29th IEEE Computer Security Foundations Symposium


Accepted Papers


  • Localizing Firewall Security Policies
  • Pedro Adão (Instituto Superior Técnico, Universidade de Lisboa), Riccardo Focardi (University Ca' Foscari, Venice and Cryptosense), Flaminia L. Luccio (University Ca' Foscari, Venice), Joshua D. Guttman (The MITRE Corporation and Worcester Polytechnic Institute)

  • Runtime Verification of k-Safety Hyperproperties in HyperLTL
  • Shreya Agrawal (University of Waterloo), Borzoo Bonakdarpour (McMaster University)

  • Axioms for Information Leakage
  • Mário S. Alvim (Computer Science Department, Federal University of Minas Gerais), Konstantinos Chatzikokolakis (CNRS, Inria, and Ecole Polytechnique), Annabelle McIver (Department of Computing, Macquarie University), Carroll Morgan (School of Computer Science & Engineering University of New South Wales, and Data61), Catuscia Palamidessi (Inria and Ecole Polytechnique), Geoffrey Smith (School of Computing & Information Sciences, Florida International University)

  • A Calculus for Flow-Limited Authorization
  • Owen Arden (Cornell University), Andrew C. Myers (Cornell University)

  • Quantitative Verification and Synthesis of Attack-Defence Scenarios
  • Zaruhi Aslanyan (Technical University of Denmark), Flemming Nielson (Technical University of Denmark), David Parker (University Of Birmingham)

  • Calculational Design of Information Flow Monitors
  • Mounir Assaf (Stevens Institute of Technology), David A. Naumann (Stevens Institute of Technology)

  • In the Nick of Time: Proactive Prevention of Obligation Violations
  • David Basin (ETH Zürich), Søren Debois (IT University of Copenhagen), Thomas Hildebrandt (IT University of Copenhagen)

  • Modeling Human Errors in Security Protocols
  • David Basin (ETH Zurich), Sasa Radomirovic (ETH Zurich), Lara Schmid (ETH Zurich)

  • Hybrid Monitoring of Attacker Knowledge
  • Frédéric Besson (Inria), Nataliia Bielova (Inria), Thomas Jensen (Inria)

  • Automated reasoning for equivalences in the applied pi calculus with barriers
  • Bruno Blanchet (Inria Paris), Ben Smyth (Huawei Technologies Co. Ltd., France)

  • CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection
  • Jeremiah Blocki (Microsoft Research), Anupam Datta (Carnegie Mellon University)

  • Correlated Secrets in Quantitative Information Flow
  • Nicolas Bordenabe (Macquarie University), Geoffrey Smith (Florida International University)

  • Micro-Policies for Web Session Security
  • Stefano Calzavara (Università Ca' Foscari Venezia), Riccardo Focardi (Università Ca' Foscari Venezia), Niklas Grimm (Saarland University), Matteo Maffei (Saarland University)

  • Static Detection of Collusion Attacks in ARBAC-based Workflow Systems
  • Stefano Calzavara (Università Ca' Foscari Venezia), Alvise Rabitti (Università Ca' Foscari Venezia), Enrico Steffinlongo (Università Ca' Foscari Venezia), Michele Bugliesi (Università Ca' Foscari Venezia)

  • Secure Software Licensing: Models, Constructions, and Proofs
  • Sergiu Costea (University POLITEHNICA of Bucharest), Bogdan Warinschi (University of Bristol)

  • Resilient Delegation Revocation with Precedence for Predecessors is NP-Complete
  • Marcos Cramer (University of Luxembourg), Pieter Van Hertum (KU Leuven), Ruben Lapauw (KU Leuven), Ingmar Dasseville (KU Leuven), Marc Denecker (KU Leuven)

  • On Post-Compromise Security
  • Cas Cremers (University of Oxford), Katriel Cohn-Gordon (University of Oxford), Luke Garratt (University of Oxford)

  • A Certified Compiler for Verifiable Computing
  • Cédric Fournet (Microsoft Research), Chantal Keller (LRI, Univ. Paris-Sud), Vincent Laporte (Université Rennes 1, IMDEA Software Inst.)

  • Non-Interference with What-Declassification in Component-Based Systems
  • Simon Greiner (Karlsruhe Institute of Technology), Daniel Grahl (Karlsruhe Institute of Technology)

  • Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design
  • MHR Khouzani (Queen Mary University of London), Pasquale Malacaria (Queen Mary University of London)

  • sElect: A Lightweight Verifiable Remote Voting System
  • Ralf Küsters (University of Trier), Johannes Müller (University of Trier), Enrico Scapin (University of Trier), Tomasz Truderung (Polyas)

  • Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation
  • Yannis Juglaret (Inria Paris and Université Paris Diderot -- Paris 7), Catalin Hritcu (Inria Paris), Arthur Azevedo de Amorim (University of Pennsylvania), Boris Eng (Université Paris 8), Benjamin C. Pierce (University of Pennsylvania)

  • Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference
  • Toby Murray (Data61, NICTA and UNSW), Robert Sison (Data61, NICTA and UNSW), Edward Pierzchalski (Data61, NICTA and UNSW), Christine Rizkallah (Data61, NICTA and UNSW)

  • Multi-run side-channel analysis using Symbolic Execution and Max-SMT
  • Corina Pasareanu (Carnegie Mellon University), Sang Phan (Carnegie Mellon University), Pasquale Malacaria (Queen Mary University of London)

  • On Modular and Fully-Abstract Compilation
  • Marco Patrignani (MPI-SWS), Dominique Devriese (KUL), Frank Piessens (KUL)

  • On access control, capabilities, their equivalence and confused deputy attacks
  • Vineet Rajani (MPI-SWS), Deepak Garg (MPI-SWS), Tamara Rezk (INRIA)

  • Analysis of Key Wrapping APIs: Generic Policies, Computational Security
  • Guillaume Scerri (University of Bristol), Ryan Stanley-Oakes (University of Bristol)

  • Fault-Resilient Non-interference
  • Filippo Del Tedesco (Admeta AB), David Sands (Chalmers University of Technology), Alejandro Russo (Chalmers University of Technology)

  • Access Control Synthesis for Physical Spaces
  • Petar Tsankov (ETH Zurich), Mohammad Torabi Dashti (ETH Zurich), David Basin (ETH Zurich)

  • A Formal Treatment of Model-Inversion Attacks
  • Xi Wu (UW-Madison), Matt Fredrikson (CMU), Somesh Jha (UW-Madison), Jeffrey F. Naughton (UW-Madison)

  • A Verified Extensible Library of Elliptic Curves
  • Jean-Karim Zinzindohoué (ENPC\INRIA), Evmorfia-Iro Bartzia (INRIA), Karthikeyan Bhargavan (INRIA)


For further enquiries or information, please contact Pedro Adão.