Authors | Title | Paper | Talk |
---|
Charlie Jacomme and Steve Kremer | An extensive formal analysis of multi-factor authentication protocols | | Jul 09 11:00 |
Bruno Blanchet | Composition Theorems for CryptoVerif and Application to TLS 1.3 | | Jul 09 11:30 |
Patrick Thomas Eugster, Giorgia Azzurra Marson and Bertram Poettering | A Cryptographic Look at Multi-Party Channels | | Jul 09 12:00 |
Ilia Lebedev, Kyle Hogan and Srini Devadas | Secure Boot and Remote Attestation in the Sanctum Processor | | |
Maxime Audinot, Sophie Pinchinat and Barbara Kordy | Guided design of attack trees: a system-based approach | | Jul 09 15:00 |
Marc Fischlin and Sogol Mazaheri | Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks | | Jul 10 09:00 |
Cécile Baritel-Ruet, François Dupressoir, Pierre-Alain Fouque and Benjamin Grégoire | Formal Security Proof of CMAC and its Variants | | Jul 10 09:30 |
Marc Fischlin, Christian Janson and Sogol Mazaheri | Backdoored Hash Functions: Immunizing HMAC and HKDF | | Jul 10 10:00 |
Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters and Pierre-Yves Strub | Computer-aided proofs for multiparty computation with active security | | Jul 10 11:00 |
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira and Bernardo Portela | Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks | | Jul 10 11:30 |
Baiyu Li and Daniele Micciancio | Symbolic security of garbled circuits | | Jul 10 12:00 |
Borzoo Bonakdarpour and Bernd Finkbeiner | The Complexity of Monitoring Hyperproperties | | Jul 10 14:00 |
Mckenna McCall, Hengruo Zhang and Limin Jia | Knowledge-based Security of Dynamic Secrets for Reactive Programs | | Jul 10 14:30 |
Andrey Chudnov and David Naumann | Assuming you know: epistemic semantics of relational annotations for expressive flow policies | | Jul 10 15:00 |
Everett Hildenbrandt, Manasvi Saxena, Nishant Rodrigues, Xiaoran Zhu, Philip Daian, Dwight Guth, Brandon Moore, Daejun Park, Yi Zhang, Andrei Stefanescu and Grigore Rosu | KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine | | Jul 10 16:00 |
Hongxu Chen, Alwen Tiu, Zhiwu Xu and Yang Liu | A Permission-Dependent Type System for Secure Information Flow Analysis | | Jul 11 09:00 |
Vineet Rajani and Deepak Garg | Types for Information Flow Control: Labeling Granularity and Semantic Models | | Jul 11 09:30 |
Christian Müller, Helmut Seidl and Eugen Zalinescu | Inductive Invariants for Noninterference in Multi-agent Workflows | | Jul 11 10:00 |
Mario S. Alvim, Kostas Chatzikokolakis, Catuscia Palamidessi and Anna Pazii | Local Differential Privacy on Metric Spaces: optimizing the trade-off with utility | | |
Samuel Yeom, Irene Giacomelli, Matt Fredrikson and Somesh Jha | Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting | | Jul 11 12:00 |
David Basin, Sasa Radomirovic and Lara Schmid | Alethea: A Provably Secure Random Sample Voting Protocol | | Jul 11 16:00 |
Véronique Cortier, Constantin Cătălin Dragan, François Dupressoir and Bogdan Warinschi | Machine-checked proofs for electronic voting: privacy and verifiability for Belenios | | Jul 11 16:30 |
Pasquale Malacaria, Mhr Khouzani, Corina Pasareanu, Quoc-Sang Phan and Kasper Luckow | Symbolic Side-Channel Analysis for Probabilistic Programs | | Jul 12 09:30 |
Gilles Barthe, Benjamin Grégoire and Vincent Laporte | Secure compilation of side-channel countermeasures: the case of cryptographic “constant-time” | | Jul 12 10:00 |
Vincent Cheval, Veronique Cortier and Mathieu Turuani | A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif. | | Jul 12 11:00 |
Jannik Dreier, Lucca Hirschi, Sasa Radomirovic and Ralf Sasse | Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR | | Jul 12 11:30 |
Andreas Viktor Hess and Sebastian A. Mödersheim | A Typing Result for Stateful Protocols | | Jul 12 12:00 |