Generated by GPT-5-mini| Computer Security Foundations Symposium (CSF) | |
|---|---|
| Name | Computer Security Foundations Symposium |
| Abbreviation | CSF |
| Discipline | Computer science; Cryptography; Computer security |
| First | 1988 |
| Organizer | ACM; IEEE Computer Society |
| Frequency | Annual |
| Location | Varies; cities in United States and Europe |
Computer Security Foundations Symposium (CSF) The Computer Security Foundations Symposium (CSF) is an annual academic conference focusing on the theoretical foundations of Cryptography, Information theory, Formal methods, logic, and Programming languages as they relate to Computer security. Founded with support from organizations such as ACM and IEEE Computer Society, CSF serves as a venue for researchers from institutions including Massachusetts Institute of Technology, Stanford University, Carnegie Mellon University, University of California, Berkeley, Princeton University, University of Oxford, and EPFL to present rigorous results. CSF operates alongside other events like ACM SIGCOMM, USENIX Security Symposium, IEEE Symposium on Security and Privacy, Crypto (conference), and Theory of Cryptography Conference.
CSF traces roots to late 1980s workshops influenced by work at Bell Labs, research groups at MITRE Corporation, and programs at SRI International. Early iterations were shaped by contributions from scholars affiliated with IBM Research, AT&T Bell Laboratories, Microsoft Research, NIST, and RAND Corporation. Milestones in CSF history include thematic alignments with breakthroughs from researchers associated with Whitfield Diffie, Martin Hellman, Ron Rivest, Adi Shamir, Leonard Adleman, Claude Shannon, and institutions like IETF and W3C that pushed formal models. Over decades the symposium expanded its constituency to include members from University of Cambridge, University of Waterloo, Technische Universität Darmstadt, University College London, ETH Zurich, and Harvard University.
CSF emphasizes rigorous treatments related to Public-key cryptography, Zero-knowledge proofs, Secure multiparty computation, Protocol verification, and Access control models. Frequent subject matter overlaps with research from IEEE INFOCOM, SIGPLAN, LICS, ICALP, and STOC communities, and incorporates methods from Modal logic, Type theory, Process calculi, Model checking, and game theory. Papers often reference frameworks developed at DARPA, standards by ISO, and mathematical tools originating from work at Institute for Advanced Study, Courant Institute, and CNRS laboratories.
The symposium is governed by program committees drawn from leading academic and industrial researchers affiliated with SIGSAC, IEEE Computer Society Technical Committee on Security and Privacy, and editorial boards of journals such as Journal of Cryptology, ACM Transactions on Information and System Security, IEEE Transactions on Information Forensics and Security, and Theoretical Computer Science. Steering committees have included representatives from Royal Society, Engineering and Physical Sciences Research Council, European Research Council, National Science Foundation, and national labs like Los Alamos National Laboratory and Lawrence Berkeley National Laboratory. Organizational support often involves conference hosts at Cornell University, University of Pennsylvania, Yale University, Boston University, University of Toronto, and McGill University.
Typical CSF programs mirror formats used by CHI, NeurIPS, and ICML with refereed paper sessions, invited talks, poster sessions, and panel discussions. The symposium features tutorials by figures associated with Stanford Law School on policy intersections, workshops co-located with Financial Cryptography and Data Security, and doctoral consortia similar to those at ESORICS and NDSS. Key activities include formal proof sessions influenced by methods from Coq, Isabelle, and TLA+ communities, as well as demonstrations of protocol analysis tools akin to those developed at Carnegie Mellon University’s CERT Coordination Center.
CSF has hosted foundational papers that intersect with influential work by Shafi Goldwasser, Silvio Micali, Oded Goldreich, Danny Dolev, Joe Kilian, and Moni Naor. Contributions presented have advanced understanding of composability frameworks comparable to Universal Composability, formal refinement techniques related to Hoare logic, adversarial models inspired by Dolev–Yao model, and decidability results connected to Post correspondence problem variants. The symposium circulated influential proofs concerning authentication protocols, confidentiality properties, and leakage-resilient constructions that resonated with subsequent publications in Journal of the ACM, SIAM Journal on Computing, Mathematical Foundations of Computer Science, and conference proceedings of RSA Conference.
CSF recognizes outstanding work with awards akin to best-paper distinctions and honorable mentions; recipients have included scholars affiliated with Princeton University, Yale University, Columbia University, University of Maryland, College Park, University of California, San Diego, and University of Minnesota. Many honorees subsequently received wider accolades such as the Gödel Prize, Turing Award, ACM Prize in Computing, IEEE John von Neumann Medal, and fellowships from Royal Society and American Academy of Arts and Sciences. The symposium has been cited in policy advisories by European Commission panels and in technical reports issued by Office of Science and Technology Policy.
CSF attracts a core community of theorists from universities like Brown University, Dartmouth College, University of Chicago, Virginia Tech, Northwestern University, and international institutions such as Tsinghua University, Peking University, Seoul National University, University of Sydney, and University of Melbourne. The symposium influences curricula at departments across Cornell Tech, Imperial College London, Delft University of Technology, and research centers at RIKEN and AIST (Japan). Alumni of CSF program committees and organizing teams have gone on to leadership roles at Google Research, Amazon Web Services, Facebook AI Research, Apple, and startups spun out of Cambridge University and Stanford University labs.
Category:Computer security conferences