Li Zhou (Dept. of Computer Science and Technology, Tsinghua University, China; CQSI, FEIT, University of Technology Sydney, Australia), Mingsheng Ying (Dept. of Computer Science and Technology, Tsinghua University, China; CQSI, FEIT, University of Technology Sydney, Australia; SKLCS, Institute of Software, Chinese Academy of Sciences, China)
Secure compilation and hyperproperty preservation
Marco Patrignani (MPI-SWS), Deepak Garg (MPI-SWS)
Towards a Flow- and Path-Sensitive Information Flow Analysis
Peixuan Li (Penn State University), Danfeng Zhang (Penn State University)
Proving Flow Security of Sequential Logic via Automatically-Synthesized Relational Invariants
Hyoukjun Kwon (Georgia Institute of Technology), William R. Harris (Georgia Institute of Technology), Hadi Esmaeilzadeh (Georgia Institute of Technology)
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols
Bruno Blanchet (Inria Paris)
SAT-Equiv: an efficient tool for equivalence properties.
Tight Bounds on Information Leakage from Repeated Independent Runs
David Smith (Princeton University), Geoffrey Smith (Florida International University)
Symbolic verification of privacy-type properties for security protocols with XOR
David Baelde (LSV, CNRS & ENS Paris-Saclay, Université Paris-Saclay, Inria Paris), Stéphanie Delaune (IRISA, CNRS), Ivan Gazeau (LORIA, INRIA Nancy, Grand-Est), Steve Kremer (LORIA, INRIA Nancy, Grand-Est)
Formal verification of protocols based on short authenticated strings
Stéphanie Delaune (CNRS/IRISA), Steve Kremer (LORIA, CNRS & Inria Nancy & Université de Lorraine Ludovic Robin (LORIA, CNRS & Inria Nancy & Université de Lorraine)
Local UC-Secure Public-Key Encryption
Jan Camenisch (IBM Research - Zurich), Anja Lehmann (IBM Research - Zurich), Gregory Neven (IBM Research - Zurich), Kai Samelin (IBM Research - Zurich & TU Darmstadt)
Secure composition of PKIs with public key protocols
Vincent Cheval (INRIA, LORIA, France), Véronique Cortier (CNRS, LORIA, France), Bogdan Warinschi (University of Bristol, United Kingdom)
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange
Alexandra Boldyreva (Georgia Institute of Technology), Shan Chen (Georgia Institute of Technology), Pierre-Alain Dupont (DGA, CNRS, Inria, ENS/PSL Research University), David Pointcheval (CNRS, Inria, ENS/PSL Research University)
PrivatePool: Privacy-Preserving Ridesharing
Per Hallgren (Chalmers University of Technology), Claudio Orlandi (Aarhus University), Andrei Sabelfeld (Chalmers University of Technology)
The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines
Daniel Fett (University of Stuttgart), Ralf Küsters (University of Stuttgart), Guido Schmitz (University of Stuttgart)
Reconciling Privacy and Utility in Continuous-Time Diffusion Networks
Michael Backes (CISPA, Saarland University), Manuel Gomez-Rodriguez (MPI-SWS), Praveen Manoharan (CISPA, Saarland University), Bartlomiej Surma (CISPA, Saarland University)
Types for Location and Data Security in Cloud Environments
Ivan Gazeau (LORIA, INRIA Nancy, Grand-Est), Tom Chothia (University of Birmingham), Dominic Duggan (Stevens Institute of Technology, Hoboken, NJ)
Mechanizing the Proof of Adaptive, Information-theoretic Security of Cryptographic Protocols in the Random Oracle Model
Alley Stoughton (Boston University), Mayank Varia (Boston University)
Securing Databases from Probabilistic Inference
Marco Guarnieri (ETH Zurich), Srdjan Marinovic (The Wireless Registry, Inc.), David Basin (ETH Zurich)
A Formal Approach to Cyber-Physical Attacks
Ruggero Lanotte (Universita' Degli Studi dell'Insubria), Massimo Merro (University of Verona), Riccardo Muradore (University of Verona), Luca Vigano' (King's College London)
Synthesis of Adaptive Side-Channel Attacks
Quoc-Sang Phan (Carnegie Mellon University), Lucas Bang (University of California, Santa Barbara), Corina S. Pasareanu (Carnegie Mellon University/ NASA Ames), Pasquale Malacaria (Queen Mary University of London), Tevfik Bultan (University of California, Santa Barbara)
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
Kevin Milner (University of Oxford), Cas Cremers (University of Oxford), Jiangshan Yu (University of Luxembourg), Mark Ryan (University of Birmingham)
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications