Press Enter to activate screen reader mode.
Homepage
Navigation
Search
Content
Footer
Contact
Sitemap
Information Security Group
Main Navigation
Menu
Homepage
News & Events
To homepage
Main menu
News & Events
See overview
close
News 2025
News 2024
News 2023
News 2022
News 2021
News 2020
News 2019
News 2018
News 2017
News 2016
News 2015
News 2014
News 2013
News 2012
News 2011
The Group
To homepage
Main menu
The Group
See overview
close
How to Find Us
Social events
Open Positions
People
To homepage
Main menu
People
See overview
close
Alumni
Visitors
Education
To homepage
Main menu
Education
See overview
close
Student projects
To homepage
Education
Student projects
See overview
Ongoing student projects
Previous student projects
Spring semester 2025
To homepage
Education
Spring semester 2025
See overview
Formal Methods and Functional Programming
Information Security
Formal Methods for Information Security
Autumn semester 2024
To homepage
Education
Autumn semester 2024
See overview
Security Engineering
Current Topics in Information Security
To homepage
Autumn semester 2024
Current Topics in Information Security
See overview
Grading criteria
Spring semester 2024
To homepage
Education
Spring semester 2024
See overview
Formal Methods and Functional Programming
Information Security
Formal Methods for Information Security
Autumn semester 2023
To homepage
Education
Autumn semester 2023
See overview
Applied Security Laboratory
Current Topics in Information Security
To homepage
Autumn semester 2023
Current Topics in Information Security
See overview
Grading criteria
Spring semester 2023
To homepage
Education
Spring semester 2023
See overview
Formal Methods and Functional Programming
Information Security
Computer-Aided Modelling and Reasoning
Autumn semester 2022
To homepage
Education
Autumn semester 2022
See overview
Security Engineering
Applied Security Laboratory
Current Topics in Information Security
To homepage
Autumn semester 2022
Current Topics in Information Security
See overview
Grading criteria
Spring semester 2022
To homepage
Education
Spring semester 2022
See overview
Formal Methods and Functional Programming
Formal Methods for Information Security
Information Security
Autumn semester 2021
To homepage
Education
Autumn semester 2021
See overview
Security Engineering
Applied Security Laboratory
Current Topics in Information Security
To homepage
Autumn semester 2021
Current Topics in Information Security
See overview
Schedule
Grading criteria
Previous semesters
Research
(active)
To homepage
Main menu
Research
See overview
close
Projects
To homepage
Research
Projects
See overview
Runtime Policy Monitoring and Enforcement
Igloo: End-to-End Verification of Distributed Systems
Analyzing Website Compliance with Privacy Regulations (GDPR and ePrivacy)
Authentication of Physical Documents
Cyber Trust Project
Formal Verification with the Tamarin Prover
Full-Stack Verification of Secure Inter-Domain Routing Protocols
An Authentic Digital EMblem (ADEM)
Model-driven Security and Privacy
Exploring Mechanisms of Website Compliance with Privacy Regulations
Display all
Display less
Completed projects
Publications
To homepage
Research
Publications
See overview
Publications 2024
Publications 2023
Publications 2022
Publications 2021
Publications 2020
Publications 2019
Publications 2018
Publications 2017
Publications 2016
Publications 2015
Publications 2014
Publications 2013
Publications 2012
Publications 2011
Publications 2010
Publications 2009
Publications 2008
Publications 2007
Publications 2006
Publications 2005
Publications 2004
Publications 2003
Publications 2002
Publications 2001
Publications 2000
Publications 1999
Publications 1998
Publications 1997
Display all
Display less
Software
To homepage
Research
Software
See overview
The scyther-proof security protocol verification tool
FAST
SecFuzz
Midpoint Synthesis
MonPoly
ProtoVeriPhy
Developing Security Protocols by Refinement
Verification of IBM 4765's Persistent Memory Manager
BelLog
Alice&Bob protocols
The Scyther-Abstraction tool
SpCTL Synthesizer
The Consensus Verifier
WebCheck - Test Execution Checkpointing for Web Applications
Aerial
Account Access Graphs
CookieBlock - privacy enforcement extension
Display all
Display less
Services
Student portal
Alumni association
Staffnet
Contact
Login
Search
EN
Departments
ETH Zurich
D-INFK
Institute of Information Security
Information Security Group
Language Selection
English
You are here
Homepage
chevron_right
Research
chevron_right
…
Projects
Projects
Childpage navigation
Runtime Policy Monitoring and Enforcement
chevron_right
Igloo: End-to-End Verification of Distributed Systems
chevron_right
Analyzing Website Compliance with Privacy Regulations (GDPR and ePrivacy)
chevron_right
Authentication of Physical Documents
chevron_right
Cyber Trust Project
chevron_right
Formal Verification with the Tamarin Prover
chevron_right
Full-Stack Verification of Secure Inter-Domain Routing Protocols
chevron_right
An Authentic Digital EMblem (ADEM)
chevron_right
Model-driven Security and Privacy
chevron_right
Exploring Mechanisms of Website Compliance with Privacy Regulations
chevron_right
Our
current
research areas and projects include:
Access and Usage Control
chevron_right
Runtime Policy Monitoring and Enforcement
Cyber Trust
chevron_right
Cyber Trust Project
chevron_right
An Authenticated Digital EMblem (ADEM)
chevron_right
Authentication of Physical Documents
Formal Verification of Protocols and Systems
chevron_right
Formal Verification of Security Protocols with the Tamarin Prover
chevron_right
Full-Stack Verification of Secure Inter-Domain Routing Protocols
chevron_right
Igloo: End-to-End Verification of Distributed Systems
Analyzing Privacy Compliance
chevron_right
Analyzing Website Compliance with Privacy Regulations (GDPR and ePrivacy)
chevron_right
Exploring Mechanisms of Website Compliance with Privacy Regulations
Privacy and Data Protection
chevron_right
Model-driven Security and Privacy
Related Content
chevron_right
Completed projects
chevron_right
Publications
chevron_right
Software
chevron_left
Research
JavaScript has been disabled in your browser