Publications 2023
F. Linker, D.Basin
ADEM: An Authentic Digital EMblem
In: 30th ACM Conference on Computer and Communications Security (CCS 2023)
[BIB | Download PDF (PDF, 863 KB) | external page DOI]
M. Ochoa, H. Vanegas, J. Toro-Pozo, D. Basin
SealClub: Computer-aided Paper Document Authentication
In: Annual Computer Security Applications Conference (ACSAC) 2023
To appear [BIB | external page PDF | external page DOI]
A. Wong, E. Getahun Chekole, M. Ochoa, J. Zhou
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies
In: Computers and Security, 2023
[BIB | external page PDF | external page DOI]
David Basin, Srđan Krstić, Joshua Schneider, and Dmitriy Traytel
Correct and Efficient Policy Monitoring, a Retrospective
In: Proceedings of the 21st International Symposium on Automated Technology for Verification and Analysis (ATVA '23)
To appear [BIB | PDF | external page DOI]
Jeniffer Lima Graf, Srđan Krstić, and Joshua Schneider
Metric First-order Temporal Logic with Complex Data Types
In: Proceedings of the 23rd International Conference on Runtime Verification (RV '23)
To appear [BIB | external page PDF | external page DOI]
David Basin, Daniel Stefan Dietiker, Srđan Krstić, Yvonne-Anne Pignolet, Martin Raszyk, Joshua Schneider, and Arshavir Ter-Gabrielyan
Monitoring the Internet Computer
In: Proceedings of the 25th International Symposium on Formal Methods (FM '23)
[external page BIB | external page PDF | external page DOI]
Jiaxu Tian, Dapeng Zhi, Si Liu, Peixin Wang, Cheng Chen, and Min Zhang
Boosting Verification of Deep Reinforcement Learning via Piece-Wise Linear Decision Neural Networks
NeurIPS 2023
[BIB | PDF | DOI]
Matthias Brun, Reto Achermann, Tej Chajed, Jon Howell, Gerd Zellweger, and Andrea Lattuada
Beyond isolation: OS verification as a foundation for correct applications
In: Proceedings of the 19th Workshop on Hot Topics in Operating Systems (HOTOS '23)
[BIB | Download PDF (PDF, 538 KB) | external page DOI]
Florian Turati, Karel Kubicek, Carlos Cotrini, and David Basin
Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google’s FLoC and the MinHash Hierarchy System
Privacy Enhancing Technologies Symposium (PETS), 2023
[external page PDF | external page DOI | external page WEB]
Si Liu*, Huayi Duan*, Lukas Heimes, Marco Bearzi, Jodok Vieli, Adrian Perrig, and David Basin. (co-first authors)
A Formal Framework for End-to-End DNS Resolution
ACM SIGCOMM 2023
[BIB | PDF | external page DOI]
Zu-Ming Jiang, Si Liu, Manuel Rigger, and Zhendong Su
Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction
17th USENIX Symposium on Operating Systems Design and Implementation (OSDI'23).
[BIB | external page PDF | external page DOI]
Kaile Huang*, Si Liu*, Zhenge Chen, Hengfeng Wei, David Basin, Haixiang Li, and Anqun Pan (co-first authors)
Efficient Black-box Checking of Snapshot Isolation in Databases
49th International Conference on Very Large Data Bases (VLDB'23).
[external page BIB | external page PDF | external page DOI]
Zhiyi Xue, Si Liu, Zhaodi Zhang, Yiting Wu, and Min Zhang
A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation
32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'23).
[external page BIB | external page PDF | external page DOI]
Zhaodi Zhang, Zhiyi Xue, Yang Chen, Si Liu, Yueling Zhang, Jing Liu, and Min Zhang
Boosting Verified Training for Robust Image Classifications via Abstraction
The IEEE/CVF Conference on Computer Vision and Pattern Recognition 2023 (CVPR'23).
[BIB | external page PDF | external page DOI]
Huayi Duan, Fischer Rubén, Lou Jie, Si Liu, David Basin, and Adrian Perrig
RHINE: Robust and High-performance Internet Naming with E2E Authenticity
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI'23).
[external page BIB | external page PDF | external page DOI]
Linard Arquint, Felix Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven Wiesner, David Basin, and Peter Müller
Sound Verification of Security Protocols: From Design to Interoperable Implementations
44th IEEE Symposium on Security and Privacy (S&P 2023).
[external page BIB | external page PDF | external page DOI]
David A. Basin, Patrick Schaller, and Jorge Toro-Pozo
Inducing Authentication Failures to Bypass Credit Card PINs
32nd USENIX Security Symposium
[external page BIB | Download PDF (PDF, 1 MB) | external page WEB| external page DOI]