Publications 2018

Tobias Klenze, Giacomo Giuliari, Christos Pappas, Adrian Perrig, David Basin
Networking, in Heaven as on Earth
In: Proceedings of the 17th ACM Workshop on Hot Topics in Networks, HotNets 2018
[DownloadBIB (BIB, 740 Bytes) | PDF | external pageDOI]

Yliès Falcone, Srđan Krstić, Giles Reger, Dmitriy Traytel
A Taxonomy for Classifying Runtime Verification Tools
In18th International Conference on Runtime Verification (RV 2018), Limassol, Cyprus, 2018.
[DownloadBIB (BIB, 740 Bytes) | PDF | external pageDOI]

Joshua Schneider, David Basin, Frederik Brix, Srđan Krstić, Dmitriy Traytel
Scalable Online First-Order Monitoring
In: 18th International Conference on Runtime Verification (RV 2018), Limassol, Cyprus, 2018.
[DownloadBIB (BIB, 740 Bytes) | DownloadPDF (PDF, 335 KB) | external pageDOI]

David A. Basin, Bhargav Nagaraja Bhatt, Dmitriy Traytel
Optimal Proofs for Linear Temporal Logic on Lasso Words
In: 16th International Symposium on Automated Technology for Verification and Analysis (ATVA 2018), Los Angeles USA, 2018.
[DownloadBIB (BIB, 740 Bytes) | PDF | external pageDOI]

Sebastian Meiser and Esfandiar Mohammadi
Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy
In: ACM Conference on Computer and Communications Security (CCS), Toronto Canada, 2018.
[external pageBIB | external pagePDF | external pageDOI]

David Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler
A Formal Analysis of 5G Authentication
In: ACM Conference on Computer and Communications Security (CCS), Toronto Canada, 2018.
[DownloadBIB (BIB, 729 Bytes) | external pagePDF | external pageDOI]

David Baelde, Stéphanie Delaune, Lucca Hirschi
POR for Security Protocol Equivalences : Beyond Action-Determinism
In: European Symposium on Research in Computer Security (ESORICS), Barcelona Spain, 2018.
[DownloadBIB (BIB, 2 KB) | PDF | external pageDOI]

David Basin, Søren Debois and Thomas Hildebrandt
On purpose and by necessity: Compliance under the GDPR
In: Financial Cryptography (FC), Curaçao, February 2018.
[DownloadBIB (BIB, 740 Bytes) | PDF | external pageDOI]

Anders Schlichtkrull, Jasmin Christian Blanchette, Dmitriy Traytel, Uwe Waldmann
Formalizing Bachmair and Ganzinger's Ordered Resolution Prover
In: Galmiche, D., Schulz, S., Sebastiani, S. (eds.) 9th International Joint Conference on Automated Reasoning (IJCAR 2018), Springer, 2018, LNCS 10900, pp. 89–107.
[DownloadBIB (BIB, 2 KB) | DownloadPDF (PDF, 267 KB) | external pageDOI]

Binh Thanh Nguyen, Christoph Sprenger, and Cas Cremers
Sound Abstractions for Security Protocol Verification
In: Journal of Computer Security, 26(4): 459-508, 2018.
[DownloadBIB (BIB, 340 Bytes) | DownloadPDF (PDF, 846 KB) | external pageDOI]

David Basin, Sasa Radomirovic and Lara Schmid
Alethea: A Provably Secure Random Sample Voting Protocol
In: 31st IEEE Computer Security Foundations Symposium (CSF), Oxford UK, July 2018.
[DownloadBIB (BIB, 1 KB) | DownloadPDF (PDF, 505 KB) | external pageDOI]

Andreas Lochbihler, S. Reza Sefidgar
Constructive Cryptography in HOL
In: Archive of Formal Proofs, 2018.
[DownloadBIB (BIB, 355 Bytes) | external pageDOI]

Andreas Lochbihler, S. Reza Sefidgar
A tutorial introduction to CryptHOL
In: Cryptology ePrint Archive, Report 2018/941, 2018.
[DownloadBIB (BIB, 273 Bytes) | external pagePDF | external pageDOI]

Andreas Lochbihler
Effect polymorphism in higher-order logic (proof pearl)
In: Journal of Automated Reasoning.
[external pageBIB | DownloadPDF (PDF, 277 KB) | external pageDOI]

Andreas Lochbihler and Pascal Stoop
Lazy algebraic types in Isabelle/HOL
In: Isabelle Workshop, 2018.
[external pageBIB | external pagePDF | external pageDOI]

Andreas Lochbihler
Mechanising a type-safe model of multithreaded Java with a verified compiler
In: Journal of Automated Reasoning 63(1):243-332, June 2018.
[DownloadBIB (BIB, 2 KB) | DownloadPDF (PDF, 837 KB) | external pageDOI]

Andreas Lochbihler, Joshua Schneider
Relational Parametricity and Quotient Preservation for Modular (Co)datatypes
In: 9th International Conference on Interactive Theorem Proving (ITP), Oxford, UK, July 2018. LNCS 10895, Springer, pages 411–431.
[DownloadBIB (BIB, 437 Bytes) | DownloadPDF (PDF, 289 KB) | external pageDOI]

Andreas Lochbihler
Fast machine words in Isabelle/HOL
In: 9th International Conference on Interactive Theorem Proving (ITP), Oxford, UK, July 2018. LNCS 10895, Springer, pages 388–410.
[external pageBIB | DownloadPDF (PDF, 322 KB) | external pageDOI]

David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler
A Formal Analysis of 5G Authentication
In: CoRR abs/1806.10360, 2018.
[DownloadBIB (BIB, 670 Bytes) | external pagePDF | external pageDOI]

David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure
In: IEEE Trans. Dependable Sec. Comput. 15(3): 393-408, 2018.
[DownloadBIB (BIB, 603 Bytes) | DownloadPDF (PDF, 687 KB) | external pageDOI]

Carlos Cotrini, Thilo Weghorn and David Basin
Mining ABAC Rules from Sparse Logs
In: 3rd IEEE European Symposium on Security and Privacy (EuroS&P), London England, April 2018.
[DownloadBIB (BIB, 1 KB) | DownloadPDF (PDF, 1.3 MB) | external pageDOI]

David A. Basin, Felix Klaedtke and Eugen Zalinescu
Algorithms for monitoring real-time properties
In: Acta Informatica, 55:4, pages 309-338, 2018.
[DownloadBIB (BIB, 351 Bytes) | DownloadPDF (PDF, 703 KB) | external pageDOI]

Gabriele Costa, David Basin, Chiara Bodei, Pierpaolo Degano and Letterio Galletta
From Natural Projection to Partial Model Checking and Back

In: 24rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
Pages 344–361, Thessaloniki, Greece, April 2018, Springer LNCS, 10805.
[DownloadBIB (BIB, 1 KB) | DownloadPDF (PDF, 784 KB) | external pageDOI]

David Basin, Cas Cremers and Catherine Meadows
Model Checking Security Protocols. Handbook of Model Checking
edited by Edmund Clarke, Tom Henzinger, Helmut Veith and Roderick Bloem
Pages 727–762, Springer 2018.
[DownloadBIB (BIB, 1 KB) | DownloadPDF (PDF, 919 KB) | external pageDOI]

Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
In: 31st IEEE Computer Security Foundations Symposium (CSF), 2018, pages 359-373.
[DownloadBIB (BIB, 1 KB) | DownloadPDF (PDF, 396 KB) | external pageDOI]

Christoph Sprenger, David Basin
Refining security protocols
In: Journal of Computer Security, 26(1): 71-120, 2018.
[BIB | PDF | external pageDOI]

Peter Lammich, Andreas Lochbihler
Automatic Refinement to Efficient Data Structures: A Comparison of Two Approaches
In: Journal of Automated Reasoning, March 2018, pages 1-42.
[DownloadBIB (BIB, 2 KB) | DownloadPDF (PDF, 599 KB) | external pageDOI]

Michèle Feltz, Cas Cremers
Strengthening the security of authenticated key exchange against bad randomness
In: Designs, Codes and Cryptography, March 2018, pages 481-516.
[DownloadBIB (BIB, 1 KB) | DownloadPDF (PDF, 629 KB) | external pageDOI]

Der-Yeuan Yu, Elizabeth Stobert, David A. Basin, Srdjan Capkun
Exploring Website Location as a Security Indicator
In Proceedings of the NDSS Workshop on Usable Security (USEC), Internet Society, 2018.
[DownloadBIB (BIB, 337 Bytes) | DownloadPDF (PDF, 684 KB) | external pageDOI]

Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two
In: 39th IEEE Symposium on Security and Privacy (S&P), San Francisco USA, pages 170-188, 2018.
[external pageBIB | external pagePDF | external pageDOI]

Andreas Lochbihler, Joshua Schneider
Bounded Natural Functors with Covariance and Contravariance
In: Archive of Formal Proofs, 2018.
[DownloadBIB (BIB, 365 Bytes) | DownloadPDF (PDF, 421 KB) | external pageDOI]

JavaScript has been disabled in your browser