Available papers
Information Security
Responsible: Cas Cremers
- Constraint Solving for Bounded-Process Cryptographic Protocol Analysis
Jonathan Millen and Vitaly Shmatikov - An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
Bruno Blanchet - Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps
Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, and Llanos Tobarra - Verifying privacy-type properties of electronic voting protocols
Stéphanie Delaune, Steve Kremer, and Mark Ryan - Access-Control Policies via Belnap Logic - Effective and Efficient Composition and Analysis
- Extending Access Control Models with Break-glass
- EON - Modeling and Analyzing Dynamic Access
Control Systems with Logic Programs - SecPAL - Design and Semantics of a Decentralized
Authorization Language
System Security
Responsible: Elli Androulaki
- They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices
Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu - The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
Hovav Shacham - kGuard: Lightweight Kernel Protection against Return-to-user Attacks
Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos Keromytis - Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
Joel Reardon, Srdjan Capkun, and David Basin - vTPM: Virtualizing the Trusted Platform Module
Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn - CryptDB: Protecting Confidentiality with Encrypted Query Processing
Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan - Bitcoin: A Peer-to-Peer Electronic Cash System
Satoshi Nakamoto - An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
Jan Camenisch, and Anna Lysyanskaya
Communication Systems
Responsible: Ilias Raftopoulos
- Can Open WiFi Networks Be Lethal Weapons for Botnets?
- Can we beat legitimate cyber behavior mimicking attacks from botnets?
- Detecting and Defending Against Third-Party Tracking
- Don't Trust Satellite Phones
- From Throw-Away Traffic to Bots
- Measuring Pay-per-Install
- Mining Your Ps and Qs
- Quantifying Information Leaks in Outbound Web Traffic
- Safe Loading
- Side-Channel Leaks in Web Applications
- The case for ubiquitous transport-level encryption
- User-Driven Access Control