Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR David Baelde, Stéphanie Delaune, Ivan Gazeau, Steve Kremer |
Symbolic Verification of Privacy-Type Properties for Security Protocols with XOR Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications Kevin Milner, Cas Cremers, Jiangshan Yu, Mark Ryan |
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Securing Concurrent Lazy Programs Against Information Leakage Marco Vassena, Joachim Breitner, Alejandro Russo |
Securing Concurrent Lazy Programs Against Information Leakage Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
UC-Secure Non-interactive Public-Key Encryption Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin |
UC-Secure Non-interactive Public-Key Encryption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure Compilation and Hyperproperty Preservation Marco Patrignani, Deepak Garg |
Secure Compilation and Hyperproperty Preservation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Universally Composable Treatment of Network Time Ran Canetti, Kyle Hogan, Aanchal Malhotra, Mayank Varia |
A Universally Composable Treatment of Network Time Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards a Flow- and Path-Sensitive Information Flow Analysis Peixuan Li, Danfeng Zhang |
Towards a Flow- and Path-Sensitive Information Flow Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Verified Translation Validation of Static Analyses Gilles Barthe, Sandrine Blazy, Vincent Laporte, David Pichardie, Alix Trieu |
Verified Translation Validation of Static Analyses Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks Michael Backes, Manuel Gomez-Rodriguez, Praveen Manoharan, Bartlomiej Surma |
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Leakage-Minimal Design: Universality, Limitations, and Applications M. H. R. Khouzani, Pasquale Malacaria |
Leakage-Minimal Design: Universality, Limitations, and Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Formal Computational Unlinkability Proofs of RFID Protocols Hubert Comon, Adrien Koutsos |
Formal Computational Unlinkability Proofs of RFID Protocols Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines Daniel Fett, Ralf Küsters, Guido Schmitz |
The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Formal Verification of Protocols Based on Short Authenticated Strings Stéphanie Delaune, Steve Kremer, Ludovic Robin |
Formal Verification of Protocols Based on Short Authenticated Strings Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Tight Bounds on Information Leakage from Repeated Independent Runs David M. Smith, Geoffrey Smith |
Tight Bounds on Information Leakage from Repeated Independent Runs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rethinking Large-Scale Consensus Rafael Pass, Elaine Shi |
Rethinking Large-Scale Consensus Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Run-Time Attack Detection in Cryptographic APIs Riccardo Focardi, Marco Squarcina |
Run-Time Attack Detection in Cryptographic APIs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Types for Location and Data Security in Cloud Environments Ivan Gazeau, Tom Chothia, Dominic Duggan |
Types for Location and Data Security in Cloud Environments Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange Alexandra Boldyreva, Shan Chen, Pierre-Alain Dupont, David Pointcheval |
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, David Brumley |
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure Composition of PKIs with Public Key Protocols Vincent Cheval, Véronique Cortier, Bogdan Warinschi |
Secure Composition of PKIs with Public Key Protocols Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Formal Approach to Cyber-Physical Attacks Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò |
A Formal Approach to Cyber-Physical Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Differential Privacy in Quantum Computation Li Zhou, Mingsheng Ying |
Differential Privacy in Quantum Computation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Alley Stoughton, Mayank Varia |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL Andreas Viktor Hess, Sebastian Mödersheim |
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
SAT-Equiv: An Efficient Tool for Equivalence Properties Véronique Cortier, Antoine Dallon, Stéphanie Delaune |
SAT-Equiv: An Efficient Tool for Equivalence Properties Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
PrivatePool: Privacy-Preserving Ridesharing Per A. Hallgren, Claudio Orlandi, Andrei Sabelfeld |
PrivatePool: Privacy-Preserving Ridesharing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols Bruno Blanchet |
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Synthesis of Adaptive Side-Channel Attacks Quoc-Sang Phan, Lucas Bang, Corina S. Pasareanu, Pasquale Malacaria, Tevfik Bultan |
Synthesis of Adaptive Side-Channel Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications Stefano Calzavara, Ilya Grishchenko, Adrien Koutsos, Matteo Maffei |
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants Hyoukjun Kwon, William Harris, Hadi Esmaeilzadeh |
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Protection of Private Information in Machine Learning Systems: Two Recent Approches Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang |
On the Protection of Private Information in Machine Learning Systems: Two Recent Approches Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Emanuele D'Osualdo, Luke Ong, Alwen Tiu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Securing Databases from Probabilistic Inference Marco Guarnieri, Srdjan Marinovic, David A. Basin |
Securing Databases from Probabilistic Inference Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Ilya Mironov |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|