Publications 2013
- David Basin, Cas Cremers and Meier
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
in Journal of Computer Security
Pages 41-87, Vol. 21, No. 6, 2013
[Download BibTex (TXT, 1 KB) | external page DOI] - Angelo Gargantini, Marco Guarnieri and Eros Magri
AURORA: AUtomatic RObustness coveRage Analysis Tool
In Proceedings of the Sixth IEEE International Conference on Software Testing, Verification and Validation (ICST)
Pages 463 - 470, IEEE, 2013.
[Download BibTex (TXT, 334 Bytes) | external page DOI] - Marco Guarnieri, Mario Arrigoni Neri, Eros Magri, and Simone Mutti
On the notion of redundancy in access control policies
In Proceedings of the 18th ACM symposium on Access control models and technologies (SACMAT)
Pages 161-172, ACM, 2013.
[Download BibTex (TXT, 686 Bytes) | external page DOI] - Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, and Stefano Paraboschi
A Model-driven Approach for Securing Software Architectures
In Proceedings of the 10th International Conference on Security and Cryptography
Pages 595-602, SCITEPRESS, 2013.
[Download BibTex (TXT, 417 Bytes)] - Bruno Conchinha, David Basin and Carlos Caleiro
Symbolic probabilistic analysis of Off-line Guessing
In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)
LNCS 8134, pages 363-380, Springer, 2013.
[Download BibTex (TXT, 533 Bytes) | Download PDF (PDF, 396 KB) | external page DOI] - Joel Reardon, Hubert Ritzdorf, David Basin, and Srdjan Capkun
Secure Data Deletion from Persistent Media
In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS)
Pages 271-284, 2013.
[Download BibTex (TXT, 654 Bytes) | external page DOI] - Andreas Lochbihler
Native Word
Archive of Formal Proofs, formal proof development
September 2013.
[Download BibTex (BIB, 288 Bytes) | external page URL] - Daniel Fischer, David Basin, Knut Eckstein, and Thomas Engel
Predictable Mobile Routing for Spacecraft Networks
In IEEE Transactions on Mobile Computing
Pages 1174-1187, 2013.
[Download BibTex (TXT, 443 Bytes) | external page DOI] - Mario Frank, Joachim M. Buhmann, and David Basin
Role Mining with Probabilistic Models
In ACM Transactions on Information and System Security (TISSEC)
Pages 15:1-15:28, 2013.
[Download BibTex (TXT, 519 Bytes) | external page DOI] - David Basin, Matus Harvan, Felix Klaedtke, and Eugen Zalinescu
Monitoring Data Usage in Distributed Systems
In IEEE Transactions on Software Engineering
Vol. 39, Issue 10, pages 1403-1426, 2013.
[Download BibTex (BIB, 465 Bytes) | external page DOI] - Joel Reardon, Srdjan Capkun, David Basin
SoK: Secure Data Deletion
In Proceedings of the IEEE Symposium on Security and Privacy (S&P)
Pages 301-315, 2013.
[Download BibTex (TXT, 580 Bytes) | Download PDF (PDF, 177 KB) | Download slides (PDF, 223 KB) | external page DOI] - Thai Son Hoang
An Introduction to the Event-B Modelling Method
In Industrial Deployment of System Engineering Methods
Pages 211-236, Springer, 2013.
[Download BibTex (BIB, 459 Bytes) | external page DOI] - Abian Blome, Martin Ochoa, Keqin Li, Michele Peroli and Mohammad Torabi Dashti
VERA: A flexible model-based vulnerability testing tool
In Proceedings of the Sixth International Conference on Software Testing, Verification and Validation (ICST)
Pages 471-478, IEEE, 2013.
[Download BibTex (TXT, 502 Bytes) | external page DOI] - Cas Cremers and Michèle Feltz
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
In Designs, Codes and Cryptography
Pages 1-36, 2013.
[Download BibTex (TXT, 529 Bytes) | external page DOI] - Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, and Douglas Stebila
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)
LNCS 8134, pages 381-399, Springer, 2013.
[Download BibTex (TXT, 937 Bytes) | external page DOI] - Andreas Lochbihler
Ein maschinengeprüftes, typsicheres Modell der Nebenläufigkeit in Java: Sprachdefinition, virtuelle Maschine, Speichermodell und verifizierter Compiler
In Ausgezeichnete Informatikdissertationen 2012
Lecture Notes in Informatics D-13, pages 211-220, 2013.
[Download BibTex (BIB, 493 Bytes) | Download PDF (PDF, 386 KB)] - Andreas Lochbihler
Light-weight containers for Isabelle: efficient, extensible, nestable
In Interactive Theorem Proving (ITP)
LNCS 7998, pages 116-132, Springer, 2013.
[Download BibTex (BIB, 413 Bytes) | Download PDF (PDF, 386 KB) | external page DOI] - Naoto Sato, Thai Son Hoang, David Basin, Hironobu Kuruma
Verification for Monitoring Requirements of Train Monitoring Systems in Event-B
In Information Processing Society of Japan Journal
Vol. 54, no. 6, pages 1738-1750, June 2013.
[Download BibTex (TXT, 312 Bytes) | Download PDF (PDF, 1 MB) | external page DOI] - Simon Hudon and Thai Son Hoang
Systems Design Guided by Progress Concerns
In the Proceedings of the 10th Int. conference on intergrated Formal Methods (iFM)
LNCS 7940, Springer, June 2013.
[Download BibTex (TXT, 418 Bytes) | external page DOI] - Thai Son Hoang, Andreas Furst, and Jean-Raymond Abrial
Event-B Patterns and Their Tool Support
In Software and Systems Modelling,
Vol. 12, no. 2, pages 229–244, 2013.
[Download BibTex (BIB, 424 Bytes) | external page DOI] - Thai Son Hoang
Security invariants in discrete transition systems
In Formal Aspects of Computing,
Vol. 25, no. 1, pages 59–87, 2013.
[Download BibTex (TXT, 356 Bytes) | external page DOI] - Simon Meier, Benedikt Schmidt, Cas Cremers, and David Basin
The TAMARIN Prover for the Symbolic Analysis of Security Protocols
In the Proceedings of the 25th Int. Conference on Computer Aided Verification (CAV),
LNCS 8044, Springer, 2013, ISBN 978-3-642-39798-1
[Download BibTex (TXT, 546 Bytes) | external page DOI] - David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zalinescu
Monitoring of Temporal First-order Properties with Aggregations
In the Proceedings of the 4th Int. Conference on Runtime Verification (RV),
LNCS 8174, pages 40-58, Springer, 2013.
[Download BibTex (BIB, 492 Bytes) | external page DOI] - Petar Tsankov, Mohammad Torabi Dashti, and David Basin
Semi-valid Input Coverage for Fuzz Testing
In the Proceedings of the 22nd ACM Int. Symposium on Software Testing and Analysis (ISSTA),
Pages 56-66, 2013.
[Download BibTex (TXT, 663 Bytes) | Download PDF (PDF, 504 KB) | external page DOI] - David Basin and Thai Son Hoang
Technology Transfer
In Industrial Deployment of System Engineering Methods,
Chapter 13, pages 187-196, Springer, July 2013.
[Download BibTex (BIB, 448 Bytes) | Download PDF (PDF, 158 KB) | external page DOI] - Andreas Lochbihler
Light-weight Containers
Archive of Formal Proofs, formal proof development,
April 2013.
[Download BibTex (BIB, 297 Bytes) | external page URL] - Oliver Friedmann, Felix Klaedtke, and Martin Lange
Ramsey Goes Visibly Pushdown
In the Proceedings of the 40th Int. Colloquium on Automata, Languages and Programming (ICALP),
LNCS 7966, pages 224-237, Springer, 2013.
[Download BibTex (TXT, 733 Bytes) | external page DOI] - Binh Thanh Nguyen and Christoph Sprenger
Sound Security Protocol Transformations
In the Proceedings of the Second Int. Conference on Principles of Security and Trust (POST),
LNCS 7796, pages 83-104, Springer, 2013.
[Download BibTex (TXT, 634 Bytes) | external page DOI] - David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zalinescu
Monitoring Compliance Policies over Incomplete and Disagreeing Logs
In the Proceedings of the 3rd Int. Conference on Runtime Verification (RV)
LNCS 7687, pages 151-167, Springer, 2013.
[Download BibTex (TXT, 665 Bytes) | external page DOI] - Simon Meier and Cas Cremers and David A. Basin
Efficient Construction of Machine-Checked Symbolic Protocol Security Proofs
In Journal of Computer Security,
Vol. 21, no. 1, pages 41-87, 2013.
[Download BibTex (BIB, 2 KB) | external page DOI] - David Basin, Vincent Juge, Felix Klaedtke, Eugen Zalinescu
Enforceable Security Policies Revisited
In ACM Transactions on Information and System Security,
Vol. 16, Issue 1, 2013.
[Download BibTex (TXT, 425 Bytes) | external page DOI] - Editors: David A. Basin and John C. Mitchell
Second International Conference, Principles of Security and Trust
POST 2013, Springer Verlag, LNCS 7796, ISBN 978-3-642-36829-5
[Download BibTex (BIB, 656 Bytes) | Download cover (JPEG, 26 KB) | external page DOI ]