Publications 2021

Lei Liang, Si Liu
Exploring Design Alternatives for Replicated RAMP Transactions Using Maude
In: IEEE TASE 2021
[external pageBIB | external pagePDF | external pageDOI]

Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa
Constrained Proximity Attacks on Mobile Targets
To appear in: ACM Transactions on Privacy and Security (TOPS)
[BIB | PDF | DOI]

Aleksi Peltonen, Ralf Sasse, and David Basin
A Comprehensive Analysis of 5G Handover
In: ACM WiSec 2021
[external pageBIB | DownloadPDF (PDF, 597 KB) | external pageDOI]

David Basin, Ralf Sasse, and Jorge Toro-Pozo
Card Brand Mixup Attack: Bypassing the PIN in non-Visa cards by Using Them for Visa Transactions
In: USENIX Security 2021
[DownloadBIB (BIB, 551 Bytes) | DownloadPDF (PDF, 1.6 MB) | external pageWEB]

David Basin, Ralf Sasse, and Jorge Toro-Pozo
The EMV Standard: Break, Fix, Verify
In: IEEE S&P 2021
[DownloadBIB (BIB, 503 Bytes) | DownloadPDF (PDF, 1.4 MB) | external pageWEB]

Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
The Provable Security of Ed25519: Theory and Practice
In: IEEE S&P 2021
[external pageBIB | external pagePDF | external pageDOI]

Tobias Klenze, Christoph Sprenger, David Basin
Formal Verification of Secure Forwarding Protocols
In: IEEE CSF 2021
[external pageBIB | DownloadPDF (PDF, 414 KB) | external pageDOI ]

Elisabet Burjons, Fabian Frei, Martin Raszyk
From Finite-Valued Nondeterministic Transducers to Deterministic Two-Tape Automata
In: ACM/IEEE LICS 2021
[external pageBIB | DownloadPDF (PDF, 315 KB) | external pageDOI]

David Basin, Jannik Dreier, Sofia Giampietro, Saša Radomirović
Verifying Table-Based Elections
In: CCS 2021
[external pageBIB | DownloadPDF (PDF, 1 MB) | external pageDOI]

Joshua Schneider, David Basin, Frederik Brix, Srđan Krstić, Dmitriy Traytel
Scalable Online First-Order Monitoring
In: Int. J. Softw. Tools Technol. Transf, 23(2): 185208

[DownloadBIB (BIB, 440 Bytes) | DownloadPDF (PDF, 457 KB) | external pageDOI]

David Basin
Formal Methods for Security
In: The Cyber Security Body of Knowledge, edited by Steve Schneider, p. 1-65, July 2021
[external pagePDF | external pageWEB]

JavaScript has been disabled in your browser