a Vehicular Group Protocol
Freely available from IEEE.
pp. 305-318
by
Felipe Boeira
,
Mikael Asplund
Adversary Safety by Construction in a Language of Cryptographic Protocols
Freely available from IEEE.
pp. 396-411
by
Timothy Braje
,
Alice Lee
,
Andrew Wagner
,
Benjamin Kaiser
,
Daniel Park
,
Martine Kalke
,
Robert Cunningham
,
Adam Chlipala
Symbolic protocol verification with dice: process equivalences in the presence of probabilities
Freely available from IEEE.
pp. 319-334
by
Vincent Cheval
,
Raphaëlle Crubillé
,
Steve Kremer
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing
Freely available from IEEE.
pp. 412-422
by
Alexander May
,
Floyd Zweydinger
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co
Freely available from IEEE.
pp. 335-347
by
Constantin Cătălin Drăgan
,
François Dupressoir
,
Ehsan Estaji
,
Kristian Gj⊘steen
,
Thomas Haines
,
Peter Y.A. Ryan
,
Peter B. R⊘nne
,
Morten Rotvold Solberg
A Complete Characterization of Security for Linicrypt Block Cipher Modes
Freely available from IEEE.
pp. 423-438
by
Tommy Hollenberg
,
Mike Rosulek
,
Lawrence Roy
Universal Optimality and Robust Utility Bounds for Metric Differential Privacy
Freely available from IEEE.
pp. 348-363
by
Natasha Fernandes
,
Annabelle McIver
,
Catuscia Palamidessi
,
Ming Ding
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking
Freely available from IEEE.
pp. 439-454
by
Mohamed El Massad
,
Nahid Juma
,
Jonathan Shahen
,
Mariana Raykova
,
Siddharth Garg
,
Mahesh Tripunitara
Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments
Freely available from IEEE.
pp. 364-379
by
Ross Horne
,
Sjouke Mauw
,
Semen Yurkov
Prophecy Variables for Hyperproperty Verification
Freely available from IEEE.
pp. 455-469
by
Raven Beutner
,
Bernd Finkbeiner
Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems
Freely available from IEEE.
pp. 380-395
by
Lisa Oakley
,
Alina Oprea
,
Stavros Tripakis
Mapping Synthesis for Hyperproperties
Freely available from IEEE.
pp. 470-484
by
Tzu-Han Hsu
,
Borzoo Bonakdarpour
,
Eunsuk Kang
,
Stavros Tripakis
The Complexity of Verifying Boolean Programs as Differentially Private
Freely available from IEEE.
pp. 396-411
by
Mark Bun
,
Marco Gaboardi
,
Ludmila Glinskih
Adversary Safety by Construction in a Language of Cryptographic Protocols
Freely available from IEEE.
pp. 412-427
by
Timothy M. Braje
,
Alice R. Lee
,
Andrew Wagner
,
Benjamin Kaiser
,
Daniel Park
,
Martine Kalke
,
Robert K. Cunningham
,
Adam Chlipala
Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing
Freely available from IEEE.
pp. 428-438
by
Alexander May
,
Floyd Zweydinger
A Complete Characterization of Security for Linicrypt Block Cipher Modes
Freely available from IEEE.
pp. 439-454
by
Tommy Hollenberg
,
Mike Rosulek
,
Lawrence Roy
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking
Freely available from IEEE.
pp. 455-470
by
Mohamed El Massad
,
Nahid Juma
,
Jonathan Shahen
,
Mariana Raykova
,
Siddharth Garg
,
Mahesh Tripunitara
Prophecy Variables for Hyperproperty Verification
Freely available from IEEE.
pp. 471-485
by
Raven Beutner
,
Bernd Finkbeiner
Mapping Synthesis for Hyperproperties
Freely available from IEEE.
pp. 486-500
by
Tzu-Han Hsu
,
Borzoo Bonakdarpour
,
Eunsuk Kang
,
Stavros Tripakis
Author Index
Freely available from IEEE.
pp. 501-502
How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis
Freely available from IEEE.
pp. 179-194
by
David Mestel
,
Johannes Müller
,
Pascal Reisert
Showing 70 out of 70