Publications 2015

Main content

  • Peter Gammie and Andreas Lochbihler
    The Stern-Brocot Tree
    Archive of Formal Proofs, 2015
    [BIB (BIB, 285 Bytes) | Link]
  • Andreas Lochbihler and Joshua Schneider
    Applicative Lifting
    Archive of Formal Proofs, 2015
    [BIB (BIB, 297 Bytes) | Link]
  • David Basin, Felix Klaedtke, and Eugen Zalinescu
    Failure-aware Runtime Verification of Distributed Systems
    35th Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTCCS), 2015
    [BIB (BIB, 963 Bytes) | PDF (PDF, 531 KB) | DOI | URL]
  • Grgur Petric Maretic, Mohammad Torabi Dashti, David Basin
    Semantic Vacuity
    22nd International Symposium on Temporal Representation and Reasoning (TIME), 2015.
    [BIB (BIB, 710 Bytes) | PDF | DOI | URL]
  • Carlos Cotrini Jimenez, Thilo Weghorn, David Basin, Manuel Clavel
    Analyzing First-Order Role Based Access Control
    IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, pages 3-17, Verona, Italy, 13-17 July, 2015
    [BIB (BIB, 306 Bytes) | PDF (PDF, 511 KB) | DOI ]
  • David Basin, Cas Cremers, Kunihiko Miyazaki, Sasa Radomirovic and Dai Watanabe
    Improving the Security of Cryptographic Protocol Standards
    IEEE Security & Privacy, 13(3):24-31, 2015.
    [BIB (BIB, 449 Bytes) | PDF (PDF, 384 KB) | DOI | IEEE Preprint (PDF, 239 KB)]
  • Dmitriy Traytel and Tobias Nipkow
    Verified Decision Procedures for MSO on Words Based on Derivatives of Regular Expressions
    Journal of Functional Programming, 25, 2015.
    [BIB | PDF | DOI]
  • David Basin, Jannik Dreier, Ralf Sasse
    Automated Symbolic Proofs of Observational Equivalence
    In Proceedings of the ACM Conference on Computer and Communication Security (CCS)

    Pages 1144-1155, 2015.
    [BIB (BIB, 761 Bytes) | PDF (PDF, 373 KB) | DOI | Extended version (PDF, 530 KB)]
  • David Basin, Michel Keller, Sasa Radomirovic, Ralf Sasse
    Alice and Bob Meet Equational Theories
    Logic, Rewriting, and Concurrency - Festschrift Symposium in Honor of José Meseguer 2015

    [BIB (BIB, 765 Bytes) | PDF (PDF, 385 KB) | DOI]
  • Jannik Dreier, Ali Kassem, and Pascal Lafourcade
    Formal Analysis of E-Cash Protocols
    International Conference on Security and Cryptography (SECRYPT 2015)

    [BIB (BIB, 516 Bytes) | PDF (PDF, 304 KB) | DOI]
  • Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, and Gabriele Lenzini
    A Framework for Analyzing Verifiability in Traditional and Electronic Exams
    11th International Conference on Information Security Practice and Experience (ISPEC 2015)
    [BIB | PDF (PDF, 257 KB) | DOI]
  • Andreas Lochbihler and Alexandra Maximova
    Stream Fusion for Isabelle's Code Generator (Rough Diamond)
    Interactive Theorem Proving (ITP 2015), LNCS 9236, pp. 270-277.
    [BIB (BIB, 432 Bytes) | PDF (PDF, 165 KB) | DOI]
  • Johannes Hölzl, Andreas Lochbihler, and Dmitriy Traytel
    A Formalised Hierarchy of Probabilistic System Types (Proof Pearl)
    Interactive Theorem Proving (ITP 2015), LNCS 9236, pp. 203-220.
    [BIB (BIB, 463 Bytes) | PDF (PDF, 263 KB) | DOI]
  • Johannes Hölzl, Andreas Lochbihler, and Dmitriy Traytel
    A Zoo of Probabilistic Systems
    Archive of Formal Proofs, 2015.
    [BIB (BIB, 352 Bytes) | Link]
  • Andreas Lochbihler and Tobias Nipkow
    Trie
    Archive of Formal Proofs, 2015.
    [BIB (BIB, 284 Bytes) | Link]
  • Ognjen Marić, Christoph Sprenger and David Basin
    Consensus Refined
    Dependable Systems and Networks (DSN) 2015, pp. 391-402.
    [BIB (BIB, 408 Bytes) | PDF | DOI ]
  • Ognjen Marić and Christoph Sprenger
    Consensus Refined
    Archive of Formal Proofs
    , 2015.
    [BIB (BIB, 297 Bytes) | Link]
  • David Basin, Felix Klaedtke, Samuel Müller, and Eugen Zălinescu.
    Monitoring Metric First-order Temporal Properties
    Journal of the ACM
    (62(2):15:1-15:45, 2015.
    [BIB (BIB, 515 Bytes) | PDF | DOI]
  • David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zălinescu.
    Monitoring of Temporal First-order Properties with Aggregations
    Formal Methods in System Design, 2015.
    [BIB | PDF | DOI]
  • David Basin, Felix Klaedtke, and Eugen Zălinescu.
    Greedily Computing Associative Aggregations on Sliding Windows
    Information Processing Letters, 115(2):186-192, 2015.
    [BIB (BIB, 389 Bytes) | PDF | DOI]
  • Carlos Cotrini, Thilo Weghorn, David Basin, and Manuel Clavel.
    Analyzing First-order Role Based Access Control
    In Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF 2015), pages 3-17, IEEE 2015.
    [BIB (BIB, 318 Bytes) | PDF (PDF, 531 KB) | DOI]
  • David Basin, Sasa Radomirovic, and Michael Schläpfer.
    A Complete Characterization of Secure Human-Server Communication
    In Proceedings of the 28th IEEE Computer Security Foundations Symposium (CSF)
    Pages 199-213, 2015.
    [BIB (BIB, 533 Bytes) | PDF (PDF, 420 KB) | DOI]
  • Sjouke Mauw and Sasa Radomirovic.
    Generalizing Multi-party Contract Signing
    In Principles of Security and Trust (POST 2015), pages 156-175, 2015.
    [BIB (BIB, 484 Bytes) | PDF | DOI]
  • Laurent Cuennet,  Marc Pouly, and Sasa Radomirovic.
    Guided Specification and Analysis of a Loyalty Card System
    In Workshop on Graphical Models for Security (GraMSec 2015).
    [BIB | PDF (PDF, 255 KB) | DOI]
  • Thanh Binh Nguyen and Christoph Sprenger.
    Abstractions for Security Protocol Verification
    In Principles of Security and Trust (POST 2015), pages 196-215, 2015.
    [BIB (BIB, 517 Bytes) | PDF (PDF, 405 KB) | DOI]
  • Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, and Rolando Trujillo-Rasua
    Attack Trees with Sequential Conjunction
    In IFIP, ICT Systems Security and Privacy Protection
    Volume 455, pages 339-353, 2015.
    [BIB (BIB, 594 Bytes) | PDF | DOI]
 
 
Page URL: http://www.infsec.ethz.ch/research/publications/pub2015.html
Fri Mar 31 00:37:52 CEST 2017
© 2017 Eidgenössische Technische Hochschule Zürich