Available papers

Information Security

Responsible: Christoph Sprenger

  • Modeling and Analyzing Security in the Presence of Compromising Adversaries
    David Basin and Cas Cremers
  • A Hierarchy of Authentication Specifications
    Gavin Lowe
  • Constraint Solving for Bounded-Process Cryptographic Protocol Analysis
    Jonathan Millen and Vitaly Shmatikov
  • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    Bruno Blanchet
  • Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs
    Simon Meier, Cas Cremers, and David Basin
  • Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps
    Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, and Llanos Tobarra
  • Secret-Ballot Receipts: True Voter-Verifiable Elections
    David Chaum
  • A Practical Voter-Verifiable Election Scheme
    David Chaum, Peter Y. A. Ryan, and Steve A. Schneider
  • Verifying privacy-type properties of electronic voting protocols
    Stéphanie Delaune, Steve Kremer, and Mark Ryan

System Security

Responsible: Ghassan Karame

  • TaintDroid: An Information-Flow Tracking System for Realtime Privacy
    Monitoring on Smartphones

    W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, A. N. Sheth.
  • Physical-layer Identification of UHF RFID Tags
    D. Zanetti, B. Danev, S. Capkun.
  • Privacy-Preserving Outsourcing of Brute-Force Key Searches
    G. Karame, S. Capkun, U. Maurer.
  • Telex: Anticensorship in the Network Infrastructure
    E. Wustrow, S. Wolchok, I. Goldberg, J. A. Halderman
  • Reliably Erasing Data From Flash-Based Solid State Drives
    M. Wei, L. M. Grupp, F. E. Spada, S. Swanson
  • They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices
    S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi and K. Fu.
  • Endorsed E-cash
    J. Camenisch, A. Lysyanskaya, M. Meyerovich.
  • Who Wrote This Code? Identifying the Authors of Program Binaries
    N. Rosenblum, X. Zhu, B. Miller.
  • Secure Untrusted Data Repository: SUNDR
    J. Li, M. Krohn, D. Mazieres, and D. Sasha.

Communication Systems

Responsible: Ilias Raftopoulos

  • Wireless Jamming Attacks under Dynamic Traffic Uncertainty
    Yalin Evren Sagduyu, Randall Berry, and Anthony Ephremides
    Contact: Gabriel Popa
  • Optimal Filtering of Source Address Prefixes: Models and Algorithms
    Fabio Soldo, Athina Markopoulou, and Katerina Argyraki
    Contact: Ilias Raftopoulos
  • Mining Invariants from Console Logs for System Problem Detection
    Jian-Guang Lou, Qiang Fu, Shenqi Yang, and Jiang Li
    Contact: Ilias Raftopoulos
  • Interview with Stefan Savage: On the Spam Payment Trail
    Stefan Savage
    Contact: Stephan Neuhaus
  • Phonotactic Reconstruction of Encrypted VoIP Conversations:Hookt on fon-iks
    Andrew M. White, Austin R. Matthews, Kevin Z. Snow, Fabian Monrose
    Contact: Stephan Neuhaus
  • Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System
    Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, and Matt Blaze
    Contact: Stephan Neuhaus
  • Secure Friend Discovery in Mobile Social Networks
    Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
    Contact:Udi Ben Porat
  • PhishDef: URL Names Say It All
    Anh Le, Athina Markopoulou, Michalis V. Faloutsos
    Contact:Udi Ben Porat
  • Uncovering Social Network Sybils in the Wild
    Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai
    Contact:Sacha Trifunovic
JavaScript has been disabled in your browser