Accepted Papers
The following papers have been accepted to CSF 2023.
-
Zero-Knowledge in EasyCrypt
- Denis Firsov, Dominique Unruh
-
Statement-Oblivious Threshold Witness Encryption
- Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser
-
Preimage Awareness in Linicrypt
- Zahra Javar, Bruce M.Kapron
-
Election Verifiability with ProVerif
- Vincent Cheval, Véronique Cortier, Alexandre Debant
-
Election Verifiability in Receipt-free Voting Protocols
- Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang
-
Proving Unlinkability using Proverif through Desynchronized Bi-Processes
- David Baelde, Alexandre Debant, Stéphanie Delaune
-
Basilic: Resilient Optimal Consensus Protocols With Benign and Deceitful Faults
- Alejandro Ranchal-Pedrosa, Vincent Gramoli
-
Towards a Game-Theoretic Security Analysis of Off-Chain Protocols
- Sophie Rain, Laura Kovacs, Matteo Maffei, Georgia Avarikioti
-
Keep spending: Beyond optimal cyber-security investment
- Yunxiao Zhang, Pasquale Malacaria
-
A State-Separating Proof for Yao's Garbling Scheme
- Chris Brzuska, Sabine Oechsner
-
On the Incoercibility of Digital Signatures
- Ashley Fraser, Elizabeth A. Quaglia, Lydia Garms
-
SoK: Delay-based Cryptography
- Liam Medley, Angelique Faye Loe, Elizabeth A. Quaglia
-
Indistinguishability Beyond Diff-Equivalence in ProVerif
- Vincent Cheval, Itsaka Rakotonirina
-
Subterm-based proof techniques for improving the automation and scope of security protocol analysis
- Cas Cremers, Charlie Jacomme, Philip Lukert
-
Extending the Authentication Hierarchy with One-Way Agreement
- Johannes Wilson, Mikael Asplund, Niklas Johansson
-
On the (De)centralization of FruitChains
- Aikaterini-Panagiota Stouka, Thomas Zacharias
-
HoRStify: Sound Security Analysis of Smart Contracts
- Sebastian Holler, Clara Schneidewind, Sebastian Biewer
-
Cross-chain Swaps with Preferences
- Eric Chan, Marek Chrobak, Mohsen Lesani
-
Smart Contract Synthesis Modulo Hyperproperties
- Norine Coenen, Bernd Finkbeiner, Jana Hofmann, Julia Tillman
-
OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads
- Jeppe Blaabjerg, Aslan Askarov
-
Robust Safety for Move
- Marco Patrignani, Sam Blackshear
-
Towards End-to-End Verified TEEs via Verified Interface Conformance and Certified Compilers
- Farzaneh Derakhshan, Zichao Zhang, Amit Vasudevan, Limin Jia
-
Securing Optimized Code Against Power Side Channels
- Rodothea Myrsini Tsoupidi, Roberto Castañeda Lozano, Elena Troubitsyna, Panagiotis Papadimitratos
-
Formalizing Stack Safety as a Security Property
- Sean Noble Anderson, Roberto Blanco, Leonidas Lampropoulos, Benjamin C. Pierce, Andrew Tolmach
-
A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity
- Matthieu Baty, Pierre Wilke, Guillaume Hiet, Alix Trieu, Arnaud Fontaine
-
Bayes Security: A Not So Average Metric
- Konstantinos Chatzikokolakis, Giovanni Cherubin, Catuscia Palamidessi, Carmela Troncoso
-
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information
- Shahnewaz Karim Sakib, George T Amariucai, Yong Guan
-
Analyzing the Shuffle Model through the Lens of Quantitative Information Flow
- Mireya Jurado, Mário S. Alvim, Ramon Gonze, Catuscia Palamidessi
-
SoK: Model Inversion Attack Landscape: Taxonomy, Challenges, and Future Roadmap
- Sayanton V. Dibbo
-
From Bounded to Unbounded: Privacy Amplification via Shuffling with Dummies
- Shun Takagi, Fumiyuki Kato, Yang Cao, Masatoshi Yoshikawa
-
Investigating Membership Inference Attacks under Data Dependencies
- Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum
-
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE
- Adi Akavia, Ben Galili, Hayim Shaul, Mor Weiss, Zohar Yakhini
-
Optimally Hiding Object Sizes with Constrained Padding
- Andrew C. Reed, Michael K. Reiter
-
General-Purpose Secure Conflict-free Replicated Data Types
- Bernardo Portela, Hugo Pacheco, Rogério Pontes, Pedro Jorge
-
π_RA: A π-calculus for Verifying Protocols that Use Remote Attestation
- Emiel Lanckriet, Matteo Busi, Dominique Devriese
-
High-assurance field inversion for curve-based cryptography
- Benjamin Salling Hvass, Diego F. Aranha, Bas Spitters
-
On Sustainable Ring-based Anonymous Systems
- Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo
-
Collusion-Deterrent Threshold Information Escrow
- Easwar Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate