News 2013
Open source tool
Information Security Group helps Hitachi develop and deploy external page Formal Methods for highly reliable Software Systems
Media
- The ETH „President’s Selection“ of December 2013 points to the global risks. David Basin made a Download statement (PDF, 263 KB) about risk management.
- Download "Data protection and security" (PDF, 154 KB) in ETH Board annual report 2013.
- Download "Tracing security gaps" (PDF, 74 KB) in ETH Annual Report 2012.
- Cas Cremers’s research and teaching focus on information security, protocols, privacy, trust and formal methods.
Honours and Awards
Benedikt Schmidt: ETH medal 2013 for the dissertation
Books

Second International Conference, Principles of Security and Trust
Editors: David A. Basin and John C. Mitchell
POST 2013, Springer Verlag, LNCS 7796, ISBN 978-3-642-36829-5
Talks
- 5 December 2013 - 11:00h, CAB H 52
Speaker: Steffen Görlich, Zurich Cantonal Police
Title: "Digital Forensics - A practitioner’s perspective". Police work in the field of Digital Forensics. A presentation of real cases revealing possible solutions and everyday limitations.
- 29 October 2013 - 14:00h, CNB F 110
Speaker: Michael Rusinowitch, INRIA Loria
Title: Variables Automata over Infinite Alphabets (and Applications)
- 22 October 2013 - 16:00h, CNB F110
Speaker: Esfandiar Mohammadi, University of the Saarland
Title: Computational Soundness for ProVerif: Building a Bridge to Uniformity
- 29 August 2013 - 14:00h, CNB F110
Speaker: Lara Schmid, ETH Bachelor's Thesis
Title: Improving the ISO/IEC 11770 standard
- 27 August 2013 - 14:00h, CNB F110
Speaker: Cedric Staub, ETH Master's Thesis
Title: Adding support for user-defined sorts and sorted function symbols to Tamarin
- 22 July 2013 - 14:00h, CNB F110
Speaker: Zurab Khasidashvili, Intel Israel
Title: Bounded Model Checking at Word Level via Encodings into Effectively Propositional Logic
- 5 July 2013 - 13:15h, CNB F110
Speaker: Boris Köpf, IMDEA Software Institute, Madrid, Spain
Title: Static Analysis of Cache Side Channels
- 23 June 2013 - 14:00h, plenary speaker at 29th Conference on the Mathematical Foundations of Programming Semantics (MFPS XXIX)
Speaker: David Basin, Information Security Group, ETH Zurich
Title: Developing Security Protocols by Refinement
- 20 June 2013 - 16:15h, Computer Science Colloquium at Universität Innsbruck, Institut für Informatik
Speaker: David Basin, Information Security Group, ETH Zurich
Title: Monitoring Policy Compliance
- 17 June 2013 - 14:00h, The Summer Research Institute at EPF Lausanne (SuRI)
Speaker: David Basin, Information Security Group, ETH Zurich
Title: Developing Security Protocols by Refinement
- 28 May 2013 - 14:00h, CNB F110
Speaker: Sjouke Mauw, Univ. of Luxembourg
Title: Fair Parallel Multi-party Contract Signing Protocols
- 7 May 2013 - 14:00h, CNB F110
Speaker: Tristan Buchs, ETH Bachelor thesis presentation
Title: Investigating Semi-valid Input Coverage
- 29 April 2013 - 15:15h, CNB F110
Speaker: Tanja Werthmüller, ETH Master's Thesis
Title: Efficient Evaluation of PBel Access Control Policies
- 23 April 2013 - 14:00h, CNB F110
Speaker: Jannik Dreier, Ph.D. student University of Grenoble in VERIMAG Laboratory, France
Title: Formal Verification of eVoting and eAuction Protocols
- 19 April 2013 - 14:00h, CNB F110
Speaker: Thilo Weghorn, Master student LMU Germany
Title: Program Extraction in Constructive Analysis with the Proof Assistant MINLOG
- 12 March 2013 - 14:00h, CNB F110
Speaker: Ana Matos, Technical University of Lisbon
Title: Flow-policy awareness for distributed mobile code
- 7 March 2013 - 15:00h, CNB F110
Speaker: Carsten Schürmann, DemTech IT University of Copenhagen
Title: Programming Law
- 5 March 2013 - 14:00h, CNB F110
Speaker: Marco Rocchetto, Universiy of Verona
Title: Using Interpolation for the Verification of Security Protocols
- 22 January 2013 - 14:00h, CNB F110
Speaker: Marco Guzzella, ETH Bachelor thesis presentation
Title: Shortest string containing all permutations
- 21 January 2013 - 14:00h, CNB F110
Speaker: Matthijs Melissen, University of Luxembourg
Title: Virtual Multi-Protocol Attacks in Non-Repudiation Protocols