CSF 2025: Workshop Day |
Monday |
TBA
|
FCS 2025
|
19:30
|
Reception (cash bar) at the conference hotel
|
CSF 2025: Day 1 |
Tuesday |
09:00
|
Opening - Opening Remarks
|
09:25
|
Keynote 1 - Sabine Oechsner
|
10:20
|
Coffee Tue AM - Coffee Break
|
10:50
|
Session 1 - Formal Methods and Cryptography
-
Cryptographically Assured Information Flow: Assured Remote Execution.
Joshua Guttman, Scott Dyer, Christian Femrite, Julian Lanson, Moses Liskov (The MITRE Corporation)
-
Secrecy by typing in the computational model.
Stéphanie Delaune, Clément Hérouard, Joseph Lallemand (Université de Rennes, IRISA, CNRS)
-
Strands Rocq: Why is a Security Protocol Correct, Mechanically?.
Matteo Busi, Riccardo Focardi, Flaminia Luccio (University Ca' Foscari of Venice, Italy)
-
AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework.
Lorenzo Martinico (University of Edinburgh); Markulf Kohlweiss (University of Edinburgh, IOG)
|
12:30
|
Lunch Tue - Lunch
|
13:30
|
Session 2 - Privacy and Quantitative Information Flow
-
Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting.
Andreas Athanasiou, Catuscia Palamidessi (INRIA, École polytechnique); Kostas Chatzikokolakis (University of Athens)
-
Actual Knowledge Gain as Privacy Loss in Local Privacy Accounting.
Mingen Pan (None)
-
Improving Count-Mean Sketch as the Leading Locally Differentially Private Frequency Estimator for Large Dictionaries.
Mingen Pan (None)
-
Session Types for the Concurrent Composition of Interactive Differential Privacy.
Victor Sannier, Patrick Baillot (Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, F-59 000 Lille, France); Marco Gaboardi (Department of Computer Science, Boston University, USA)
|
15:10
|
Coffee Tue PM - Coffee Break
|
15:40
|
Session 3 - Cryptographic Constructions
-
Privacy-preserving server-supported decryption.
Alisa Pankova, Peeter Laud (Cybernetica AS); Jelizaveta Vakarjuk (Cybernetica AS and Tallinn University of Technology)
-
Scalable Private Signaling.
Sashidhar Jakkamsetti (Bosch Research); Zeyu Liu, Varun Madathil (Yale University)
-
Foundations of Multi-Designated Verifier Signature: Comprehensive Formalization and New Constructions in Subset Simulation.
Keitaro Hashimoto (AIST); Kyosuke Yamashita (Osaka University and AIST); Keisuke Hara (AIST and Yokohama National University)
|
CSF 2025: Day 2 |
Wednesday |
09:00
|
Session 4 - Attack Models
-
Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents.
Léonard Brice, Jean-François Raskin, Mathieu Sassolas (Université Libre de Bruxelles); Guillaume Scerri (LMF, Université Paris-Saclay, ENS Paris Saclay & CNRS); Marie Van Den Bogaard (Université Gustave Eiffel, CNRS, LIGM)
-
On DoS Vulnerability of Regular Expressions, with and without Backreferences.
Tachio Terauchi (Waseda University)
-
Rethinking Attack Path Management: A New Metric for Choke Points in Attack Graphs.
Yumeng Zhang (The University of Adelaide); Max Ward (University of Western Australia); Hung Nguyen (The University of Adelaide)
|
10:15
|
Coffee Wed AM - Coffee Break
|
10:45
|
Session 5 - IoT and Cyber-Physical Security
-
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers.
Rabiah Alnashwan (University of Sheffield); Benjamin Dowling (King's College London); Bhagya Wimalasiri (University of Sheffield)
-
Formal Robustness for Cyber-Physical Systems under Timed Attacks.
Jian Xiang (UNC Charlotte); Tini Simone, Lanotte Ruggero (University of Insubria); Massimo Merro (University of Verona)
|
11:35
|
Keynote 2 - Andrei Sabelfeld
|
12:30
|
Lunch Wed - Lunch
|
13:30
|
5 Minute Talks - 5 Minute Talks
|
14:15
|
Coffee Wed PM - Coffee Break
|
14:45
|
Social Afternoon (click here for Santa Cruz attractions)
|
19:00
|
Banquet (Paradox Hotel)
|
CSF 2025: Day 3 |
Thursday |
09:30
|
Session 6 - Information Flow
-
Accountability, Involvement, and Mediation for Information Flow.
Elisavet Kozyri (UiT The Arctic University of Norway); Fred B. Schneider (Cornell University); Stephen Chong (Harvard University)
-
A graded modal approach to semantic declassification.
Vineet Rajani, Alex Coleman, Hrutvik Kanabar (University of Kent)
-
Securing P4 Programs by Information Flow Control.
Anoud Alshnakat, Amir M. Ahmadian, Musard Balliu, Roberto Guanciale, Mads Dam (KTH Royal Institute of Technology)
|
10:45
|
Coffee Thu AM - Coffee Break
|
11:15
|
Session 7 - Blockchains and Cryptocurrency
-
Atomic Transfer Graphs: Secure-by-design Protocols for Heterogeneous Blockchain Ecosystems.
Stephan Dübler, Federico Badaloni (Max Planck Institute for Security and Privacy); Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research, Max Planck Institute for Security and Privacy); Clara Schneidewind (Max Planck Institute for Security and Privacy)
-
BitMLx: Secure Cross-chain Smart Contracts For Bitcoin-style Cryptocurrencies.
Federico Badaloni, Sebastian Holler (MPI-SP); Chrysoula Oikonomou (Aristotle University of Thessaloniki); Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research, MPI-SP); Clara Schneidewind (MPI-SP)
-
VRaaS: Verifiable Randomness as a Service on Blockchains.
Jacob Gorman (Supra Research); Lucjan Hanzlik (CISPA Helmholtz Center for Information Security); Aniket Kate (Purdue University / Supra Research); Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar (Supra Research); Sri AravindaKrishnan Thyagarajan (University of Sydney)
|
12:30
|
Lunch Thu - Lunch
|
13:30
|
Session 8 - Protocol Verification
-
One For All: Formally Verifying Protocols which use Aggregate Signatures.
Xenia Hofmeier, Andrea Raguso, Ralf Sasse (ETH Zurich); Dennis Jackson (Mozilla); David Basin (ETH Zurich)
-
Nominal State-Separating Proofs.
Markus Krabbe Larsen, Carsten Schürmann (IT University of Copenhagen)
-
Symbolic Parallel Composition for Multi-language Protocol Verification.
Faezeh Nasrabadi (CISPA Helmholtz Center for Information Security and Saarland University); Robert Künnemann (CISPA Helmholtz Center for Information Security); Hamed Nemati (KTH Royal Institute of Technology)
-
Formal Analysis of Random Nonce Misuses in Cryptographic Protocols.
Tristan Claverie (ANSSI, IRISA, INSA Rennes); Stéphanie Delaune (CNRS); Gildas Avoine (INSA Rennes)
|
15:10
|
Coffee Thu PM - Coffee Break
|
15:40
|
Session 9 - Machine Learning and Privacy
-
A Novel Approach to Differential Privacy with Alpha Divergence.
Yifeng Liu, Zehua Wang (The University of British Columbia)
-
Unveiling the (in)Security of Threshold FHE-based Federated Learning: The Practical Impact of Recent CPA$^D$ Attacks.
Adda Akram Bendoukha (Samovar, Télécom SudParis, Institut Polytechnique de Paris); Renaud Sirdey, Aymen Boudguiga (Université Paris-Saclay, CEA LIST); Nesrine Kaaniche (Samovar, Telecom SudParis, Institut Polytechnique de Paris)
|
16:30
|
Business Meeting - CSF Business Meeting - Open to all attendees
|
CSF 2025: Day 4 |
Friday |
09:30
|
Session 10 - Cryptographic Verification
-
Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application.
Rafieh Mosaheb (University of Luxembourg); Thomas Haines (Australian National University); Johannes Müller (CNRS/LORIA); Reetika (Indian Institute of Space Science and Technology, Thiruvananthapuram)
-
Verifiable E-Voting with a Trustless Bulletin Board.
Daniel Rausch, Nicolas Huber, Ralf Küsters (University of Stuttgart)
-
Dynamic Group Signatures with Verifier Local Revocation.
Callum London, Constantin Catalin Dragan, Daniel Gardham (University of Surrey)
|
10:45
|
Coffee Fri AM - Coffee Break
|
11:15
|
Session 11 - Automated Verification
-
Automated Analysis and Synthesis of Message Authentication Codes.
Julian Thomas (Friedrich-Alexander-Universität Erlangen-Nürnberg); Dominique Schröder (TU Wien); Stefan Milius, Dominik Paulus, Lutz Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg)
-
SMT-based Automation for Overwhelming Truth.
David Baelde, Stéphanie Delaune, Stanislas Riou (Univ Rennes, CNRS, IRISA)
-
Automatic verification of Finite Variant Property beyond convergent equational theories.
Vincent Cheval (Department of Computer Science, University of Oxford); Caroline Fontaine (Université Paris-Saclay, CNRS, ENS Paris-Saclay, Laboratoire Méthodes Formelles)
|
12:30
|
Lunch Fri - Lunch
|
13:30
|
Session 12 - Information Flow
-
Nonmalleable Progress Leakage.
Ethan Cecchetti (University of Wisconsin-Madison)
-
Gradual Sensitivity Typing.
Damian Arquez, Matías Toro, Éric Tanter (University of Chile)
-
FSLH: Flexible Mechanized Speculative Load Hardening.
Jonathan Baumann (MPI-SP and ENS Paris-Saclay); Roberto Blanco (MPI-SP and TU/e); Léon Ducruet (MPI-SP and ENS Lyon); Sebastian Harwig (MPI-SP and Ruhr University Bochum); Catalin Hritcu (MPI-SP)
-
An Extension of the Adversarial Threat Model in Quantitative Information Flow.
Mohammad Amin Zarrabian (Australian National University); Parastoo Sadeghi (University of New South Wales, Canberra)
|
15:10
|
Closing - Closing remarks
|