Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, ProceedingsLujo Bauer, Ralf Küsters This open access book constitutes the proceedings of the 7th International Conference on Principles of Security and Trust, POST 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018. The 13 papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections named: information flow and non-intereference; leakage, information flow, and protocols; smart contracts and privacy; firewalls and attack-defense trees. |
Other editions - View all
Principles of Security and Trust: 7th International Conference, POST 2018 ... Lujo Bauer,Ralf Küsters No preview available - 2018 |
Common terms and phrases
abstract abstract interpretation action algorithm allows analysis apps assignment assumptions attack–defense trees attacker Bitcoin blockchain bytecode cache cacheless call stack channel Computer configuration consider constraints Creative Commons license dangling pointers database defender’s defined definition denote depends distribution DNAT encryption equivalence Ethereum evaluation example firewall formal Formal verification function global goal Heidelberg hidden choice hypervisor idempotent IEEE implementation information flow initial budget input iptables kernel language leakage LNCS memory safety mixed strategy multi-factor authentication opcode operations output packet parameter payoff performed phish PINQ pointer post-dominator probabilistic program counter proof properties protocol query reschedule result rule ruleset scheduler secret Sect security level semantics sequential game signature smart contracts smartphone specific Springer strategy subspace Theorem thread tion trace transaction type system UniTraX variables verification vulnerability βα