CSF 2025 | 2025 38th IEEE Computer Security Foundations Symposium

Home> Conference > Computer Science and Technologies >

Views:

Basic Information

CSF 2025 | 2025 38th IEEE Computer Security Foundations Symposium

Website: https://csf2025.ieee-security.org

Place

Santa Cruz, United States of America

Conference Date

Jun 16 - Jun 20, 2025

Submission Deadline

Feb 28, 2025

Venue

Subjects: Computer Science and Technologies

Sponsorship: 

Indexing: 

Short Description

Call for Papers

The Computer Security Foundations Symposium (CSF) is an annual conference for researchers in computer security. CSF seeks papers on foundational aspects of computer security, such as formal security models, relationships between security properties and defenses, principled techniques and tools for design and rigorous analysis of security mechanisms, as well as their application to practice. While CSF welcomes submissions beyond the topics listed below, the main focus of CSF is foundational security and privacy. Papers lacking foundational aspects risk desk rejection without further evaluation of their merits; contact the PC chairs when in doubt.
 
CSF was created in 1988 as a workshop of the IEEE Computer Society’s Technical Committee on Security and Privacy, in response to a 1986 essay by Don Good entitled “The Foundations of Computer Security—We Need Some.” The meeting became a “symposium” in 2007, along with a policy for open, increased attendance. Over the past two decades, many seminal papers and techniques have been presented first at CSF. For more details on the history of the symposium, visit CSF’s home.
 
Proceedings will be published by the IEEE Computer Society Press and will be available at the symposium. Some small number of papers will be selected by the Program Committee as "Distinguished Papers".

Accepted Papers
Cryptographically Assured Information Flow: Assured Remote Execution
Joshua Guttman, Scott Dyer, Christian Femrite, Julian Lanson, Moses Liskov (The MITRE Corporation)
 
Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting
Andreas Athanasiou, Catuscia Palamidessi (INRIA, École polytechnique); Kostas Chatzikokolakis (University of Athens)
 
Secrecy by typing in the computational model
Stéphanie Delaune, Clément Hérouard, Joseph Lallemand (Université de Rennes, IRISA, CNRS)
 
Automatic verification of Finite Variant Property beyond convergent equational theories
Vincent Cheval (Department of Computer Science, University of Oxford); Caroline Fontaine (Université Paris-Saclay, CNRS, ENS Paris-Saclay, Laboratoire Méthodes Formelles)
 
Privacy-preserving server-supported decryption
Alisa Pankova, Peeter Laud (Cybernetica AS); Jelizaveta Vakarjuk (Cybernetica AS and Tallinn University of Technology)
 
Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents
Léonard Brice, Jean-François Raskin, Mathieu Sassolas (Université Libre de Bruxelles); Guillaume Scerri (LMF, Université Paris-Saclay, ENS Paris Saclay & CNRS); Marie Van Den Bogaard (Université Gustave Eiffel, CNRS, LIGM)
 
Accountability, Involvement, and Mediation for Information Flow
Elisavet Kozyri (UiT The Arctic University of Norway); Fred B. Schneider (Cornell University); Stephen Chong (Harvard University)
 
Atomic Transfer Graphs: Secure-by-design Protocols for Heterogeneous Blockchain Ecosystems
Stephan Dübler, Federico Badaloni (Max Planck Institute for Security and Privacy); Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research, Max Planck Institute for Security and Privacy); Clara Schneidewind (Max Planck Institute for Security and Privacy)
 
Path Privacy and Handovers: Preventing Insider Traceability Attacks During Secure Handovers
Rabiah Alnashwan (University of Sheffield); Benjamin Dowling (King's College London); Bhagya Wimalasiri (University of Sheffield)
 
Novel Approach to Differential Privacy with Alpha Divergence
Yifeng Liu, Zehua Wang (The University of British Columbia)
 
Foundations of Multi-Designated Verifier Signature: Comprehensive Formalization and New Constructions in Subset Simulation
Keitaro Hashimoto (AIST); Kyosuke Yamashita (Osaka University and AIST); Keisuke Hara (AIST and Yokohama National University)
 
Zero-Knowledge Proofs from Learning Parity with Noise: Optimization, Verification, and Application
Rafieh Mosaheb (University of Luxembourg); Thomas Haines (Australian National University); Johannes Müller (CNRS/LORIA); Reetika (Indian Institute of Space Science and Technology, Thiruvananthapuram)
 
Automated Analysis and Synthesis of Message Authentication Codes
Julian Thomas (Friedrich-Alexander-Universität Erlangen-Nürnberg); Dominique Schröder (TU Wien); Stefan Milius, Dominik Paulus, Lutz Schröder (Friedrich-Alexander-Universität Erlangen-Nürnberg)
 
SMT-based Automation for Overwhelming Truth
David Baelde, Stéphanie Delaune, Stanislas Riou (Univ Rennes, CNRS, IRISA)
 
On DoS Vulnerability of Regular Expressions, with and without Backreferences
Tachio Terauchi (Waseda University)
 
Rethinking Attack Path Management: A New Metric for Choke Points in Attack Graphs
Yumeng Zhang (The University of Adelaide); Max Ward (University of Western Australia); Hung Nguyen (The University of Adelaide)
 
Strands Rocq: Why is a Security Protocol Correct, Mechanically?
Matteo Busi, Riccardo Focardi, Flaminia Luccio (University Ca' Foscari of Venice, Italy)
 
AGATE: Augmented Global Attested Trusted Execution in the Universal Composability framework
Lorenzo Martinico (University of Edinburgh); Markulf Kohlweiss (University of Edinburgh, IOG)
 
Gradual Sensitivity Typing
Damian Arquez, Matías Toro, Éric Tanter (University of Chile)
 
Session Types for the Concurrent Composition of Interactive Differential Privacy
Victor Sannier, Patrick Baillot (Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, F-59 000 Lille, France); Marco Gaboardi (Department of Computer Science, Boston University, USA)
 
BitMLx: Secure Cross-chain Smart Contracts For Bitcoin-style Cryptocurrencies
Federico Badaloni, Sebastian Holler (MPI-SP); Chrysoula Oikonomou (Aristotle University of Thessaloniki); Pedro Moreno-Sanchez (IMDEA Software Institute, VISA Research, MPI-SP); Clara Schneidewind (MPI-SP)
 

Contact

E-mail: oarden@ucsc.edu

Tel: 

Rank: ★★★★

Indexing

Online Proceedings:

Indexing Proof: View

Related Resources