Available papers

Information Security

Responsible: Cas Cremers

  • Constraint Solving for Bounded-Process Cryptographic Protocol Analysis
    Jonathan Millen and Vitaly Shmatikov
  • An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
    Bruno Blanchet
  • Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps
    Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, and Llanos Tobarra
  • Verifying privacy-type properties of electronic voting protocols
    Stéphanie Delaune, Steve Kremer, and Mark Ryan
  • Access-Control Policies via Belnap Logic - Effective and Efficient Composition and Analysis
  • Extending Access Control Models with Break-glass
  • EON - Modeling and Analyzing Dynamic Access
    Control Systems with Logic Programs
  • SecPAL - Design and Semantics of a Decentralized
    Authorization Language

System Security

Responsible: Elli Androulaki

  • They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices
    Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu
  • The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
    Hovav Shacham
  • kGuard: Lightweight Kernel Protection against Return-to-user Attacks
    Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos Keromytis
  • Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
    Joel Reardon, Srdjan Capkun, and David Basin
  • vTPM: Virtualizing the Trusted Platform Module
    Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, and Leendert van Doorn
  • CryptDB: Protecting Confidentiality with Encrypted Query Processing
    Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan
  • Bitcoin: A Peer-to-Peer Electronic Cash System
    Satoshi Nakamoto
  • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    Jan Camenisch, and Anna Lysyanskaya

Communication Systems

Responsible: Ilias Raftopoulos

  • Can Open WiFi Networks Be Lethal Weapons for Botnets?
  • Can we beat legitimate cyber behavior mimicking attacks from botnets?
  • Detecting and Defending Against Third-Party Tracking
  • Don't Trust Satellite Phones
  • From Throw-Away Traffic to Bots
  • Measuring Pay-per-Install
  • Mining Your Ps and Qs
  • Quantifying Information Leaks in Outbound Web Traffic
  • Safe Loading
  • Side-Channel Leaks in Web Applications
  • The case for ubiquitous transport-level encryption
  • User-Driven Access Control
JavaScript has been disabled in your browser