Accepted Papers

  1. Guided design of attack trees: a system-based approach
    Maxime Audinot, Sophie Pinchinat and Barbara Kordy
  2. Formal Security Proof of CMAC and its Variants
    Cécile Baritel-Ruet, François Dupressoir, Pierre-Alain Fouque and Benjamin Grégoire
  3. Secure compilation of side-channel countermeasures: the case of cryptographic “constant-time”
    Gilles Barthe, Benjamin Grégoire and Vincent Laporte
  4. Alethea: A Provably Secure Random Sample Voting Protocol
    David Basin, Sasa Radomirovic and Lara Schmid
  5. Composition Theorems for CryptoVerif and Application to TLS 1.3
    Bruno Blanchet
  6. The Complexity of Monitoring Hyperproperties
    Borzoo Bonakdarpour and Bernd Finkbeiner
  7. An extensive formal analysis of multi-factor authentication protocols
    Charlie Jacomme and Steve Kremer
  8. A Permission-Dependent Type System for Secure Information Flow Analysis
    Hongxu Chen, Alwen Tiu, Zhiwu Xu and Yang Liu
  9. A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif.
    Vincent Cheval, Veronique Cortier and Mathieu Turuani
  10. Machine-checked proofs for electronic voting: privacy and verifiability for Belenios
    Véronique Cortier, Constantin Cătălin Dragan, François Dupressoir and Bogdan Warinschi
  11. Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
    Jannik Dreier, Lucca Hirschi, Sasa Radomirovic and Ralf Sasse
  12. A Cryptographic Look at Multi-Party Channels
    Patrick Thomas Eugster, Giorgia Azzurra Marson and Bertram Poettering
  13. Backdoored Hash Functions: Immunizing HMAC and HKDF
    Marc Fischlin, Christian Janson and Sogol Mazaheri
  14. Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
    Marc Fischlin and Sogol Mazaheri
  15. Computer-aided proofs for multiparty computation with active security
    Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, and Pierre-Yves Strub
  16. A Typing Result for Stateful Protocols
    Andreas Viktor Hess and Sebastian A. Mödersheim
  17. KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine
    Everett Hildenbrandt, Manasvi Saxena, Nishant Rodrigues, Xiaoran Zhu, Philip Daian, Dwight Guth, Brandon Moore, Daejun Park, Yi Zhang, Andrei Stefanescu, Grigore Rosu
  18. Symbolic security of garbled circuits
    Baiyu Li and Daniele Micciancio
  19. Symbolic Side-Channel Analysis for Probabilistic Programs
    Pasquale Malacaria, Mhr Khouzani, Corina Pasareanu, Quoc-Sang Phan and Kasper Luckow
  20. Knowledge-based Security of Dynamic Secrets for Reactive Programs
    McKenna McCall, Hengruo Zhang and Limin Jia
  21. Inductive Invariants for Noninterference in Multi-agent Workflows
    Christian Müller, Helmut Seidl and Eugen Zalinescu
  22. Assuming you know: epistemic semantics of relational annotations for expressive flow policies
    Andrey Chudnov and David Naumann
  23. Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks
    José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira, Bernardo Portela
  24. Types for Information Flow Control: Labeling Granularity and Semantic Models
    Vineet Rajani and Deepak Garg
  25. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting
    Samuel Yeom, Irene Giacomelli, Matt Fredrikson, Somesh Jha