Publications 2021
Lei Liang, Si Liu
 Exploring Design Alternatives for Replicated RAMP Transactions Using Maude
 In: IEEE TASE 2021
 [external page BIB | external page PDF | external page DOI]
 
 Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa
 Constrained Proximity Attacks on Mobile Targets
 To appear in: ACM Transactions on Privacy and Security (TOPS)
 [BIB | PDF | DOI]
Aleksi Peltonen, Ralf Sasse, and David Basin
 A Comprehensive Analysis of 5G Handover
 In: ACM WiSec 2021
 [external page BIB | Download PDF (PDF, 597 KB) | external page DOI]
 
 David Basin, Ralf Sasse, and Jorge Toro-Pozo
 Card Brand Mixup Attack: Bypassing the PIN in non-Visa cards by Using Them for Visa Transactions
 In: USENIX Security 2021
 [Download BIB (BIB, 551 Bytes) | Download PDF (PDF, 1.6 MB) | external page WEB]
 
David Basin, Ralf Sasse, and Jorge Toro-Pozo
 The EMV Standard: Break, Fix, Verify
 In: IEEE S&P 2021
 [Download BIB (BIB, 503 Bytes) | Download PDF (PDF, 1.4 MB) | external page WEB]
Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
 The Provable Security of Ed25519: Theory and Practice
 In: IEEE S&P 2021
 [external page BIB | external page PDF | external page DOI]
 
 Tobias Klenze, Christoph Sprenger, David Basin
 Formal Verification of Secure Forwarding Protocols
 In: IEEE CSF 2021
 [external page BIB | Download PDF (PDF, 414 KB) | external page DOI ]
Elisabet Burjons, Fabian Frei, Martin Raszyk
 From Finite-Valued Nondeterministic Transducers to Deterministic Two-Tape Automata
 In: ACM/IEEE LICS 2021
 [external page BIB | Download PDF (PDF, 315 KB) | external page DOI]
 
 David Basin, Jannik Dreier, Sofia Giampietro, Saša Radomirović
 Verifying Table-Based Elections
 In: CCS 2021
 [external page BIB | Download PDF (PDF, 1 MB) | external page DOI]
Joshua Schneider, David Basin, Frederik Brix, Srđan Krstić, Dmitriy Traytel
 Scalable Online First-Order Monitoring
 In: Int. J. Softw. Tools Technol. Transf, 23(2): 185–208
 [Download BIB (BIB, 440 Bytes) | Download PDF (PDF, 457 KB) | external page DOI]
David Basin
 Formal Methods for Security
 In: The Cyber Security Body of Knowledge, edited by Steve Schneider, p. 1-65, July 2021
 [external page PDF | external page WEB]