News 2013

Open source tool

Information Security Group helps Hitachi develop and deploy external pageFormal Methods for highly reliable Software Systems

Media

  • Cas Cremers’s research and teaching focus on information security, protocols, privacy, trust and formal methods.

Honours and Awards

Benedikt Schmidt: ETH medal 2013 for the dissertation

Books

Second International Conference, Principles of Security and Trust

Second International Conference, Principles of Security and Trust
Editors: David A. Basin and John C. Mitchell
POST 2013, Springer Verlag, LNCS 7796, ISBN 978-3-642-36829-5

Talks

  • 5 December 2013 - 11:00h, CAB H 52
    Speaker: Steffen Görlich, Zurich Cantonal Police
    Title: "Digital Forensics - A practitioner’s perspective". Police work in the field of Digital Forensics. A presentation of real cases revealing possible solutions and everyday limitations.
  • 29 October 2013 - 14:00h, CNB F 110
    Speaker: Michael Rusinowitch, INRIA Loria
    Title: Variables Automata over Infinite Alphabets (and Applications)
  • 22 October 2013 - 16:00h, CNB F110
    Speaker: Esfandiar Mohammadi, University of the Saarland
    Title: Computational Soundness for ProVerif: Building a Bridge to Uniformity
  • 29 August 2013 - 14:00h, CNB F110
    Speaker: Lara Schmid, ETH Bachelor's Thesis
    Title: Improving the ISO/IEC 11770 standard
  • 27 August 2013 - 14:00h, CNB F110
    Speaker: Cedric Staub, ETH Master's Thesis
    Title: Adding support for user-defined sorts and sorted function symbols to Tamarin
  • 22 July 2013 - 14:00h, CNB F110
    Speaker: Zurab Khasidashvili, Intel Israel
    Title: Bounded Model Checking at Word Level via Encodings into Effectively Propositional Logic
  • 5 July 2013 - 13:15h, CNB F110
    Speaker: Boris Köpf, IMDEA Software Institute, Madrid, Spain
    Title: Static Analysis of Cache Side Channels
  • 23 June 2013 - 14:00h, plenary speaker at 29th Conference on the Mathematical Foundations of Programming Semantics (MFPS XXIX)
    Speaker: David Basin, Information Security Group, ETH Zurich
    Title: Developing Security Protocols by Refinement
  • 20 June 2013 - 16:15h, Computer Science Colloquium at Universität Innsbruck, Institut für Informatik
    Speaker: David Basin, Information Security Group, ETH Zurich
    Title: Monitoring Policy Compliance
  • 17 June 2013 - 14:00h, The Summer Research Institute at EPF Lausanne (SuRI)
    Speaker: David Basin, Information Security Group, ETH Zurich
    Title: Developing Security Protocols by Refinement
  • 28 May 2013 - 14:00h, CNB F110
    Speaker: Sjouke Mauw, Univ. of Luxembourg
    Title: Fair Parallel Multi-party Contract Signing Protocols
  • 7 May 2013 - 14:00h, CNB F110
    Speaker: Tristan Buchs, ETH Bachelor thesis presentation
    Title: Investigating Semi-valid Input Coverage
  • 29 April 2013 - 15:15h, CNB F110
    Speaker: Tanja Werthmüller, ETH Master's Thesis
    Title: Efficient Evaluation of PBel Access Control Policies
  • 23 April 2013 - 14:00h, CNB F110
    Speaker: Jannik Dreier, Ph.D. student University of Grenoble in VERIMAG Laboratory, France
    Title: Formal Verification of eVoting and eAuction Protocols
  • 19 April 2013 - 14:00h, CNB F110
    Speaker: Thilo Weghorn, Master student LMU Germany
    Title: Program Extraction in Constructive Analysis with the Proof Assistant MINLOG
  • 12 March 2013 - 14:00h, CNB F110
    Speaker: Ana Matos, Technical University of Lisbon
    Title: Flow-policy awareness for distributed mobile code
  • 7 March 2013 - 15:00h, CNB F110
    Speaker: Carsten Schürmann, DemTech IT University of Copenhagen
    Title: Programming Law
  • 5 March 2013 - 14:00h, CNB F110
    Speaker: Marco Rocchetto, Universiy of Verona
    Title: Using Interpolation for the Verification of Security Protocols
  • 22 January 2013 - 14:00h, CNB F110
    Speaker: Marco Guzzella, ETH Bachelor thesis presentation
    Title: Shortest string containing all permutations
  • 21 January 2013 - 14:00h, CNB F110
    Speaker: Matthijs Melissen, University of Luxembourg
    Title: Virtual Multi-Protocol Attacks in Non-Repudiation Protocols

 

JavaScript has been disabled in your browser