Publications 2017

  • David Basin, Srdjan Krstic and Dmitriy Traytel
    AERIAL: Almost Event-Rate Independent Algorithms for Monitoring Metric Regular Properties
    RV-CuBES 2017
    [Download BIB (BIB, 669 Bytes) | external page PDF]
  • David Basin, Felix Klaedtke and Eugen Zalinescu.
    The MonPoly Monitoring Tool
    RV-CuBES 2017
    [Download BIB (BIB, 595 Bytes) | external page PDF]
  • Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, and Esfandiar Mohammadi
    AnoA: A Framework for Analyzing Anonymous Communication Protocols.
    In Journal of Privacy and Confidentiality, 2017.
    [external page BIB | external page DOI]
  • Sebastian Meiser, Esfandiar Mohammadi
    Ratio Buckets: A Numeric Method for k-fold Tight Differential Privacy
    IACR Cryptology ePrint Archive: Report 2017/1034, 2017.
    [external page BIB | external page PDF]
  • Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
    Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two
    IACR Cryptology ePrint Archive: Report 2017/954, 2017.
    [external page BIB | external page PDF]
  • David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani, Srdjan Capkun
    CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks
    IACR Cryptology ePrint Archive: Report 2017/191, 2017.
    [external page BIB | external page PDF]
  • Carlos Cotrini, Thilo Weghorn, David Basin
    Mining ABAC Policies from Sparse Logs
    To appear in 3rd IEEE European Symposium on Security and Privacy (Euro S&P 2018).
    [BIB | Download PDF (PDF, 1.7 MB) | DOI]
  • David Basin, Cas Cremers, Jannik Dreier, Ralf Sasse
    Symbolically Analyzing Security Protocols using Tamarin
    ACM SIGLOG Newsletter, October 2017, Vol. 4, Num. 4, pp. 19-30
    [Download BIB (BIB, 416 Bytes) | Download PDF (PDF, 445 KB) | external page DOI]
  • Christoph Sprenger and David Basin
    Refining Security Protocols
    Journal of Computer Security, Vol. 26, No. 1, pp. 71-120, 2018.
    [BIB | PDF | external page DOI]
  • Christoph Sprenger and Ivano Somaini
    Developing Security Protocols by Refinement
    Archive of Formal Proofs, 2017.
    [BIB | external page Link]
  • David Basin, Felix Klaedtke and Eugen Zalinescu
    Algorithms for Monitoring Real-time Properties
    To appear in Acta Informatica
    [BIB | PDF | DOI]
  • David Basin, Cas Cremers and Catherine Meadows
    Model Checking Security Protocols
    To appear in Handbook of Model Checking, edited by Edmund Clarke, Tom Henzinger and Helmut Veith
    [BIB | PDF | DOI]
  • David Basin, Hans Gersbach, Akaki Mamageishvili, Lara Schmid, and Oriol Tejada.
    Election Security and Economics: It’s all about Eve
    To appear in Second International Joint Conference on Electronic
    Voting (EvoteID), 2017
    [BIB | PDF | external page DOI]
  • Mohammad Torabi Dashti and David Basin
    Tests and Refutation
    in: Fifteenth Int. Symposium on Automated Technology for Verification and Analysis (ATVA), 2017
    [BIB | PDF | external page DOI]
  • Andreas Lochbihler
    Effect polymorphism in higher-order logic (proof pearl)
    In: Interactive Theorem Proving (ITP 2017), LNCS 10499, pp. 389-409, 2017.
    [Download BIB (BIB, 403 Bytes) | Download PDF (PDF, 289 KB) | external page DOI]
  • Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin Vechev
    Synthesis of Permissive Privacy Enforcement
    in: 24th ACM Conference on Computer and Communications Security (CCS), 2017
    [BIB | Download PDF (PDF, 991 KB) | DOI]
  • Marco Guarnieri, Srdjan Marinovic, David A. Basin
    Securing Databases from Probabilistic Inferences
    in: 30th IEEE Computer Security Foundations Symposium (CSF), 2017
    [BIB | Download PDF (PDF, 521 KB) | external page DOI | external page Extended Version]
  • David Basin, Srđan Krstić, Dmitriy Traytel
    Almost Event-Rate Independent Monitoring of Metric Dynamic Logic
    in: 17th International Conference on Runtime Verification (RV), 2017
    [BIB | PDF | external page DOI]
  • Marco Guarnieri, Petar Tsankov, Tristan Buchs, Mohammad Torabi Dashti, David A. Basin
    Test Execution Checkpointing for Web Applications
    in: 26th International Symposium on Software Testing and Analysis (ISSTA), 2017
    [BIB | PDF | external page DOI]
  • David A. Basin, Felix Klaedtke, Eugen Zalinescu
    Runtime Verification of Temporal Properties over Out-of-order Data Streams
    in: 29th International Conference on Computer-Aided Verification (CAV), 2017
    [BIB | PDF | external page DOI]
  • Ognjen Maric, Christoph Sprenger, David A. Basin
    Cutoff Bounds for Consensus Algorithms
    in: 29th International Conference on Computer-Aided Verification (CAV), 2017
    [BIB | PDF | external page DOI]
  • David A. Basin, Bhargav Nagaraja Bhatt, Dmitriy Traytel
    Almost Event-Rate Independent Monitoring of Metric Temporal Logic
    in: 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 2017
    [BIB | PDF | external page DOI]
  • Joseph Lallemand, David A. Basin, Christoph Sprenger
    Refining Authenticated Key Agreement with Strong Adversaries
    in: 2nd IEEE European Symposium on Security and Privacy (Euro S&P), 2017
    [BIB | PDF | external page DOI]
  • Joseph Lallemand and Christoph Sprenger
    Refining Authenticated Key Agreement with Strong Adversaries
    Archive of Formal Proofs, 2017.
    [BIB | external page Link]
  • Michèle Feltz and Cas Cremers
    Strengthening the security of authenticated key exchange against bad randomness
    in: Designs, Codes and Cryptography, pp 1-36, 2017
    [Download BIB (BIB, 1 KB) | external page PDF | external page DOI]
  • Jannik Dreier, Charles Dumenil, Steve Kremer, Ralf Sasse
    Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
    in: Principles of Security and Trust. POST 2017. Lecture Notes in Computer Science, vol 10204. pp 117-140. Springer, Berlin, Heidelberg.
    [Download BIB (BIB, 401 Bytes) | Download PDF (PDF, 330 KB) | external page DOI]
  • Jasmin Christian Blanchette, Aymeric Bouzy, Andreas Lochbihler, Andrei Popescu, and Dmitriy Traytel
    Friends with Benefits: Implementing Corecursion in Foundational Proof Assistants
    In: H. Yang (Ed.), Programming Languages and Systems (ESOP 2017), LNCS 10201, pp. 111-140, Springer, 2017.
    [Download BIB (BIB, 443 Bytes) | Download PDF (PDF, 295 KB) | external page DOI | Download long version (PDF, 390 KB)]
  • Andreas Lochbihler
    Probabilistic while loop
    Archive of Formal Proofs, 2017.
    [Download BIB (BIB, 337 Bytes) | external page Link]
  • Joshua Schneider, Manuel Eberl, and Andreas Lochbihler
    Monad normalisation
    Archive of Formal Proofs, 2017.
    [Download BIB (BIB, 369 Bytes) | external page Link]
  • Andreas Lochbihler
    Effect polymorphism in higher-order logic
    Archive of Formal Proofs, 2017.
    [Download BIB (BIB, 349 Bytes) | external page Link]
  • Andreas Lochbihler
    CryptHOL
    Archive of Formal Proofs, 2017.
    [Download BIB (BIB, 298 Bytes) | external page Link]
  • Andreas Lochbihler, S. Reza Sefidgar, and Bhargav Bhatt
    Game-based cryptography in HOL
    Archive of Formal Proofs, 2017.
    [Download BIB (BIB, 377 Bytes) | external page Link]
JavaScript has been disabled in your browser