Principles of security and trust 7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /

This book is Open Access under a CC BY licence.

Corporate Authors: POST (Conference) Thessalonikē, Greece)
Other Authors: POST (Conference), Bauer, Lujo,, Küsters, Ralf,, SpringerLink (Online service), ETAPS (Conference)
Format: eBook
Language: English
Published: Cham, Switzerland : Springer Open, 2018.
Physical Description: 1 online resource (xiv, 347 pages) : illustrations.
Series: Lecture notes in computer science ; 10804.
Lecture notes in computer science. Advanced research in computing and software science.
LNCS sublibrary. Security and cryptology.
Subjects:
Table of Contents:
  • Information Flow and Non-Interference
  • What's the Over/Under? Probabilistic Bounds on Information Leakage
  • Secure Information Release in Timed Automata
  • Compositional Non-Interference for Concurrent Programs via Separation and Framing
  • The Meaning of Memory Safety
  • Leakage, Information Flow, and Protocols
  • Formal Verification of Integrity Preserving Countermeasures Against Cache Storage
  • Leakage and Protocol Composition in a Game-theoretic Perspective
  • Equivalence Properties by Typing in Cryptographic Branching Protocols
  • Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience
  • Smart Contracts and Privacy
  • SoK: Unraveling Bitcoin Smart Contracts
  • A Semantic Framework for the Security Analysis of Ethereum Smart Contracts
  • Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
  • UniTraX: Protecting Data Privacy with Discoverable Biases
  • Firewalls and Attack-Defense Trees
  • Transcompiling Firewalls
  • On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.