Aurora Naska

According to our database1, Aurora Naska authored at least 5 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Impossibility Results for Post-Compromise Security in Real-World Communication Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Breaking and Provably Restoring Authentication: A Formal Analysis of SPDM 1.2 including Cross-Protocol Attacks.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2023
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
Proceedings of the 32nd USENIX Security Symposium, 2023

Formal Analysis of SPDM: Security Protocol and Data Model version 1.2.
Proceedings of the 32nd USENIX Security Symposium, 2023

2020
Clone Detection in Secure Messaging: Improving Post-Compromise Security in Practice.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020


  Loading...