Francesco D'Amato and Luca Zanolini (Ethereum Foundation)
Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process
Pedram Hosseyni, Ralf Küsters, and Tim Würtele (University of Stuttgart)
Is the JCJ voting system really coercion-resistant?
Véronique Cortier and Pierrick Gaudry (CNRS, Loria); Quentin Yang (INRIA, Loria)
Composition in Differential Privacy for General Granularity Notions
Patricia Guerra-Balboa (Karlsruhe Institut of Technology); Àlex Miranda-Pascual (Karlsruhe Institut of Technology, Universitat Politècnica de Catalunya); Javier Parra-Arnau (Universitat Politècnica de Catalunya); Thorsten Strufe (Karlsruhe Institut of Technology)
Attack tree metrics are operad algebras
Milan Lopuhaä-Zwakenberg (University of Twente)
Circuit-Succinct Universally Composable NIZKs with Updatable CRS
Behzad Abdolmaleki (University of Sheffield, UK); Noemi Glaeser (UMD and MPI-SP); Sebastian Ramacher and Daniel Slamanig (AIT Austrian Institute of Technology)
UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience
Rabiah Alnashwan (Student); Prosanta Gope and Benjamin Dowling (University of Sheffield)
Solving the insecurity problem for assertions
R Ramanujam (Azim Premji University Bengaluru); Vaishnavi Sundararajan (Indian Institute of Technology Delhi); S P Suresh (Chennai Mathematical Institute)
Security Properties through the Lens of Modal Logic
Matvey Soloviev, Musard Balliu, and Roberto Guanciale (KTH Royal Institute of Technology)
ZK-SecreC: a Domain-Specific Language for Zero-Knowledge Proofs
Dan Bogdanov (Cybernetica AS); Joosep Jääger (Input Output (IOHK)); Peeter Laud, Härmel Nestra, and Martin Pettai (Cybernetica AS); Jaak Randmets (Artificial Labs); Raul-Martin Rebane (Cybernetica AS); Ville Sokk (Artificial Labs); Kert Tali and Sandhra-Mirella Valdma (Cybernetica AS)
A Decision Procedure for Alpha-Beta Privacy for a Bounded Number of Transitions
Laouen Fernet (DTU Compute); Sebastian Mödersheim (DTU - Technical University of Denmark); Luca Viganò (King's College London)
Explaining epsilon in local differential privacy through the lens of quantitative information flow
Accountable Bulletin Boards: Definition and Provably Secure Implementation
Mike Graf, Daniel Rausch, Simon Egger, Marvin Bechtold, Marcel Flinspach, and Ralf Küsters (University of Stuttgart)
Formal Verification of the Sumcheck Protocol
Azucena Garvia Bosshard (None); Jonathan Bootle (IBM Research Europe - Zurich); Christoph Sprenger (ETH Zurich)
Dealing with Dynamic Key Compromise in CryptoVerif
Bruno Blanchet (Inria Paris)
Verification of Correctness and Security Properties for CRYSTALS-KYBER
Katharina Kreuzer (Technical University Munich)
Disjunctive Policies for Database-Backed Programs
Amir M. Ahmadian, Matvey Soloviev, and Musard Balliu (KTH Royal Institute of Technology)
Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy
Christian Badertscher and Peter Gazi (Input Output); Aggelos Kiayias (University of Edinburgh and Input Output); Alexander Russell (University of Connecticut and Input Output); Vassilis Zikas (Purdue University)
CV2EC: Getting the Best of Both Worlds
Bruno Blanchet (Inria); Pierre Boutry (Université Côte d’Azur, Inria); Christian Doczkal (Max Planck Institute for Security and Privacy); Benjamin Grégoire (Université Côte d’Azur, Inria); Pierre-Yves Strub (PQShield SAS)
Epistemic Model Checking for Privacy
Fortunat Rajaona, Ioana Boureanu, Jam Ramanujam, and Steve Wesemeyer (University of Surrey, Surrey Centre for Cyber Security)
Secure Synthesis of Distributed Cryptographic Applications
Coşku Acay (Cornell University); Joshua Gancher (Carnegie Mellon University); Rolph Recto and Andrew C. Myers (Cornell University)
Software-Based Memory Erasure with relaxed isolation requirements
Reynaldo Gil Pons and Sergiu Bursuc (University of Luxembourg); Rolando Trujillo Rasua (Universitat Rovira i Virgili); Sjouke Mauw (University of Luxembourg)
Bridging the Gap: Automated Analysis of Sancus
Matteo Busi, Riccardo Focardi, and Flaminia Luccio (University Ca' Foscari, Venice, Italy)
Computational Bounded Robust Compilation and Universally Composable Security
Robert Künnemann (CISPA Helmholtz Center for Information Security); Marco Patrignani (University of Trento); Ethan Cecchetti (University of Wisconsin-Madison)
Wappler: Sound Reachability Analysis for WebAssembly
Markus Scherer (TU Wien); Jeppe Fredsgaard Blaabjerg (Aarhus University); Magdalena Solitro, Alexander Sjösten, and Matteo Maffei (TU Wien)
Provable Security Analysis of the Secure Remote Password Protocol
Dennis Dayanikli and Anja Lehmann (Hasso-Plattner-Institute, University of Potsdam)
Relative Security: Formally Modeling and (Dis)Proving Resilience Against Semantic Optimization Vulnerabilities
Brijesh Dongol and Matt Griffin (University of Surrey, UK); Andrei Popescu and Jamie Wright (University of Sheffield, UK)
Unconditionally secure MPC for Boolean circuits with constant online communication
Zhenkai Hu (Shanghai Jiao Tong University); Kang Yang (State Key Laboratory of Cryptology); Yu Yu (Shanghai Jiao Tong University)
Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE
Manning Zhang, Zeshun Shi, Huanhuan Chen, and Kaitai Liang (Delft University of Technology)
A Maintainable Matrix Commitment Scheme with Constant-Size Public Paremeters and Incremental Aggregation
Wenhui Qiao and Liang Feng Zhang (ShanghaiTech University)
Divide and Funnel: A Scaling Technique for Mix-Networks
Debajyoti Das (KU Leuven); Sebastian Meiser and Esfandiar Mohammadi (University of Luebeck); Aniket Kate (Supra Research/Purdue University)
A Probabilistic Logic for Concrete Security
David Baelde (Univ Rennes, CNRS, IRISA); Caroline Fontaine (Université Paris-Saclay, CNRS, ENS Paris-Saclay, LMF); Adrien Koutsos (Inria Paris); Guillaume Scerri and Theo Vignon (Université Paris-Saclay, ENS Paris-Saclay, CNRS, LMF)
Nothing is out-of-band: formal modeling of ceremonies
Barbara Fila (INSA Rennes, IRISA); Sasa Radomirovic (University of Surrey)
Post-quantum sound CryptoVerif and verification of hybrid TLS and SSH key-exchanges
Bruno Blanchet (Inria Paris); Charlie Jacomme (Université de Lorraine, LORIA, Inria Nancy Grand-Est)
Modeling Mobile Crash in Byzantine Consensus
Hans Schmiedel (Monash University); Runchao Han (BabylonChain Inc.); Qiang Tang (The University of Sydney); Ron Steinfeld (Monash University); Jiangshan Yu (The University of Sydney)
A Logic of Sattestation
Aaron D. Jaggard, Paul Syverson, and Catherine Meadows (U.S. Naval Research Laboratory)
On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing
Stefano Trevisani and Elena Andreeva (TU Wien); Rishiraj Bhattacharyya (University of Birmingham); Arnab Roy (University of Innsbruck)
Brewer-Nash Scrutinised: Mechanised Checking of Policies featuring Write Revocation
Ross Horne (University of Strathclyde); Alfredo Capozucca (University of Luxembourg); Maximiliano Cristia (CIFASIS Universidad Nacional de Rosario); Ricardo Katz (CIFASIS CONICET)
Urgency in cybersecurity risk management: toward a solid theory
Zoltan Adam Mann (University of Amsterdam)
A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary Results
Karima Makhlouf (Inria, Ecole Polytechnique (IPP), France); Tamara Stefanović (Mathematical Institute of the Serbian Academy of Sciences and Arts, Belgrade, Serbia); Héber Hwang Arcolezi (Inria, Grenoble Alpes, France); Catuscia Palamidessi (Inria, Ecole Polytechnique(IPP), France)
Probability from Possibility: Probabilistic Confidentiality for Storage Systems Under Nondeterminism
Atalay Mert Ileri (Kansas State University), Frans Kaashoek, Nickolai Zeldovich, Adam Chlipala (MIT)
On Separation Logic, Computational Independence, and Pseudorandomness
Ugo Dal Lago (University of Bologna), Davide Davoli (INRIA Sophia Antipolis), Bruce Kapron (University of Victoria)
Synthesizing Tight Privacy and Accuracy Bounds via Weighted Model Counting
Lisa Oakley, Steven Holtzen, Alina Oprea (Northeastern University)
Deciding branching hyperproperties for real time systems
Nabarun Deka, Minjian Zhang (University of Illinois at Urbana Champaign), Rohit Chadha (University of Missouri), Mahesh Viswanathan (University of Illinois at Urbana Champaign)