Guided design of attack trees: a system-based approach Maxime Audinot, Sophie Pinchinat and Barbara Kordy
Formal Security Proof of CMAC and its Variants Cécile Baritel-Ruet, François Dupressoir, Pierre-Alain Fouque and Benjamin Grégoire
Secure compilation of side-channel countermeasures: the case of cryptographic “constant-time” Gilles Barthe, Benjamin Grégoire and Vincent Laporte
Alethea: A Provably Secure Random Sample Voting Protocol David Basin, Sasa Radomirovic and Lara Schmid
Composition Theorems for CryptoVerif and Application to TLS 1.3 Bruno Blanchet
The Complexity of Monitoring Hyperproperties Borzoo Bonakdarpour and Bernd Finkbeiner
An extensive formal analysis of multi-factor authentication protocols Charlie Jacomme and Steve Kremer
A Permission-Dependent Type System for Secure Information Flow Analysis Hongxu Chen, Alwen Tiu, Zhiwu Xu and Yang Liu
A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif. Vincent Cheval, Veronique Cortier and Mathieu Turuani
Machine-checked proofs for electronic voting: privacy and verifiability for Belenios Véronique Cortier, Constantin Cătălin Dragan, François Dupressoir and Bogdan Warinschi
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR Jannik Dreier, Lucca Hirschi, Sasa Radomirovic and Ralf Sasse
A Cryptographic Look at Multi-Party Channels Patrick Thomas Eugster, Giorgia Azzurra Marson and Bertram Poettering
Backdoored Hash Functions: Immunizing HMAC and HKDF Marc Fischlin, Christian Janson and Sogol Mazaheri
Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks Marc Fischlin and Sogol Mazaheri
Computer-aided proofs for multiparty computation with active security Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, and Pierre-Yves Strub
A Typing Result for Stateful Protocols Andreas Viktor Hess and Sebastian A. Mödersheim
KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine
Everett Hildenbrandt, Manasvi Saxena, Nishant Rodrigues, Xiaoran Zhu,
Philip Daian, Dwight Guth, Brandon Moore, Daejun Park, Yi Zhang,
Andrei Stefanescu, Grigore Rosu
Symbolic security of garbled circuits Baiyu Li and Daniele Micciancio
Symbolic Side-Channel Analysis for Probabilistic Programs Pasquale Malacaria, Mhr Khouzani, Corina Pasareanu, Quoc-Sang Phan and Kasper Luckow
Knowledge-based Security of Dynamic Secrets for Reactive Programs McKenna McCall, Hengruo Zhang and Limin Jia
Inductive Invariants for Noninterference in Multi-agent Workflows Christian Müller, Helmut Seidl and Eugen Zalinescu
Assuming you know: epistemic semantics of relational annotations for expressive flow policies Andrey Chudnov and David Naumann
Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela
Types for Information Flow Control: Labeling Granularity and Semantic Models Vineet Rajani and Deepak Garg
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting Samuel Yeom, Irene Giacomelli, Matt Fredrikson, Somesh Jha