Publications 2021
Lei Liang, Si Liu
Exploring Design Alternatives for Replicated RAMP Transactions Using Maude
In: IEEE TASE 2021
[external page BIB | external page PDF | external page DOI]
Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa
Constrained Proximity Attacks on Mobile Targets
To appear in: ACM Transactions on Privacy and Security (TOPS)
[BIB | PDF | DOI]
Aleksi Peltonen, Ralf Sasse, and David Basin
A Comprehensive Analysis of 5G Handover
In: ACM WiSec 2021
[external page BIB | Download PDF (PDF, 597 KB) | external page DOI]
David Basin, Ralf Sasse, and Jorge Toro-Pozo
Card Brand Mixup Attack: Bypassing the PIN in non-Visa cards by Using Them for Visa Transactions
In: USENIX Security 2021
[Download BIB (BIB, 551 Bytes) | Download PDF (PDF, 1.6 MB) | external page WEB]
David Basin, Ralf Sasse, and Jorge Toro-Pozo
The EMV Standard: Break, Fix, Verify
In: IEEE S&P 2021
[Download BIB (BIB, 503 Bytes) | Download PDF (PDF, 1.4 MB) | external page WEB]
Jacqueline Brendel, Cas Cremers, Dennis Jackson, Mang Zhao
The Provable Security of Ed25519: Theory and Practice
In: IEEE S&P 2021
[external page BIB | external page PDF | external page DOI]
Tobias Klenze, Christoph Sprenger, David Basin
Formal Verification of Secure Forwarding Protocols
In: IEEE CSF 2021
[external page BIB | Download PDF (PDF, 414 KB) | external page DOI ]
Elisabet Burjons, Fabian Frei, Martin Raszyk
From Finite-Valued Nondeterministic Transducers to Deterministic Two-Tape Automata
In: ACM/IEEE LICS 2021
[external page BIB | Download PDF (PDF, 315 KB) | external page DOI]
David Basin, Jannik Dreier, Sofia Giampietro, Saša Radomirović
Verifying Table-Based Elections
In: CCS 2021
[external page BIB | Download PDF (PDF, 1 MB) | external page DOI]
Joshua Schneider, David Basin, Frederik Brix, Srđan Krstić, Dmitriy Traytel
Scalable Online First-Order Monitoring
In: Int. J. Softw. Tools Technol. Transf, 23(2): 185–208
[Download BIB (BIB, 440 Bytes) | Download PDF (PDF, 457 KB) | external page DOI]
David Basin
Formal Methods for Security
In: The Cyber Security Body of Knowledge, edited by Steve Schneider, p. 1-65, July 2021
[external page PDF | external page WEB]