Login / Signup
POST
2012
2015
2019
2012
2019
Keyphrases
Publications
2019
Natasha Fernandes
,
Mark Dras
,
Annabelle McIver
Generalised Differential Privacy for Text Document Processing.
POST
(2019)
Alexandre Debant
,
Stéphanie Delaune
Symbolic Verification of Distance Bounding Protocols.
POST
(2019)
Andrew Ruef
,
Leonidas Lampropoulos
,
Ian Sweet
,
David Tarditi
,
Michael Hicks
Achieving Safety Incrementally with Checked C.
POST
(2019)
Massimo Bartoletti
,
Roberto Zunino
Verifying Liquidity of Bitcoin Contracts.
POST
(2019)
Simon Oddershede Gregersen
,
Søren Eller Thomsen
,
Aslan Askarov
A Dependently Typed Library for Static Information-Flow Control in Idris.
POST
(2019)
John D. Ramsdell
,
Paul D. Rowe
,
Perry Alexander
,
Sarah Helble
,
Peter A. Loscocco
,
J. Aaron Pendergrass
,
Adam Petz
Orchestrating Layered Attestations.
POST
(2019)
David Butler
,
David Aspinall
,
Adrià Gascón
On the Formalisation of Σ-Protocols and Commitment Schemes.
POST
(2019)
Marco Vassena
,
Gary Soeller
,
Peter Amidon
,
Matthew Chan
,
John Renner
,
Deian Stefan
Foundations for Parallel Information Flow Control Runtime Systems.
POST
(2019)
Tachio Terauchi
,
Timos Antonopoulos
A Formal Analysis of Timing Channel Security via Bucketing.
POST
(2019)
Aseem Rastogi
,
Nikhil Swamy
,
Michael Hicks
Wys*: A DSL for Verified Secure Multi-party Computations.
POST
(2019)
volume 11426, 2019
Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings
POST
11426 (2019)
2018
Mário S. Alvim
,
Konstantinos Chatzikokolakis
,
Yusuke Kawamoto
,
Catuscia Palamidessi
Leakage and Protocol Composition in a Game-Theoretic Perspective.
POST
(2018)
Reinhard Munz
,
Fabienne Eigner
,
Matteo Maffei
,
Paul Francis
,
Deepak Garg
UniTraX: Protecting Data Privacy with Discoverable Biases.
POST
(2018)
Ilya Grishchenko
,
Matteo Maffei
,
Clara Schneidewind
A Semantic Framework for the Security Analysis of Ethereum Smart Contracts.
POST
(2018)
Chiara Bodei
,
Pierpaolo Degano
,
Riccardo Focardi
,
Letterio Galletta
,
Mauro Tempesta
Transcompiling Firewalls.
POST
(2018)
Hamed Nemati
,
Christoph Baumann
,
Roberto Guanciale
,
Mads Dam
Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels.
POST
(2018)
Arthur Azevedo de Amorim
,
Catalin Hritcu
,
Benjamin C. Pierce
The Meaning of Memory Safety.
POST
(2018)
Aleksandr Karbyshev
,
Kasper Svendsen
,
Aslan Askarov
,
Lars Birkedal
Compositional Non-interference for Concurrent Programs via Separation and Framing.
POST
(2018)
Ian Sweet
,
José Manuel Calderón Trilla
,
Chad Scherrer
,
Michael Hicks
,
Stephen Magill
What's the Over/Under? Probabilistic Bounds on Information Leakage.
POST
(2018)
Panagiotis Vasilikos
,
Flemming Nielson
,
Hanne Riis Nielson
Secure Information Release in Timed Automata.
POST
(2018)
Barbara Kordy
,
Wojciech Widel
On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
POST
(2018)
Nicola Atzei
,
Massimo Bartoletti
,
Tiziana Cimoli
,
Stefano Lande
,
Roberto Zunino
SoK: Unraveling Bitcoin Smart Contracts.
POST
(2018)
Véronique Cortier
,
Niklas Grimm
,
Joseph Lallemand
,
Matteo Maffei
Equivalence Properties by Typing in Cryptographic Branching Protocols.
POST
(2018)
Giada Sciarretta
,
Roberto Carbone
,
Silvio Ranise
,
Luca Viganò
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience.
POST
(2018)
Anastasia Mavridou
,
Aron Laszka
Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts.
POST
(2018)
volume 10804, 2018
Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
POST
10804 (2018)
2017
Patrick Ah-Fat
,
Michael Huth
Secure Multi-party Computation: Information Flow of Outputs and Game Theory.
POST
(2017)
Nicola Atzei
,
Massimo Bartoletti
,
Tiziana Cimoli
A Survey of Attacks on Ethereum Smart Contracts (SoK).
POST
(2017)
Jannik Dreier
,
Charles Duménil
,
Steve Kremer
,
Ralf Sasse
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.
POST
(2017)
Kushal Babel
,
Vincent Cheval
,
Steve Kremer
On Communication Models When Verifying Equivalence Properties.
POST
(2017)
Marcos Cramer
,
Giovanni Casini
Postulates for Revocation Schemes.
POST
(2017)
Arthur Blot
,
Masaki Yamamoto
,
Tachio Terauchi
Compositional Synthesis of Leakage Resilient Programs.
POST
(2017)
Willard Rafnsson
,
Limin Jia
,
Lujo Bauer
Timing-Sensitive Noninterference through Composition.
POST
(2017)
Pablo Cañones
,
Boris Köpf
,
Jan Reineke
Security Analysis of Cache Replacement Policies.
POST
(2017)
Sergiu Bursuc
,
Christian Johansen
,
Shiwei Xu
Automated Verification of Dynamic Root of Trust Protocols.
POST
(2017)
Martin Pettai
,
Peeter Laud
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows.
POST
(2017)
Daniel Hedin
,
Alexander Sjösten
,
Frank Piessens
,
Andrei Sabelfeld
A Principled Approach to Tracking Information Flow in the Presence of Libraries.
POST
(2017)
Mário S. Alvim
,
Piotr Mardziel
,
Michael W. Hicks
Quantifying Vulnerability of Secret Generation Using Hyper-Distributions.
POST
(2017)
Zaruhi Aslanyan
,
Flemming Nielson
Model Checking Exact Cost for Attack Scenarios.
POST
(2017)
Ridha Khédri
,
Owain Jones
,
Mohammed Alabbad
Defense in Depth Formulation and Usage in Dynamic Access Control.
POST
(2017)
volume 10204, 2017
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings
POST
10204 (2017)
2016
Joachim Breitner
,
Jürgen Graf
,
Martin Hecker
,
Martin Mohr
,
Gregor Snelting
On Improvements of Low-Deterministic Security.
POST
(2016)
Kevin Falzon
,
Eric Bodden
Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.
POST
(2016)
Sebastian Mödersheim
,
Alessandro Bruni
AIF-ω: Set-Based Protocol Abstraction with Countable Families.
POST
(2016)
Jürgen Graf
,
Martin Hecker
,
Martin Mohr
,
Gregor Snelting
Tool Demonstration: JOANA.
POST
(2016)
Iulia Bolosteanu
,
Deepak Garg
Asymmetric Secure Multi-execution with Declassification.
POST
(2016)
Jianxiong Shao
,
Yu Qin
,
Dengguo Feng
Computational Soundness Results for Stateful Applied π Calculus.
POST
(2016)
Holger Hermanns
,
Julia Krämer
,
Jan Krcál
,
Mariëlle Stoelinga
The Value of Attack-Defence Diagrams.
POST
(2016)
Véronique Cortier
,
Antoine Dallon
,
Stéphanie Delaune
Bounding the Number of Agents, for Equivalence Too.
POST
(2016)
volume 9635, 2016
Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings
POST
9635 (2016)