POST 2018 Accepted Papers
- Ian Sweet, Jose Calderon, Chad Scherrer, Michael Hicks and Stephen Magill. What's the Over/Under? Probabilistic Bounds on Information Leakage
- Giada Sciarretta, Roberto Carbone, Silvio Ranise and Luca Viganò. Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience
- Panagiotis Vasilikos, Flemming Nielson and Hanne Riis Nielson. Secure Information Release in Timed Automata
- Aleksandr Karbyshev, Kasper Svendsen, Aslan Askarov and Lars Birkedal. Compositional Non-Interference for Concurrent Programs via Separation and Framing
- Hamed Nemati, Roberto Guanciale, Christoph Baumann and Mads Dam. Formal Verification of Integrity Preserving Countermeasures against Cache Storage
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta and Mauro Tempesta. Transcompiling Firewalls
- Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande and Roberto Zunino. SoK: unraveling Bitcoin smart contracts
- Ilya Grishchenko, Matteo Maffei and Clara Schneidewind. A Semantic Framework for the Security Analysis of Ethereum smart contracts
- Barbara Kordy and Wojciech Widel. On quantitative analysis of attack-defense trees with repeated labels
- Véronique Cortier, Niklas Grimm, Joseph Lallemand and Matteo Maffei. Equivalence properties by typing in cryptographic branching protocols
- Arthur Azevedo de Amorim, Catalin Hritcu and Benjamin Pierce. The Meaning of Memory Safety
- Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis and Deepak Garg. UniTraX: Protecting Data Privacy with Discoverable Biases
- Anastasia Mavridou and Aron Laszka. Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
- Mario S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto and Catuscia Palamidessi. Leakage and protocol composition in a game-theoretic perspective