Publications 2021
Lei Liang, Si Liu
Exploring Design Alternatives for Replicated RAMP Transactions Using Maude
In: IEEE TASE 2021
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made]
Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa
Constrained Proximity Attacks on Mobile Targets
To appear in: ACM Transactions on Privacy and Security (TOPS)
[BIB | PDF | DOI]
Aleksi Peltonen, Ralf Sasse, and David Basin
A Comprehensive Analysis of 5G Handover
In: ACM WiSec 2021
[external pageBIBcall_made | DownloadPDF (PDF, 597 KB)vertical_align_bottom | external pageDOIcall_made]
David Basin, Ralf Sasse, and Jorge Toro-Pozo
Card Brand Mixup Attack: Bypassing the PIN in non-Visa cards by Using Them for Visa Transactions
In: USENIX Security 2021
[DownloadBIB (BIB, 551 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1.6 MB)vertical_align_bottom | external pageWEBcall_made]
David Basin, Ralf Sasse, and Jorge Toro-Pozo
The EMV Standard: Break, Fix, Verify
In: IEEE S&P 2021
[DownloadBIB (BIB, 503 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1.4 MB)vertical_align_bottom | external pageWEBcall_made]
Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
The Provable Security of Ed25519: Theory and Practice
In: IEEE S&P 2021
[external pageBIBcall_made | external pagePDFcall_made | external pageDOIcall_made]
Tobias Klenze, Christoph Sprenger, David Basin
Formal Verification of Secure Forwarding Protocols
In: IEEE CSF 2021
[external pageBIBcall_made | DownloadPDF (PDF, 414 KB)vertical_align_bottom | external pageDOIcall_made ]
Elisabet Burjons, Fabian Frei, Martin Raszyk
From Finite-Valued Nondeterministic Transducers to Deterministic Two-Tape Automata
In: ACM/IEEE LICS 2021
[external pageBIBcall_made | DownloadPDF (PDF, 315 KB)vertical_align_bottom | external pageDOIcall_made]
David Basin, Jannik Dreier, Sofia Giampietro, Saša Radomirović
Verifying Table-Based Elections
In: CCS 2021
[external pageBIBcall_made | DownloadPDF (PDF, 1 MB)vertical_align_bottom | external pageDOIcall_made]
Joshua Schneider, David Basin, Frederik Brix, Srđan Krstić, Dmitriy Traytel
Scalable Online First-Order Monitoring
In: Int. J. Softw. Tools Technol. Transf, 23(2): 185–208
[DownloadBIB (BIB, 440 Bytes)vertical_align_bottom | DownloadPDF (PDF, 457 KB)vertical_align_bottom | external pageDOIcall_made]
David Basin
Formal Methods for Security
In: The Cyber Security Body of Knowledge, edited by Steve Schneider, p. 1-65, July 2021
[external pagePDFcall_made | external pageWEBcall_made]