Publications 2013

Main content

  • David Basin, Cas Cremers and Meier
    Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
    in Journal of Computer Security
    Pages 41-87, Vol. 21, No. 6, 2013
    [BibTex (TXT, 1 KB) | DOI]
  • Angelo Gargantini, Marco Guarnieri and Eros Magri
    AURORA: AUtomatic RObustness coveRage Analysis Tool
    In Proceedings of the Sixth IEEE International Conference on Software Testing, Verification and Validation (ICST)
    Pages 463 - 470, IEEE, 2013.
    [BibTex (TXT, 334 Bytes) | DOI]
  • Marco Guarnieri, Mario Arrigoni Neri, Eros Magri, and Simone Mutti
    On the notion of redundancy in access control policies
    In Proceedings of the 18th ACM symposium on Access control models and technologies (SACMAT)
    Pages 161-172, ACM, 2013.
    [BibTex (TXT, 686 Bytes) | DOI]
  • Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, and Stefano Paraboschi
    A Model-driven Approach for Securing Software Architectures
    In Proceedings of the 10th International Conference on Security and Cryptography
    Pages 595-602, SCITEPRESS, 2013.
    [BibTex (TXT, 417 Bytes)]
  • Bruno Conchinha, David Basin and Carlos Caleiro
    Symbolic probabilistic analysis of Off-line Guessing
    In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)
    LNCS 8134, pages 363-380, Springer, 2013.
    [BibTex (TXT, 533 Bytes) | PDF (PDF, 396 KB) | DOI]
  • Joel Reardon, Hubert Ritzdorf, David Basin, and Srdjan Capkun
    Secure Data Deletion from Persistent Media
    In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS)
    Pages 271-284, 2013.
    [BibTex (TXT, 654 Bytes) | DOI]
  • Andreas Lochbihler
    Native Word
    Archive of Formal Proofs, formal proof development
    September 2013.
    [BibTex (BIB, 288 Bytes) | URL]
  • Daniel Fischer, David Basin, Knut Eckstein, and Thomas Engel
    Predictable Mobile Routing for Spacecraft Networks
    In IEEE Transactions on Mobile Computing
    Pages 1174-1187, 2013.
    [BibTex (TXT, 443 Bytes) | DOI]
  • Mario Frank, Joachim M. Buhmann, and David Basin
    Role Mining with Probabilistic Models
    In ACM Transactions on Information and System Security (TISSEC)
    Pages 15:1-15:28, 2013.
    [BibTex (TXT, 519 Bytes) | DOI]
  • David Basin, Matus Harvan, Felix Klaedtke, and Eugen Zalinescu
    Monitoring Data Usage in Distributed Systems
    In IEEE Transactions on Software Engineering
    Vol. 39, Issue 10, pages 1403-1426, 2013.
    [BibTex (BIB, 465 Bytes) | DOI]
  • Joel Reardon, Srdjan Capkun, David Basin
    SoK: Secure Data Deletion
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P)
    Pages 301-315, 2013.
    [BibTex (TXT, 580 Bytes) | PDF (PDF, 177 KB) | slides (PDF, 223 KB) | DOI]
  • Thai Son Hoang
    An Introduction to the Event-B Modelling Method
    In Industrial Deployment of System Engineering Methods
    Pages 211-236, Springer, 2013.
    [BibTex (BIB, 459 Bytes) | DOI]
  • Abian Blome, Martin Ochoa, Keqin Li, Michele Peroli and Mohammad Torabi Dashti
    VERA: A flexible model-based vulnerability testing tool
    In Proceedings of the Sixth International Conference on Software Testing, Verification and Validation (ICST)
    Pages 471-478, IEEE, 2013.
    [BibTex (TXT, 502 Bytes) | DOI]
  • Cas Cremers and Michèle Feltz
    Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
    In Designs, Codes and Cryptography
    Pages 1-36, 2013.
    [BibTex (TXT, 529 Bytes) | DOI]
  • Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, and Douglas Stebila
    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
    In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)
    LNCS 8134, pages 381-399, Springer, 2013.
    [BibTex (TXT, 937 Bytes) | DOI]
  • Andreas Lochbihler
    Ein maschinengeprüftes, typsicheres Modell der Nebenläufigkeit in Java: Sprachdefinition, virtuelle Maschine, Speichermodell und verifizierter Compiler
    In Ausgezeichnete Informatikdissertationen 2012
    Lecture Notes in Informatics D-13, pages 211-220, 2013.
    [BibTex (BIB, 493 Bytes) | PDF (PDF, 386 KB)]
  • Andreas Lochbihler
    Light-weight containers for Isabelle: efficient, extensible, nestable
    In Interactive Theorem Proving (ITP)
    LNCS 7998, pages 116-132, Springer, 2013.
    [BibTex (BIB, 413 Bytes) | PDF (PDF, 386 KB) | DOI]
  • Naoto Sato, Thai Son Hoang, David Basin, Hironobu Kuruma
    Verification for Monitoring Requirements of Train Monitoring Systems in Event-B
    In Information Processing Society of Japan Journal
    Vol. 54, no. 6, pages 1738-1750, June 2013.
    [BibTex (TXT, 312 Bytes) | PDF (PDF, 1 MB) | DOI]
  • Simon Hudon and Thai Son Hoang
    Systems Design Guided by Progress Concerns
    In the Proceedings of the 10th Int. conference on intergrated Formal Methods (iFM)
    LNCS 7940, Springer, June 2013.
    [BibTex (TXT, 418 Bytes) | DOI]
  • Thai Son Hoang, Andreas Furst, and Jean-Raymond Abrial
    Event-B Patterns and Their Tool Support
    In Software and Systems Modelling,
    Vol. 12, no. 2, pages 229–244, 2013.
    [BibTex (BIB, 424 Bytes) | DOI]
  • Thai Son Hoang
    Security invariants in discrete transition systems
    In Formal Aspects of Computing,
    Vol. 25, no. 1, pages 59–87, 2013.
    [BibTex (TXT, 356 Bytes) | DOI]
  • Simon Meier, Benedikt Schmidt, Cas Cremers, and David Basin
    The TAMARIN Prover for the Symbolic Analysis of Security Protocols
    In the Proceedings of the 25th Int. Conference on Computer Aided Verification (CAV),
    LNCS 8044, Springer, 2013, ISBN 978-3-642-39798-1
    [BibTex (TXT, 546 Bytes) | DOI]
  • David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zalinescu
    Monitoring of Temporal First-order Properties with Aggregations
    In the Proceedings of the 4th Int. Conference on Runtime Verification (RV),
    LNCS 8174, pages 40-58, Springer, 2013.
    [BibTex (BIB, 492 Bytes) | DOI]
  • Petar Tsankov, Mohammad Torabi Dashti, and David Basin
    Semi-valid Input Coverage for Fuzz Testing
    In the Proceedings of the 22nd ACM Int. Symposium on Software Testing and Analysis (ISSTA),
    Pages 56-66, 2013.
    [BibTex (TXT, 663 Bytes) | PDF (PDF, 504 KB) | DOI]
  • David Basin and Thai Son Hoang
    Technology Transfer
    In Industrial Deployment of System Engineering Methods,
    Chapter 13, pages 187-196, Springer, July 2013.
    [BibTex (BIB, 448 Bytes) | PDF (PDF, 158 KB) | DOI]
  • Andreas Lochbihler
    Light-weight Containers
    Archive of Formal Proofs, formal proof development,
    April 2013.
    [BibTex (BIB, 297 Bytes) | URL]
  • Oliver Friedmann, Felix Klaedtke, and Martin Lange
    Ramsey Goes Visibly Pushdown
    In the Proceedings of the 40th Int. Colloquium on Automata, Languages and Programming (ICALP),
    LNCS 7966, pages 224-237, Springer, 2013.
    [BibTex (TXT, 733 Bytes) | DOI]
  • Binh Thanh Nguyen and Christoph Sprenger
    Sound Security Protocol Transformations
    In the Proceedings of the Second Int. Conference on Principles of Security and Trust (POST),
    LNCS 7796, pages 83-104, Springer, 2013.
    [BibTex (TXT, 634 Bytes) | DOI]
  • David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zalinescu
    Monitoring Compliance Policies over Incomplete and Disagreeing Logs
    In the Proceedings of the 3rd Int. Conference on Runtime Verification (RV)
    LNCS 7687, pages 151-167, Springer, 2013.
    [BibTex (TXT, 665 Bytes) | DOI]
  • Simon Meier and Cas Cremers and David A. Basin
    Efficient Construction of Machine-Checked Symbolic Protocol Security Proofs

    In Journal of Computer Security,
    Vol. 21, no. 1, pages 41-87, 2013.
    [BibTex (BIB, 2 KB) | DOI]
  • David Basin, Vincent Juge, Felix Klaedtke, Eugen Zalinescu
    Enforceable Security Policies Revisited
    In ACM Transactions on Information and System Security,
    Vol. 16, Issue 1, 2013.
    [BibTex (TXT, 425 Bytes) | DOI]
  • Editors: David A. Basin and John C. Mitchell
    Second International Conference, Principles of Security and Trust
    POST 2013, Springer Verlag, LNCS 7796, ISBN 978-3-642-36829-5
    [BibTex (BIB, 656 Bytes) | cover (JPEG, 26 KB) | DOI ]

 

 
 
Page URL: http://www.infsec.ethz.ch/research/publications/pub2013.html
Fri May 26 05:42:48 CEST 2017
© 2017 Eidgenössische Technische Hochschule Zürich