Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CSF
CSF 2023
Generate Citations
2023 IEEE 36th Computer Security Foundations Symposium (CSF)
July 10 2023 to July 14 2023
Dubrovnik, Croatia
ISBN: 979-8-3503-2192-0
Table of Contents
Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis
Freely available from IEEE.
pp. 200-213
by
Cas Cremers
,
Charlie Jacomme
,
Philip Lukert
Half Title Page
Freely available from IEEE.
pp. 1-1
Basilic: Resilient-Optimal Consensus Protocols with Benign and Deceitful Faults
Freely available from IEEE.
pp. 91-106
by
Alejandro Ranchal-Pedrosa
,
Vincent Gramoli
2023 IEEE 36th Computer Security Foundations Symposium
Freely available from IEEE.
pp. 1-1
Towards a Game-Theoretic Security Analysis of Off-Chain Protocols
Freely available from IEEE.
pp. 107-122
by
Sophie Rain
,
Georgia Avarikioti
,
Laura Kovács
,
Matteo Maffei
Copyright and Reprint Permissions
Freely available from IEEE.
pp. 1-1
Optimally Hiding Object Sizes with Constrained Padding
Freely available from IEEE.
pp. 505-520
by
Andrew C. Reed
,
Michael K. Reiter
Table of Contents
Freely available from IEEE.
pp. v-ix
Election Verifiability in Receipt-Free Voting Protocols
Freely available from IEEE.
pp. 59-74
by
Sevdenur Baloglu
,
Sergiu Bursuc
,
Sjouke Mauw
,
Jun Pang
Welcome to CSF 2023, the 36th IEEE Computer Security Foundations Symposium!
Freely available from IEEE.
pp. x-x
Smart Contract Synthesis Modulo Hyperproperties
Freely available from IEEE.
pp. 276-291
by
Norine Coenen
,
Bernd Finkbeiner
,
Jana Hofmann
,
Julia Tillman
Committees
Freely available from IEEE.
pp. xi-xiii
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information
Freely available from IEEE.
pp. 407-422
by
Shahnewaz Karim Sakib
,
George T Amariucai
,
Yong Guan
High-Assurance Field Inversion for Curve-Based Cryptography
Freely available from IEEE.
pp. 552-567
by
Benjamin Salling Hvass
,
Diego F. Aranha
,
Bas Spitters
A State-Separating Proof for Yao's Garbling Scheme
Freely available from IEEE.
pp. 137-152
by
Chris Brzuska
,
Sabine Oechsner
Collusion-Deterrent Threshold Information Escrow
Freely available from IEEE.
pp. 584-599
by
Easwar Vivek Mangipudi
,
Donghang Lu
,
Alexandros Psomas
,
Aniket Kate
Bayes Security: A Not So Average Metric
Freely available from IEEE.
pp. 388-406
by
Konstantinos Chatzikokolakis
,
Giovanni Cherubin
,
Catuscia Palamidessi
,
Carmela Troncoso
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE
Freely available from IEEE.
pp. 489-504
by
Adi Akavia
,
Ben Galili
,
Hayim Shaul
,
Mor Weiss
,
Zohar Yakhini
Investigating Membership Inference Attacks under Data Dependencies
Freely available from IEEE.
pp. 473-488
by
Thomas Humphries
,
Simon Oya
,
Lindsey Tulloch
,
Matthew Rafuse
,
Ian Goldberg
,
Urs Hengartner
,
Florian Kerschbaum
OblivIO: Securing Reactive Programs by Oblivious Execution with Bounded Traffic Overheads
Freely available from IEEE.
pp. 292-307
by
Jeppe Fredsgaard Blaabjerg
,
Aslan Askarov
Zero-Knowledge in EasyCrypt
Freely available from IEEE.
pp. 1-16
by
Denis Firsov
,
Dominique Unruh
Securing Optimized Code Against Power Side Channels
Freely available from IEEE.
pp. 340-355
by
Rodothea Myrsini Tsoupidi
,
Roberto Castañeda Lozano
,
Elena Troubitsyna
,
Panagiotis Papadimitratos
Preimage Awareness in Linicrypt
Freely available from IEEE.
pp. 33-42
by
Zahra Javar
,
Bruce M. Kapron
On the Incoercibility of Digital Signatures
Freely available from IEEE.
pp. 153-168
by
Ashley Fraser
,
Lydia Garms
,
Elizabeth A. Quaglia
Z_$\pi_{\mathbf{RA}}$_Z: A Z_$\pi\text{-calculus}$_Z for Verifying Protocols that Use Remote Attestation
Freely available from IEEE.
pp. 537-551
by
Emiel Lanckriet
,
Matteo Busi
,
Dominique Devriese
On the (De) centralization of FruitChains
Freely available from IEEE.
pp. 229-244
by
Aikaterini-Panagiota Stouka
,
Thomas Zacharias
Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers
Freely available from IEEE.
pp. 324-339
by
Farzaneh Derakhshan
,
Zichao Zhang
,
Amit Vasudevan
,
Limin Jia
Proving Unlinkability Using ProVerif Through Desynchronised Bi-Processes
Freely available from IEEE.
pp. 75-90
by
David Baelde
,
Alexandre Debant
,
Stéphanie Delaune
HoRStify: Sound Security Analysis of Smart Contracts
Freely available from IEEE.
pp. 245-260
by
Sebastian Holler
,
Sebastian Biewer
,
Clara Schneidewind
Keep Spending: Beyond Optimal Cyber-Security Investment
Freely available from IEEE.
pp. 123-136
by
Yunxiao Zhang
,
Pasquale Malacaria
Extending the Authentication Hierarchy with One-Way Agreement
Freely available from IEEE.
pp. 214-228
by
Johannes Wilson
,
Mikael Asplund
,
Niklas Johansson
Statement-Oblivious Threshold Witness Encryption
Freely available from IEEE.
pp. 17-32
by
Sebastian Faust
,
Carmit Hazay
,
David Kretzler
,
Benjamin Schlosser
Robust Safety for Move
Freely available from IEEE.
pp. 308-323
by
Marco Patrignani
,
Sam Blackshear
SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap
Freely available from IEEE.
pp. 439-456
by
Sayanton V. Dibbo
SoK: Delay-Based Cryptography
Freely available from IEEE.
pp. 169-183
by
Liam Medley
,
Angelique Faye Loe
,
Elizabeth A. Quaglia
A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow Integrity
Freely available from IEEE.
pp. 372-387
by
Matthieu Baty
,
Pierre Wilke
,
Guillaume Hiet
,
Arnaud Fontaine
,
Alix Trieu
General-Purpose Secure Conflict-free Replicated Data Types
Freely available from IEEE.
pp. 521-536
by
Bernardo Portela
,
Hugo Pacheco
,
Pedro Jorge
,
Rogério Pontes
Cross-Chain Swaps with Preferences
Freely available from IEEE.
pp. 261-275
by
Eric Chan
,
Marek Chrobak
,
Mohsen Lesani
Election Verifiability with ProVerif
Freely available from IEEE.
pp. 43-58
by
Vincent Cheval
,
Véronique Cortier
,
Alexandre Debant
Analyzing the Shuffle Model Through the Lens of Quantitative Information Flow
Freely available from IEEE.
pp. 423-438
by
Mireya Jurado
,
Ramon G. Gonze
,
Mário S. Alvim
,
Catuscia Palamidessi
From Bounded to Unbounded: Privacy Amplification via Shuffling with Dummies
Freely available from IEEE.
pp. 457-472
by
Shun Takagi
,
Fumiyuki Kato
,
Yang Cao
,
Masatoshi Yoshikawa
On Sustainable Ring-Based Anonymous Systems
Freely available from IEEE.
pp. 568-583
by
Sherman S. M. Chow
,
Christoph Egger
,
Russell W. F. Lai
,
Viktoria Ronge
,
Ivy K. Y. Woo
Indistinguishability Beyond Diff-Equivalence in ProVerif
Freely available from IEEE.
pp. 184-199
by
Vincent Cheval
,
Itsaka Rakotonirina
Formalizing Stack Safety as a Security Property
Freely available from IEEE.
pp. 356-371
by
Sean Noble Anderson
,
Roberto Blanco
,
Leonidas Lampropoulos
,
Benjamin C. Pierce
,
Andrew Tolmach
Author Index
Freely available from IEEE.
pp. 601-602
Showing 45 out of 45