Skip to main content
  • Conference proceedings
  • Open Access
  • © 2018

Principles of Security and Trust

7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10804)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): POST: International Conference on Principles of Security and Trust

Conference proceedings info: POST 2018.

Buying options

Softcover Book USD 59.99
Price excludes VAT (USA)

Table of contents (14 papers)

  1. Front Matter

    Pages I-XIV
  2. Information Flow and Non-intereference

    1. Front Matter

      Pages 1-1
    2. What’s the Over/Under? Probabilistic Bounds on Information Leakage

      • Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks, Stephen Magill
      Pages 3-27Open Access
    3. Secure Information Release in Timed Automata

      • Panagiotis Vasilikos, Flemming Nielson, Hanne Riis Nielson
      Pages 28-52Open Access
    4. Compositional Non-interference for Concurrent Programs via Separation and Framing

      • Aleksandr Karbyshev, Kasper Svendsen, Aslan Askarov, Lars Birkedal
      Pages 53-78Open Access
    5. The Meaning of Memory Safety

      • Arthur Azevedo de Amorim, Cătălin Hriţcu, Benjamin C. Pierce
      Pages 79-105Open Access
  3. Leakage, Information Flow, and Protocols

    1. Front Matter

      Pages 107-107
    2. Formal Verification of Integrity-Preserving Countermeasures Against Cache Storage Side-Channels

      • Hamed Nemati, Christoph Baumann, Roberto Guanciale, Mads Dam
      Pages 109-133Open Access
    3. Leakage and Protocol Composition in a Game-Theoretic Perspective

      • Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi
      Pages 134-159Open Access
    4. Equivalence Properties by Typing in Cryptographic Branching Protocols

      • Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei
      Pages 160-187Open Access
    5. Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience

      • Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò
      Pages 188-213Open Access
  4. Smart Contracts and Privacy

    1. Front Matter

      Pages 215-215
    2. SoK: Unraveling Bitcoin Smart Contracts

      • Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino
      Pages 217-242Open Access
    3. A Semantic Framework for the Security Analysis of Ethereum Smart Contracts

      • Ilya Grishchenko, Matteo Maffei, Clara Schneidewind
      Pages 243-269Open Access
    4. Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts

      • Anastasia Mavridou, Aron Laszka
      Pages 270-277Open Access
    5. UniTraX: Protecting Data Privacy with Discoverable Biases

      • Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg
      Pages 278-299Open Access
  5. Firewalls and Attack-Defense Trees

    1. Front Matter

      Pages 301-301
    2. Transcompiling Firewalls

      • Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta
      Pages 303-324Open Access
    3. On Quantitative Analysis of Attack–Defense Trees with Repeated Labels

      • Barbara Kordy, Wojciech Wideł
      Pages 325-346Open Access
  6. Back Matter

    Pages 347-347

Other Volumes

  1. Principles of Security and Trust

About this book

This open access book constitutes the proceedings of the 7th International Conference on Principles of Security and Trust, POST 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.

The 13 papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections named: information flow and non-intereference; leakage, information flow, and protocols; smart contracts and privacy; firewalls and attack-defense trees.

Keywords

  • authentication
  • computer science
  • computer software selection and evaluation
  • cryptography
  • data privacy
  • formal logic
  • formal methods
  • formal specification
  • internet
  • privacy
  • program compilers
  • programming languages
  • security analysis
  • security systems
  • semantics
  • separation logic
  • software engineering
  • specifications
  • verification
  • world wide web

Editors and Affiliations

  • Carnegie Mellon University, Pittsburgh, USA

    Lujo Bauer

  • University of Stuttgart, Stuttgart, Germany

    Ralf Küsters

Bibliographic Information

Buying options

Softcover Book USD 59.99
Price excludes VAT (USA)