Principles of Security and Trust: 7th International Conference, Post 2018, Held as Part of the European Joint Conferences on Theory and Practice of So » książka
Information Flow and Non-Intereference.- What's the Over/Under? Probabilistic Bounds on Information Leakage.- Secure Information Release in Timed Automata.- Compositional Non-Interference for Concurrent Programs via Separation and Framing.- The Meaning of Memory Safety.- Leakage, Information Flow, and Protocols.- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage.- Leakage and Protocol Composition in a Game-theoretic Perspective.- Equivalence Properties by Typing in Cryptographic Branching Protocols.- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience.- Smart Contracts and Privacy.- SoK: Unraveling Bitcoin Smart Contracts.- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts.- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts.- UniTraX: Protecting Data Privacy with Discoverable Biases.- Firewalls and Attack-Defense Trees.- Transcompiling Firewalls.- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.