Publications 2017
- David Basin, Srdjan Krstic and Dmitriy Traytel
AERIAL: Almost Event-Rate Independent Algorithms for Monitoring Metric Regular Properties
RV-CuBES 2017
[Download BIB (BIB, 669 Bytes) | external page PDF] - David Basin, Felix Klaedtke and Eugen Zalinescu.
The MonPoly Monitoring Tool
RV-CuBES 2017
[Download BIB (BIB, 595 Bytes) | external page PDF] - Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, and Esfandiar Mohammadi
AnoA: A Framework for Analyzing Anonymous Communication Protocols.
In Journal of Privacy and Confidentiality, 2017.
[external page BIB | external page DOI]
- Sebastian Meiser, Esfandiar Mohammadi
Ratio Buckets: A Numeric Method for k-fold Tight Differential Privacy
IACR Cryptology ePrint Archive: Report 2017/1034, 2017.
[external page BIB | external page PDF]
- Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two
IACR Cryptology ePrint Archive: Report 2017/954, 2017.
[external page BIB | external page PDF]
- David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani, Srdjan Capkun
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks
IACR Cryptology ePrint Archive: Report 2017/191, 2017.
[external page BIB | external page PDF] - Carlos Cotrini, Thilo Weghorn, David Basin
Mining ABAC Policies from Sparse Logs
To appear in 3rd IEEE European Symposium on Security and Privacy (Euro S&P 2018).
[BIB | Download PDF (PDF, 1.7 MB) | DOI]
- David Basin, Cas Cremers, Jannik Dreier, Ralf Sasse
Symbolically Analyzing Security Protocols using Tamarin
ACM SIGLOG Newsletter, October 2017, Vol. 4, Num. 4, pp. 19-30
[Download BIB (BIB, 416 Bytes) | Download PDF (PDF, 445 KB) | external page DOI] - Christoph Sprenger and David Basin
Refining Security Protocols
Journal of Computer Security, Vol. 26, No. 1, pp. 71-120, 2018.
[BIB | PDF | external page DOI] - Christoph Sprenger and Ivano Somaini
Developing Security Protocols by Refinement
Archive of Formal Proofs, 2017.
[BIB | external page Link]
- David Basin, Felix Klaedtke and Eugen Zalinescu
Algorithms for Monitoring Real-time Properties
To appear in Acta Informatica
[BIB | PDF | DOI] - David Basin, Cas Cremers and Catherine Meadows
Model Checking Security Protocols
To appear in Handbook of Model Checking, edited by Edmund Clarke, Tom Henzinger and Helmut Veith
[BIB | PDF | DOI] - David Basin, Hans Gersbach, Akaki Mamageishvili, Lara Schmid, and Oriol Tejada.
Election Security and Economics: It’s all about Eve
To appear in Second International Joint Conference on Electronic
Voting (EvoteID), 2017
[BIB | PDF | external page DOI] - Mohammad Torabi Dashti and David Basin
Tests and Refutation
in: Fifteenth Int. Symposium on Automated Technology for Verification and Analysis (ATVA), 2017
[BIB | PDF | external page DOI] - Andreas Lochbihler
Effect polymorphism in higher-order logic (proof pearl)
In: Interactive Theorem Proving (ITP 2017), LNCS 10499, pp. 389-409, 2017.
[Download BIB (BIB, 403 Bytes) | Download PDF (PDF, 289 KB) | external page DOI]
- Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin Vechev
Synthesis of Permissive Privacy Enforcement
in: 24th ACM Conference on Computer and Communications Security (CCS), 2017
[BIB | Download PDF (PDF, 991 KB) | DOI] - Marco Guarnieri, Srdjan Marinovic, David A. Basin
Securing Databases from Probabilistic Inferences
in: 30th IEEE Computer Security Foundations Symposium (CSF), 2017
[BIB | Download PDF (PDF, 521 KB) | external page DOI | external page Extended Version] - David Basin, Srđan Krstić, Dmitriy Traytel
Almost Event-Rate Independent Monitoring of Metric Dynamic Logic
in: 17th International Conference on Runtime Verification (RV), 2017
[BIB | PDF | external page DOI] - Marco Guarnieri, Petar Tsankov, Tristan Buchs, Mohammad Torabi Dashti, David A. Basin
Test Execution Checkpointing for Web Applications
in: 26th International Symposium on Software Testing and Analysis (ISSTA), 2017
[BIB | PDF | external page DOI] - David A. Basin, Felix Klaedtke, Eugen Zalinescu
Runtime Verification of Temporal Properties over Out-of-order Data Streams
in: 29th International Conference on Computer-Aided Verification (CAV), 2017
[BIB | PDF | external page DOI] - Ognjen Maric, Christoph Sprenger, David A. Basin
Cutoff Bounds for Consensus Algorithms
in: 29th International Conference on Computer-Aided Verification (CAV), 2017
[BIB | PDF | external page DOI] - David A. Basin, Bhargav Nagaraja Bhatt, Dmitriy Traytel
Almost Event-Rate Independent Monitoring of Metric Temporal Logic
in: 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 2017
[BIB | PDF | external page DOI] - Joseph Lallemand, David A. Basin, Christoph Sprenger
Refining Authenticated Key Agreement with Strong Adversaries
in: 2nd IEEE European Symposium on Security and Privacy (Euro S&P), 2017
[BIB | PDF | external page DOI]
- Joseph Lallemand and Christoph Sprenger
Refining Authenticated Key Agreement with Strong Adversaries
Archive of Formal Proofs, 2017.
[BIB | external page Link]
- Michèle Feltz and Cas Cremers
Strengthening the security of authenticated key exchange against bad randomness
in: Designs, Codes and Cryptography, pp 1-36, 2017
[Download BIB (BIB, 1 KB) | external page PDF | external page DOI] - Jannik Dreier, Charles Dumenil, Steve Kremer, Ralf Sasse
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
in: Principles of Security and Trust. POST 2017. Lecture Notes in Computer Science, vol 10204. pp 117-140. Springer, Berlin, Heidelberg.
[Download BIB (BIB, 401 Bytes) | Download PDF (PDF, 330 KB) | external page DOI] - Jasmin Christian Blanchette, Aymeric Bouzy, Andreas Lochbihler, Andrei Popescu, and Dmitriy Traytel
Friends with Benefits: Implementing Corecursion in Foundational Proof Assistants
In: H. Yang (Ed.), Programming Languages and Systems (ESOP 2017), LNCS 10201, pp. 111-140, Springer, 2017.
[Download BIB (BIB, 443 Bytes) | Download PDF (PDF, 295 KB) | external page DOI | Download long version (PDF, 390 KB)] - Andreas Lochbihler
Probabilistic while loop
Archive of Formal Proofs, 2017.
[Download BIB (BIB, 337 Bytes) | external page Link] - Joshua Schneider, Manuel Eberl, and Andreas Lochbihler
Monad normalisation
Archive of Formal Proofs, 2017.
[Download BIB (BIB, 369 Bytes) | external page Link] - Andreas Lochbihler
Effect polymorphism in higher-order logic
Archive of Formal Proofs, 2017.
[Download BIB (BIB, 349 Bytes) | external page Link]
- Andreas Lochbihler
CryptHOL
Archive of Formal Proofs, 2017.
[Download BIB (BIB, 298 Bytes) | external page Link]
- Andreas Lochbihler, S. Reza Sefidgar, and Bhargav Bhatt
Game-based cryptography in HOL
Archive of Formal Proofs, 2017.
[Download BIB (BIB, 377 Bytes) | external page Link]