POST 2017 accepted papers

Pablo Canones, Boris Köpf and Jan Reineke. Security Analysis of Cache Replacement Policies
Martin Pettai and Peeter Laud. Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows
Zaruhi Aslanyan and Flemming Nielson. Model Checking Exact Cost for Attack Scenarios
Patrick Ah-Fat and Michael Huth. Secure Multi-Party Computation: Information Flow of Outputs and Game Theory
Mário S. Alvim, Piotr Mardziel and Michael Hicks. Quantifying vulnerability of secret generation using hyper-distributions
Willard Rafnsson, Limin Jia and Lujo Bauer. Timing-Sensitive Noninterference through Composition
Arthur Blot, Masaki Yamamoto and Tachio Terauchi. Compositional Synthesis of Leakage Resilient Programs
Ridha Khedri, Owain Jones and Mohammed Alabbad. Defense in Depth Formulation and Usage in Dynamic Access Control
Jannik Dreier, Charles Duménil, Ralf Sasse and Steve Kremer. Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
Kushal Babel, Vincent Cheval and Steve Kremer. On communication models when verifying equivalence properties
Marcos Cramer and Giovanni Casini. Postulates for Revocation Schemes
Daniel Hedin, Alexander Sjösten, Frank Piessens and Andrei Sabelfeld. A Principled Approach to Tracking Information Flow in the Presence of Libraries
Sergiu Bursuc, Christian Johansen and Shiwei Xu. Automated verification of dynamic root of trust protocols
Nicola Atzei, Massimo Bartoletti and Tiziana Cimoli. A survey of attacks on Ethereum smart contracts (Systematization of knowledge paper)

Who's online

We have 141 guests and no members online

Site Hosted by