Cryptographically Assured Information Flow: Assured Remote Execution
Joshua Guttman, Scott Dyer, Christian Femrite, Julian Lanson, Moses Liskov (The MITRE Corporation)
Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting
Andreas Athanasiou, Catuscia Palamidessi (INRIA, École polytechnique); Kostas Chatzikokolakis (University of Athens)
Secrecy by typing in the computational model
Stéphanie Delaune, Clément Hérouard, Joseph Lallemand (Université de Rennes, IRISA, CNRS)
Automatic verification of Finite Variant Property beyond convergent equational theories
Vincent Cheval (Department of Computer Science, University of Oxford); Caroline Fontaine (Université Paris-Saclay, CNRS, ENS Paris-Saclay, Laboratoire Méthodes Formelles)
Privacy-preserving server-supported decryption
Alisa Pankova, Peeter Laud (Cybernetica AS); Jelizaveta Vakarjuk (Cybernetica AS and Tallinn University of Technology)
Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents
Léonard Brice, Jean-François Raskin, Mathieu Sassolas (Université Libre de Bruxelles); Guillaume Scerri (LMF, Université Paris-Saclay, ENS Paris Saclay & CNRS); Marie Van Den Bogaard (Université Gustave Eiffel, CNRS, LIGM)
Accountability, Involvement, and Mediation for Information Flow
Elisavet Kozyri (UiT The Arctic University of Norway); Fred B. Schneider (Cornell University); Stephen Chong (Harvard University)
Actual Knowledge Gain as Privacy Loss in Local Privacy Accounting
Mingen Pan (None)
Atomic Transfer Graphs: Secure-by-design Protocols for Heterogeneous Blockchain Ecosystems
Stephan Dübler, Federico Badaloni (Max Planck Institute for Security and Privacy); Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research, Max Planck Institute for Security and Privacy); Clara Schneidewind (Max Planck Institute for Security and Privacy)
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers
Rabiah Alnashwan (University of Sheffield); Benjamin Dowling (King's College London); Bhagya Wimalasiri (University of Sheffield)
A Novel Approach to Differential Privacy with Alpha Divergence
Yifeng Liu, Zehua Wang (The University of British Columbia)
Foundations of Multi-Designated Verifier Signature: Comprehensive Formalization and New Constructions in Subset Simulation
Keitaro Hashimoto (AIST); Kyosuke Yamashita (Osaka University and AIST); Keisuke Hara (AIST and Yokohama National University)
Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application
Rafieh Mosaheb (University of Luxembourg); Thomas Haines (Australian National University); Johannes Müller (CNRS/LORIA); Reetika (Indian Institute of Space Science and Technology, Thiruvananthapuram)
Automated Analysis and Synthesis of Message Authentication Codes
Julian Thomas (Friedrich-Alexander-Universität Erlangen-Nürnberg); Dominique Schröder (TU Wien); Stefan Milius, Dominik Paulus, Lutz Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg)
SMT-based Automation for Overwhelming Truth
David Baelde, Stéphanie Delaune, Stanislas Riou (Univ Rennes, CNRS, IRISA)
On DoS Vulnerability of Regular Expressions, with and without Backreferences
Tachio Terauchi (Waseda University)
Rethinking Attack Path Management: A New Metric for Choke Points in Attack Graphs
Yumeng Zhang (The University of Adelaide); Max Ward (University of Western Australia); Hung Nguyen (The University of Adelaide)
Strands Rocq: Why is a Security Protocol Correct, Mechanically?
Matteo Busi, Riccardo Focardi, Flaminia Luccio (University Ca' Foscari of Venice, Italy)
AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework
Lorenzo Martinico (University of Edinburgh); Markulf Kohlweiss (University of Edinburgh, IOG)
Gradual Sensitivity Typing
Damian Arquez, Matías Toro, Éric Tanter (University of Chile)
Session Types for the Concurrent Composition of Interactive Differential Privacy
Victor Sannier, Patrick Baillot (Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, F-59 000 Lille, France); Marco Gaboardi (Department of Computer Science, Boston University, USA)
BitMLx: Secure Cross-chain Smart Contracts For Bitcoin-style Cryptocurrencies
Federico Badaloni, Sebastian Holler (MPI-SP); Chrysoula Oikonomou (Aristotle University of Thessaloniki); Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research, MPI-SP); Clara Schneidewind (MPI-SP)
One For All: Formally Verifying Protocols which use Aggregate Signatures
Xenia Hofmeier, Andrea Raguso, Ralf Sasse (ETH Zurich); Dennis Jackson (Mozilla); David Basin (ETH Zurich)
Nominal State-Separating Proofs
Markus Krabbe Larsen, Carsten Schürmann (IT University of Copenhagen)
Symbolic Parallel Composition for Multi-language Protocol Verification
Faezeh Nasrabadi (CISPA Helmholtz Center for Information Security and Saarland University); Robert Künnemann (CISPA Helmholtz Center for Information Security); Hamed Nemati (KTH Royal Institute of Technology)
Improving Count-Mean Sketch as the Leading Locally Differentially Private Frequency Estimator for Large Dictionaries
Mingen Pan (None)
A graded modal approach to semantic declassification
Vineet Rajani, Alex Coleman, Hrutvik Kanabar (University of Kent)
Verifiable E-Voting with a Trustless Bulletin Board
Daniel Rausch, Nicolas Huber, Ralf Küsters (University of Stuttgart)
Dynamic Group Signatures with Verifier Local Revocation
Callum London, Constantin Catalin Dragan, Daniel Gardham (University of Surrey)
Nonmalleable Progress Leakage
Ethan Cecchetti (University of Wisconsin-Madison)
Securing P4 Programs by Information Flow Control
Anoud Alshnakat, Amir M. Ahmadian, Musard Balliu, Roberto Guanciale, Mads Dam (KTH Royal Institute of Technology)
Formal Robustness for Cyber-Physical Systems under Timed Attacks
Jian Xiang (UNC Charlotte); Tini Simone, Lanotte Ruggero (University of Insubria); Massimo Merro (University of Verona)
An Extension of the Adversarial Threat Model in Quantitative Information Flow
Mohammad Amin Zarrabian (Australian National University); Parastoo Sadeghi (University of New South Wales, Canberra)
VRaaS: Verifiable Randomness as a Service on Blockchains
Jacob Gorman (Supra Research); Lucjan Hanzlik (CISPA Helmholtz Center for Information Security); Aniket Kate (Purdue University / Supra Research); Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar (Supra Research); Sri AravindaKrishnan Thyagarajan (University of Sydney)
Unveiling the (in)Security of Threshold FHE-based Federated Learning: The Practical Impact of Recent CPA$^D$ Attacks
Adda Akram Bendoukha (Samovar, Télécom SudParis, Institut Polytechnique de Paris); Renaud Sirdey, Aymen Boudguiga (Université Paris-Saclay, CEA LIST); Nesrine Kaaniche (Samovar, Telecom SudParis, Institut Polytechnique de Paris)