Santa Cruz Boardwalk

Program Schedule

Note that the following program schedule is tentative.

CSF 2025: Workshop Day Monday
TBA
FCS 2025

19:30
Reception (cash bar) at the conference hotel
CSF 2025: Day 1 Tuesday
09:00
Opening - Opening Remarks

09:25
Keynote 1 - Sabine Oechsner

10:20
Coffee Tue AM - Coffee Break

10:50
Session 1 - Formal Methods and Cryptography
  1. Cryptographically Assured Information Flow: Assured Remote Execution. Joshua Guttman, Scott Dyer, Christian Femrite, Julian Lanson, Moses Liskov (The MITRE Corporation)
  2. Secrecy by typing in the computational model. Stéphanie Delaune, Clément Hérouard, Joseph Lallemand (Université de Rennes, IRISA, CNRS)
  3. Strands Rocq: Why is a Security Protocol Correct, Mechanically?. Matteo Busi, Riccardo Focardi, Flaminia Luccio (University Ca' Foscari of Venice, Italy)
  4. AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework. Lorenzo Martinico (University of Edinburgh); Markulf Kohlweiss (University of Edinburgh, IOG)

12:30
Lunch Tue - Lunch

13:30
Session 2 - Privacy and Quantitative Information Flow
  1. Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting. Andreas Athanasiou, Catuscia Palamidessi (INRIA, École polytechnique); Kostas Chatzikokolakis (University of Athens)
  2. Actual Knowledge Gain as Privacy Loss in Local Privacy Accounting. Mingen Pan (None)
  3. Improving Count-Mean Sketch as the Leading Locally Differentially Private Frequency Estimator for Large Dictionaries. Mingen Pan (None)
  4. Session Types for the Concurrent Composition of Interactive Differential Privacy. Victor Sannier, Patrick Baillot (Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, F-59 000 Lille, France); Marco Gaboardi (Department of Computer Science, Boston University, USA)

15:10
Coffee Tue PM - Coffee Break

15:40
Session 3 - Cryptographic Constructions
  1. Privacy-preserving server-supported decryption. Alisa Pankova, Peeter Laud (Cybernetica AS); Jelizaveta Vakarjuk (Cybernetica AS and Tallinn University of Technology)
  2. Scalable Private Signaling. Sashidhar Jakkamsetti (Bosch Research); Zeyu Liu, Varun Madathil (Yale University)
  3. Foundations of Multi-Designated Verifier Signature: Comprehensive Formalization and New Constructions in Subset Simulation. Keitaro Hashimoto (AIST); Kyosuke Yamashita (Osaka University and AIST); Keisuke Hara (AIST and Yokohama National University)

CSF 2025: Day 2 Wednesday
09:00
Session 4 - Attack Models
  1. Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents. Léonard Brice, Jean-François Raskin, Mathieu Sassolas (Université Libre de Bruxelles); Guillaume Scerri (LMF, Université Paris-Saclay, ENS Paris Saclay & CNRS); Marie Van Den Bogaard (Université Gustave Eiffel, CNRS, LIGM)
  2. On DoS Vulnerability of Regular Expressions, with and without Backreferences. Tachio Terauchi (Waseda University)
  3. Rethinking Attack Path Management: A New Metric for Choke Points in Attack Graphs. Yumeng Zhang (The University of Adelaide); Max Ward (University of Western Australia); Hung Nguyen (The University of Adelaide)

10:15
Coffee Wed AM - Coffee Break

10:45
Session 5 - IoT and Cyber-Physical Security
  1. Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers. Rabiah Alnashwan (University of Sheffield); Benjamin Dowling (King's College London); Bhagya Wimalasiri (University of Sheffield)
  2. Formal Robustness for Cyber-Physical Systems under Timed Attacks. Jian Xiang (UNC Charlotte); Tini Simone, Lanotte Ruggero (University of Insubria); Massimo Merro (University of Verona)

11:35
Keynote 2 - Andrei Sabelfeld

12:30
Lunch Wed - Lunch

13:30
5 Minute Talks - 5 Minute Talks

14:15
Coffee Wed PM - Coffee Break


14:45
Social Afternoon (click here for Santa Cruz attractions)


19:00
Banquet (Paradox Hotel)

CSF 2025: Day 3 Thursday
09:30
Session 6 - Information Flow
  1. Accountability, Involvement, and Mediation for Information Flow. Elisavet Kozyri (UiT The Arctic University of Norway); Fred B. Schneider (Cornell University); Stephen Chong (Harvard University)
  2. A graded modal approach to semantic declassification. Vineet Rajani, Alex Coleman, Hrutvik Kanabar (University of Kent)
  3. Securing P4 Programs by Information Flow Control. Anoud Alshnakat, Amir M. Ahmadian, Musard Balliu, Roberto Guanciale, Mads Dam (KTH Royal Institute of Technology)

10:45
Coffee Thu AM - Coffee Break

11:15
Session 7 - Blockchains and Cryptocurrency
  1. Atomic Transfer Graphs: Secure-by-design Protocols for Heterogeneous Blockchain Ecosystems. Stephan Dübler, Federico Badaloni (Max Planck Institute for Security and Privacy); Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research, Max Planck Institute for Security and Privacy); Clara Schneidewind (Max Planck Institute for Security and Privacy)
  2. BitMLx: Secure Cross-chain Smart Contracts For Bitcoin-style Cryptocurrencies. Federico Badaloni, Sebastian Holler (MPI-SP); Chrysoula Oikonomou (Aristotle University of Thessaloniki); Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research, MPI-SP); Clara Schneidewind (MPI-SP)
  3. VRaaS: Verifiable Randomness as a Service on Blockchains. Jacob Gorman (Supra Research); Lucjan Hanzlik (CISPA Helmholtz Center for Information Security); Aniket Kate (Purdue University / Supra Research); Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar (Supra Research); Sri AravindaKrishnan Thyagarajan (University of Sydney)

12:30
Lunch Thu - Lunch

13:30
Session 8 - Protocol Verification
  1. One For All: Formally Verifying Protocols which use Aggregate Signatures. Xenia Hofmeier, Andrea Raguso, Ralf Sasse (ETH Zurich); Dennis Jackson (Mozilla); David Basin (ETH Zurich)
  2. Nominal State-Separating Proofs. Markus Krabbe Larsen, Carsten Schürmann (IT University of Copenhagen)
  3. Symbolic Parallel Composition for Multi-language Protocol Verification. Faezeh Nasrabadi (CISPA Helmholtz Center for Information Security and Saarland University); Robert Künnemann (CISPA Helmholtz Center for Information Security); Hamed Nemati (KTH Royal Institute of Technology)
  4. Formal Analysis of Random Nonce Misuses in Cryptographic Protocols. Tristan Claverie (ANSSI, IRISA, INSA Rennes); Stéphanie Delaune (CNRS); Gildas Avoine (INSA Rennes)

15:10
Coffee Thu PM - Coffee Break

15:40
Session 9 - Machine Learning and Privacy
  1. A Novel Approach to Differential Privacy with Alpha Divergence. Yifeng Liu, Zehua Wang (The University of British Columbia)
  2. Unveiling the (in)Security of Threshold FHE-based Federated Learning: The Practical Impact of Recent CPA$^D$ Attacks. Adda Akram Bendoukha (Samovar, Télécom SudParis, Institut Polytechnique de Paris); Renaud Sirdey, Aymen Boudguiga (Université Paris-Saclay, CEA LIST); Nesrine Kaaniche (Samovar, Telecom SudParis, Institut Polytechnique de Paris)

16:30
Business Meeting - CSF Business Meeting - Open to all attendees

CSF 2025: Day 4 Friday
09:30
Session 10 - Cryptographic Verification
  1. Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application. Rafieh Mosaheb (University of Luxembourg); Thomas Haines (Australian National University); Johannes Müller (CNRS/LORIA); Reetika (Indian Institute of Space Science and Technology, Thiruvananthapuram)
  2. Verifiable E-Voting with a Trustless Bulletin Board. Daniel Rausch, Nicolas Huber, Ralf Küsters (University of Stuttgart)
  3. Dynamic Group Signatures with Verifier Local Revocation. Callum London, Constantin Catalin Dragan, Daniel Gardham (University of Surrey)

10:45
Coffee Fri AM - Coffee Break

11:15
Session 11 - Automated Verification
  1. Automated Analysis and Synthesis of Message Authentication Codes. Julian Thomas (Friedrich-Alexander-Universität Erlangen-Nürnberg); Dominique Schröder (TU Wien); Stefan Milius, Dominik Paulus, Lutz Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg)
  2. SMT-based Automation for Overwhelming Truth. David Baelde, Stéphanie Delaune, Stanislas Riou (Univ Rennes, CNRS, IRISA)
  3. Automatic verification of Finite Variant Property beyond convergent equational theories. Vincent Cheval (Department of Computer Science, University of Oxford); Caroline Fontaine (Université Paris-Saclay, CNRS, ENS Paris-Saclay, Laboratoire Méthodes Formelles)

12:30
Lunch Fri - Lunch

13:30
Session 12 - Information Flow
  1. Nonmalleable Progress Leakage. Ethan Cecchetti (University of Wisconsin-Madison)
  2. Gradual Sensitivity Typing. Damian Arquez, Matías Toro, Éric Tanter (University of Chile)
  3. FSLH: Flexible Mechanized Speculative Load Hardening. Jonathan Baumann (MPI-SP and ENS Paris-Saclay); Roberto Blanco (MPI-SP and TU/e); Léon Ducruet (MPI-SP and ENS Lyon); Sebastian Harwig (MPI-SP and Ruhr University Bochum); Catalin Hritcu (MPI-SP)
  4. An Extension of the Adversarial Threat Model in Quantitative Information Flow. Mohammad Amin Zarrabian (Australian National University); Parastoo Sadeghi (University of New South Wales, Canberra)

15:10
Closing - Closing remarks