the proceedings contain 7 papers. the topics discussed include: trust engineering via security protocols;spoofkiller: you can teach people how to pay, but not how to pay attention;towards a model to support the reconc...
ISBN:
(纸本)9780769548227
the proceedings contain 7 papers. the topics discussed include: trust engineering via security protocols;spoofkiller: you can teach people how to pay, but not how to pay attention;towards a model to support the reconciliation of security actions across enterprises;using socio-technical and resilience frameworks to anticipate threat;improved visual preference authentication;using information trustworthiness advice in decision making;and optimal security investments in networks of varying size and topology.
the proceedings contain 38 papers. the topics discussed include: general-purpose secure conflict-free replicated data types;securing optimized code against power side channels;basilic: resilient-optimal consensus prot...
ISBN:
(纸本)9798350321920
the proceedings contain 38 papers. the topics discussed include: general-purpose secure conflict-free replicated data types;securing optimized code against power side channels;basilic: resilient-optimal consensus protocols with benign and deceitful faults;election verifiability in receipt-free voting protocols;high-assurance field inversion for curve-based cryptography;towards a game-theoretic security analysis of off-chain protocols;subterm-based proof techniques for improving the automation and scope of security protocol analysis;cross-chain swaps with preferences;preimage awareness in Linicrypt;and Bayes security: a not so average metric.
the proceedings contain 45 papers. the topics discussed include: a logic of sattestation;probability from possibility: probabilistic confidentiality for storage systems under nondeterminism;computationally bounded rob...
ISBN:
(纸本)9798350362039
the proceedings contain 45 papers. the topics discussed include: a logic of sattestation;probability from possibility: probabilistic confidentiality for storage systems under nondeterminism;computationally bounded robust compilation and universally composable security;a decision procedure for alpha-beta privacy for a bounded number of transitions;accountable bulletin boards: definition and provably secure implementation;disjunctive policies for database-backed programs;deciding branching hyperproperties for real time systems;a probabilistic logic for concrete security;recent latest message driven GHOST: Balancing Dynamic Availability With asynchrony resilience;and post-quantum sound CRYPTOVERIF and verification of hybrid TLS and SSH key-exchanges.
the proceedings contain 31 papers. the topics discussed include: conditional observational equivalence and off-line guessing attacks in multiset rewriting;is eve nearby? analyzing protocols under the distant-attacker ...
ISBN:
(纸本)9781665484176
the proceedings contain 31 papers. the topics discussed include: conditional observational equivalence and off-line guessing attacks in multiset rewriting;is eve nearby? analyzing protocols under the distant-attacker assumption;a small bound on the number of sessions for security protocols;SecurePtrs: proving secure compilation with data-flow back-translation and turn-taking simulation;proving full-system security properties under multiple attacker models on capability machines;interpreting epsilon of differential privacy in terms of advantage in guessing or approximating sensitive attributes;a small bound on the number of sessions for security protocols;and N-tube: formally verified secure bandwidth reservation in path-aware Internet architectures.
the proceedings contain 43 papers. the topics discussed include: statistical model checking for hyperproperties;on compositional information flow aware refinement;backwards-directed information flow analysis for concu...
ISBN:
(纸本)9781728176079
the proceedings contain 43 papers. the topics discussed include: statistical model checking for hyperproperties;on compositional information flow aware refinement;backwards-directed information flow analysis for concurrent programs;gradual security types and gradual guarantees;towards language-based mitigation of traffic analysis attacks;a quantale of information;resource-aware session types for digital contracts;fixing the achilles heel of e-voting: the bulletin board;election verifiability revisited: automated security proofs and attacks on Helios and Belenios;accountability in the decentralized-adversary setting;verifying accountability for unbounded sets of participants;and cooking cryptographers: secure multiparty computation based on balls and bags.
the proceedings contain 19 papers. the topics discussed include: a theory of information-flow labels;precise enforcement of confidentiality for reactive systems;secure multi-execution: fine-grained, declassification-a...
ISBN:
(纸本)9780769550312
the proceedings contain 19 papers. the topics discussed include: a theory of information-flow labels;precise enforcement of confidentiality for reactive systems;secure multi-execution: fine-grained, declassification-aware, and transparent;memory trace oblivious program execution;oblivious program execution and path-sensitive non-interference;security and privacy by declarative design;quantum information-flow security: noninterference and access control;application-sensitive access control evaluation using parameterized expressiveness;probabilistic point-to-point information leakage;information flow analysis for a dynamically typed language with staged metaprogramming;gradual security typing with references;hybrid information flow monitoring against web tracking;and verified computational differential privacy with applications to smart metering.
the proceedings contain 21 papers. the topics discussed include: guiding a general-purpose C verifier to prove cryptographic protocols;integrated specification and verification of security protocols and policies;autom...
ISBN:
(纸本)9780769543659
the proceedings contain 21 papers. the topics discussed include: guiding a general-purpose C verifier to prove cryptographic protocols;integrated specification and verification of security protocols and policies;automated proofs for Diffie-Hellman-based key exchanges;formal analysis of protocols based on TPM state registers;resource-aware authorization policies for statically typed cryptographic protocols;obstruction-free authorization enforcement: aligning security with business objectives;dynamic enforcement of knowledge-based security policies;modular protections against non-control data attacks;static analysis for efficient hybrid information-flow control;local memory via layout randomization;a statistical test for information leaks using continuous mutual information;information-theoretic bounds for differentially private mechanisms;and the complexity of quantitative information flow problems.
the proceedings contain 7 papers. the topics discussed include: decision justifications for wireless network selection;reflecting on the ability of enterprise security policy to address accidental insider threat;model...
ISBN:
(纸本)9781479979011
the proceedings contain 7 papers. the topics discussed include: decision justifications for wireless network selection;reflecting on the ability of enterprise security policy to address accidental insider threat;modeling user devices in security ceremonies;the social engineering personality framework;modeling human behavior with higher order logic: insider threats;what you enter is what you sign: input integrity in an online banking environment;and using statistical information to communicate android permission risks to users.
the proceedings contain 25 papers. the topics discussed include: information-flow security for a core of JavaScript;secure information flow for concurrent programs under total store order;ENCoVer: symbolic exploration...
ISBN:
(纸本)9780769547183
the proceedings contain 25 papers. the topics discussed include: information-flow security for a core of JavaScript;secure information flow for concurrent programs under total store order;ENCoVer: symbolic exploration for information flow security;information-flow control for programming on encrypted data;automated analysis of Diffie-Hellman protocols and advanced security properties;verifying privacy-type properties in a modular way;security analysis of role-based access control through program verification;labeled sequent calculi for access control logics: countermodels, saturation and abduction;Mashic compiler: mashup sandboxing based on inter-frame communication;cache-leakage resilient OS isolation in an idealized model of virtualization;a framework for the cryptographic verification of Java-like programs;constructing optimistic multi-party contract signing protocols;and discovering concrete attacks on website authorization by formal analysis.
暂无评论