Principles of Security and Trust: 6th International Conference, Post 2017, Held as Part of the European Joint Conferences on Theory and Practice of So » książka
Information Flow.- Timing-Sensitive Noninterference through Composition.- Quantifying vulnerability of secret generation using hyper-distributions.- A Principled Approach to Tracking Information Flow in the Presence of Libraries.- Secure Multi-Party Computation: Information Flow of Outputs and Game Theory.- Security Protocols.- Automated verification of dynamic root of trust protocols.- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.- On communication models when verifying equivalence properties.- A survey of attacks on Ethereum smart contracts (SoK).- Security Policies.- Security Analysis of Cache Replacement Policies.- Model Checking Exact Cost for Attack Scenarios.- Postulates for Revocation Schemes.- Defense in Depth Formulation and Usage in Dynamic Access Control.- Information Leakage.- Compositional Synthesis of Leakage Resilient Programs.- Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows.