Publications 2023

F. Linker, D.Basin
ADEM: An Authentic Digital EMblem
In: 30th ACM Conference on Computer and Communications Security (CCS 2023)
[BIB | DownloadPDF (PDF, 863 KB) | external pageDOI]

M. Ochoa, H. Vanegas, J. Toro-Pozo, D. Basin
SealClub: Computer-aided Paper Document Authentication
In: Annual Computer Security Applications Conference (ACSAC) 2023
To appear [BIB | external pagePDF | external pageDOI]

A. Wong, E. Getahun Chekole, M. Ochoa, J. Zhou
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies
In: Computers and Security, 2023
[BIB | external pagePDF | external pageDOI]

David Basin, Srđan Krstić, Joshua Schneider, and Dmitriy Traytel
Correct and Efficient Policy Monitoring, a Retrospective
In: Proceedings of the 21st International Symposium on Automated Technology for Verification and Analysis (ATVA '23)
To appear [BIB | PDF | external pageDOI]

Jeniffer Lima Graf, Srđan Krstić, and Joshua Schneider
Metric First-order Temporal Logic with Complex Data Types
In: Proceedings of the 23rd International Conference on Runtime Verification (RV '23)
To appear [BIB | external pagePDF | external pageDOI]

David Basin, Daniel Stefan Dietiker, Srđan Krstić, Yvonne-Anne Pignolet, Martin Raszyk, Joshua Schneider, and Arshavir Ter-Gabrielyan
Monitoring the Internet Computer
In: Proceedings of the 25th International Symposium on Formal Methods (FM '23)
[external pageBIB | external pagePDF | external pageDOI]

Jiaxu Tian, Dapeng Zhi, Si Liu, Peixin Wang, Cheng Chen, and Min Zhang
Boosting Verification of Deep Reinforcement Learning via Piece-Wise Linear Decision Neural Networks
NeurIPS 2023
[BIB | PDF | DOI]

Matthias Brun, Reto Achermann, Tej Chajed, Jon Howell, Gerd Zellweger, and Andrea Lattuada
Beyond isolation: OS verification as a foundation for correct applications
In: Proceedings of the 19th Workshop on Hot Topics in Operating Systems (HOTOS '23)
[BIB | DownloadPDF (PDF, 538 KB) | external pageDOI]

Florian Turati, Karel Kubicek, Carlos Cotrini, and David Basin
Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google’s FLoC and the MinHash Hierarchy System
Privacy Enhancing Technologies Symposium (PETS), 2023
[external pagePDF | external pageDOI | external pageWEB]

Si Liu*, Huayi Duan*, Lukas Heimes, Marco Bearzi, Jodok Vieli, Adrian Perrig, and David Basin. (co-​first authors)
A Formal Framework for End-to-End DNS Resolution
ACM SIGCOMM 2023
[BIB | PDF | external pageDOI]

Zu-Ming Jiang, Si Liu, Manuel Rigger, and Zhendong Su
Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction
17th USENIX Symposium on Operating Systems Design and Implementation (OSDI'23).
[BIB | external pagePDF | external pageDOI]

Kaile Huang*, Si Liu*, Zhenge Chen, Hengfeng Wei, David Basin, Haixiang Li, and Anqun Pan (co-first authors)
Efficient Black-box Checking of Snapshot Isolation in Databases
49th International Conference on Very Large Data Bases (VLDB'23).
[external pageBIB | external pagePDF | external pageDOI]


Zhiyi Xue, Si Liu, Zhaodi Zhang, Yiting Wu, and Min Zhang
A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation
32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'23).
[external pageBIB | external pagePDF | external pageDOI]

Zhaodi Zhang, Zhiyi Xue, Yang Chen, Si Liu, Yueling Zhang, Jing Liu, and Min Zhang
Boosting Verified Training for Robust Image Classifications via Abstraction
The IEEE/CVF Conference on Computer Vision and Pattern Recognition 2023 (CVPR'23).
[BIB | external pagePDF | external pageDOI]

Huayi Duan, Fischer Rubén, Lou Jie, Si Liu, David Basin, and Adrian Perrig
RHINE: Robust and High-performance Internet Naming with E2E Authenticity
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI'23).
[external pageBIB | external pagePDF | external pageDOI]

Linard Arquint, Felix Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven Wiesner, David Basin, and Peter Müller
Sound Verification of Security Protocols: From Design to Interoperable Implementations
44th IEEE Symposium on Security and Privacy (S&P 2023).
[external pageBIB | external pagePDF | external pageDOI]

David A. Basin, Patrick Schaller, and Jorge Toro-Pozo
Inducing Authentication Failures to Bypass Credit Card PINs
32nd USENIX Security Symposium
[external pageBIB | DownloadPDF (PDF, 1 MB) | external pageWEB| external pageDOI]

JavaScript has been disabled in your browser