Information Security Group


Zurich Information Security Center

We are affiliated with the Zurich Information Security Center (ZISC)

Events & News

  • Best paper awards:

    Paper: Scalable Offline Monitoring
    Conference: 14th International Conference on Runtime Verification
    Authors: David Basin, Germano Caronni, Sarah Ereth, Matúš Harvan, Felix Klaedtke and Heiko Mantel

    Paper: Formal Analysis of Electronic Exams
    Conference: SECRYPT'14 in Vienna
    Authors: Jannik Dreier, Rosario Guistolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, and Peter Y. A. Ryan


Security protocols are a crucial building block of modern networks and distributed applications. Many methods exist to analyze protocols, but very few methods exist to design or construct secure protocols.

Our objective is to provide a methodology for the incremental construction of security protocols whose correctness (security) follows by design. To achieve this, we will develop a family of security-strengthening transformations, which take security protocols and transform them in such a way that they satisfy strong, clearly specified security properties. To justify the correctness of the transformations, we will use a framework that we have recently developed for specifying and reasoning about security protocols with respect to different classes of adversaries. This framework is an excellent starting point in that it provides:

We will apply our methodology to develop a family of novel security-strengthening transformations and to verify existing transformations from the literature. Together, these will provide a methodology for designing correct security protocols.

Contact: Cas Cremers, Michèle Feltz, Marko Horvat


Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
folgender Seite.

Important Note:
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.
More information

© 2014 ETH Zurich | Imprint | Disclaimer | 11 October 2011