The Community for Technology Leaders
2014 IEEE 27th Computer Security Foundations Symposium (CSF) (2014)
Vienna, Austria
July 19, 2014 to July 22, 2014
ISSN: 1063-6900
ISBN: 978-1-4799-4290-9
TABLE OF CONTENTS

[Title page iii] (PDF)

pp. iii

Table of contents (PDF)

pp. v-vii

Preface (PDF)

pp. viii

Committees (PDF)

pp. xii-xiii

Declarative Policies for Capability Control (PDF)

Christos Dimoulas , Sch. of Eng. & Appl. Sci., Harvard Univ., Cambridge, MA, USA
Scott Moore , Sch. of Eng. & Appl. Sci., Harvard Univ., Cambridge, MA, USA
Aslan Askarov , Sch. of Eng. & Appl. Sci., Harvard Univ., Cambridge, MA, USA
Stephen Chong , Sch. of Eng. & Appl. Sci., Harvard Univ., Cambridge, MA, USA
pp. 3-17

Portable Software Fault Isolation (PDF)

Joshua A. Kroll , Comput. Sci. Dept., Princeton Univ., Princeton, NJ, USA
Gordon Stewart , Comput. Sci. Dept., Princeton Univ., Princeton, NJ, USA
Andrew W. Appel , Comput. Sci. Dept., Princeton Univ., Princeton, NJ, USA
pp. 18-32

Noninterference under Weak Memory Models (PDF)

Heiko Mantel , Tech. Univ. Darmstadt, Darmstadt, Germany
Matthias Perner , Tech. Univ. Darmstadt, Darmstadt, Germany
Jens Sauer , Tech. Univ. Darmstadt, Darmstadt, Germany
pp. 80-94

Who's Afraid of Which Bad Wolf? A Survey of IT Security Risk Awareness (PDF)

Marian Harbach , Usable Security & Privacy Lab., Leibniz Univ. Hannover, Hannover, Germany
Sascha Fahl , Usable Security & Privacy Lab., Leibniz Univ. Hannover, Hannover, Germany
Matthew Smith , Usable Security & Privacy Lab., Leibniz Univ. Hannover, Hannover, Germany
pp. 97-110

How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing (PDF)

Jens Grossklags , Coll. of Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA
David Reitter , Coll. of Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA
pp. 111-122

Automated Analysis and Synthesis of Block-Cipher Modes of Operation (PDF)

Alex J. Malozemoff , Dept. of Comput. Sci., Univ. of Maryland, Baltimore, MD, USA
Jonathan Katz , Dept. of Comput. Sci., Univ. of Maryland, Baltimore, MD, USA
Matthew D. Green , Dept. of Comput. Sci., Johns Hopkins Univ., Baltimore, MD, USA
pp. 140-152

Certified Synthesis of Efficient Batch Verifiers (PDF)

Joseph A. Akinyele , Johns Hopkins Univ. & Zeutro LLC, Baltimore, MD, USA
Gilles Barthe , IMDEA Software Inst., Madrid, Spain
Benjamin Gregoire , INRIA Sophia-Antipolis Mediterranee, Sophia-Antipolis, France
Benedikt Schmidt , IMDEA Software Inst., Madrid, Spain
Pierre-Yves Strub , IMDEA Software Inst., Madrid, Spain
pp. 153-165

A Peered Bulletin Board for Robust Use in Verifiable Voting Systems (PDF)

Chris Culnane , Dept. of Comput., Univ. of Surrey, Guildford, UK
Steve Schneider , Dept. of Comput., Univ. of Surrey, Guildford, UK
pp. 169-183

Malleable Signatures: New Definitions and Delegatable Anonymous Credentials (PDF)

Melissa Chase , Microsoft Res., Redmond, WA, USA
Markulf Kohlweiss , Microsoft Res., Redmond, WA, USA
Anna Lysyanskaya , Brown Univ., Providence, UT, USA
Sarah Meiklejohn , UC San Diego, San Diego, CA, USA
pp. 199-213

Actor Key Compromise: Consequences and Countermeasures (PDF)

David Basin , Dept. of Comput. Sci., Inst. of Inf. Security, ETH Zurich, Zurich, Switzerland
Cas Cremers , Dept. of Comput. Sci., Univ. of Oxford, Oxford, UK
Marko Horvat , Dept. of Comput. Sci., Univ. of Oxford, Oxford, UK
pp. 244-258

A Sound Abstraction of the Parsing Problem (PDF)

Sebastian Modersheim , DTU Compute, Tech. Univ. of Denmark, Lyngby, Denmark
Georgios Katsoris , DTU Compute, Tech. Univ. of Denmark, Lyngby, Denmark
pp. 259-273

Compositional Information-Flow Security for Interactive Systems (PDF)

Willard Rafnsson , Chalmers Univ. of Technol., Gothenburg, Sweden
Andrei Sabelfeld , Chalmers Univ. of Technol., Gothenburg, Sweden
pp. 277-292

Stateful Declassification Policies for Event-Driven Programs (PDF)

Mathy Vanhoef , iMinds-DistriNe, KU Leuven, Leuven, Belgium
Willem De Groef , iMinds-DistriNe, KU Leuven, Leuven, Belgium
Dominique Devriese , iMinds-DistriNe, KU Leuven, Leuven, Belgium
Frank Piessens , iMinds-DistriNe, KU Leuven, Leuven, Belgium
Tamara Rezk , INRIA, Sophia-Antipolis, France
pp. 293-307

The Complexity of Estimating Systematic Risk in Networks (PDF)

Benjamin Johnson , Univ. of California, Berkeley, Berkeley, CA, USA
Aron Laszka , Budapest Univ. of Technol. & Econ., Budapest, Hungary
Jens Grossklags , Pennsylvania State Univ., University Park, PA, USA
pp. 325-336

Automated Generation of Attack Trees (PDF)

Roberto Vigo , Dept. of Appl. Math. & Comput. Sci., Tech. Univ. of Denmark, Lyngby, Denmark
Flemming Nielson , Dept. of Appl. Math. & Comput. Sci., Tech. Univ. of Denmark, Lyngby, Denmark
Hanne Riis Nielson , Dept. of Appl. Math. & Comput. Sci., Tech. Univ. of Denmark, Lyngby, Denmark
pp. 337-350

TUC: Time-Sensitive and Modular Analysis of Anonymous Communication (PDF)

Michael Backes , CISPA, Saarland Univ., Saarbrucken, Germany
Praveen Manoharan , CISPA, Saarland Univ., Saarbrucken, Germany
Esfandiar Mohammadi , CISPA, Saarland Univ., Saarbrucken, Germany
pp. 383-397

Differential Privacy: An Economic Method for Choosing Epsilon (PDF)

Justin Hsu , Univ. of Pennsylvania, Philadelphia, PA, USA
Marco Gaboardi , Univ. of Dundee, Dundee, UK
Andreas Haeberlen , Univ. of Pennsylvania, Philadelphia, PA, USA
Sanjeev Khanna , Univ. of Pennsylvania, Philadelphia, PA, USA
Arjun Narayan , Univ. of Pennsylvania, Philadelphia, PA, USA
Benjamin C. Pierce , Univ. of Pennsylvania, Philadelphia, PA, USA
Aaron Roth , Univ. of Pennsylvania, Philadelphia, PA, USA
pp. 398-410

Proving Differential Privacy in Hoare Logic (PDF)

Gilles Barthe , IMDEA Software Inst., Madrid, Spain
Marco Gaboardi , Univ. of Dundee, Dundee, UK
Emilio Jesus Gallego Arias , Univ. of Pennsylvania, Philadelphia, PA, USA
Justin Hsu , Univ. of Pennsylvania, Philadelphia, PA, USA
Cesar Kunz , IMDEA Software Inst., Madrid, Spain
Pierre-Yves Strub , IMDEA Software Inst., Madrid, Spain
pp. 411-424

Author index (PDF)

pp. 441-442
94 ms
(Ver 3.3 (11022016))