Publications 2016
- Der-Yeuan Yu, Elizabeth Stobert, David Basin, Srdjan Capkun
Exploring Website Location as a Security Indicator
CoRR, 2016
[Download BIB (BIB, 261 Bytes) | external page PDF | external page DOI]
- Jasmin Blanchette, Andrei Popescu, Dmitriy Traytel
Soundness and Completeness Proofs by Coinductive Methods
In Journal of Automated Reasoning, 2016.
[external page DOI] - Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
SALVE: Server Authentication with Location Verification
22nd Annual International Conference on Mobile Computing and Networking (MobiCom) 2016
[Download BIB (BIB, 378 Bytes) | Download PDF (PDF, 454 KB) | external page DOI] - Michael Backes and Robert Künnemann and Esfandiar Mohammadi
Computational Soundness of Dalvik Bytecode
23rd ACM Conference on Computer and Communications Security (CCS 2016)
[Download BIB (BIB, 345 Bytes) | external page PDF | external page DOI] - David Basin, Søren Debois, Thomas T. Hildebrandt
In the Nick of Time: Proactive Prevention of Obligation Violations
CSF 2016: 120-134
[BIB | PDF | external page DOI] - Andreas Lochbihler, Joshua Schneider
Equational Reasoning with Applicative Functors
In Jasmin Christian Blanchette, Stefan Merz (Eds.), Interactive Theorem Proving (ITP 2016), LNCS 9807, pp. 252-273, 2016.
[Download BIB (BIB, 415 Bytes) | Download PDF (PDF, 287 KB) | external page DOI]
- Andreas Fürst, Thai Son Hoang, David Basin, Naoto Sato, Kunihiko Miyazaki
Large-scale System Development Using Abstract Data Types and Refinement
In Science of Computer Programming, 2016
[Download BIB (BIB, 471 Bytes) | PDF | external page DOI] - David Basin, Germano Caronni, Sarah Ereth, Matus Harvan, Felix Klaedtke, Heiko Mantel
Scalable Offline Monitoring of Temporal Specifications
In Formal Methods in System Design, 2016.
[BIB | PDF | external page DOI] - David Basin, Sasa Radomirovic, and Lara Schmid
Modeling Human Errors in Security Protocols
In 29th IEEE Computer Security Foundations Symposium (CSF16).
[Download BIB (BIB, 353 Bytes) | Download PDF (PDF, 349 KB) | external page DOI]
- Petar Tsankov, Mohammad Torabi Dashti, David Basin
Access Control Synthesis for Physical Spaces
In Proceedings of the IEEE Computer Security Foundations Symposium (CSF), 2016.
[Download BIB (BIB, 471 Bytes) | Download PDF (PDF, 401 KB)]
- Dmitriy Traytel
Formal Languages, Formally and Coinductively
In Formal Structures for Computation and Deduction (FSCD), 2016.
[external page DOI] - Andreas Lochbihler
A formal proof of the max-flow min-cut theorem for countable networks
Archive of Formal Proofs, 2016.
[Download BIB (BIB, 355 Bytes) | external page Link]
- Marco Guarnieri, Srdjan Marinovic, David Basin
Strong and Provably Secure Database Access Control
In 1st IEEE European Symposium on Security and Privacy, 2016.
[Download BIB (BIB, 266 Bytes) | Download PDF (PDF, 479 KB) | external page DOI | external page Technical Report ]
- Andreas Lochbihler
Probabilistic Functions and Cryptographic Oracles in Higher-Order Logic.
In: Peter Thiemann (Ed.), Programming Languages and Systems (ESOP 2016), LNCS 9632, pp. 503-531, Springer, 2016.
[Download BIB (BIB, 386 Bytes) | Download PDF (PDF, 480 KB) | external page DOI]
- Mohammad Torabi Dashti and David Basin
Security Testing Beyond Functional Tests
In Eight International Symposium on Engineering Secure Software and Systems (ESSOS), 2016.
[Download BIB (BIB, 605 Bytes) | Download PDF (PDF, 221 KB) | external page DOI]