Publications 2013
- David Basin, Cas Cremers and Meier
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
in Journal of Computer Security
Pages 41-87, Vol. 21, No. 6, 2013
[DownloadBibTex (TXT, 1 KB)vertical_align_bottom | external pageDOIcall_made] - Angelo Gargantini, Marco Guarnieri and Eros Magri
AURORA: AUtomatic RObustness coveRage Analysis Tool
In Proceedings of the Sixth IEEE International Conference on Software Testing, Verification and Validation (ICST)
Pages 463 - 470, IEEE, 2013.
[DownloadBibTex (TXT, 334 Bytes)vertical_align_bottom | external pageDOIcall_made] - Marco Guarnieri, Mario Arrigoni Neri, Eros Magri, and Simone Mutti
On the notion of redundancy in access control policies
In Proceedings of the 18th ACM symposium on Access control models and technologies (SACMAT)
Pages 161-172, ACM, 2013.
[DownloadBibTex (TXT, 686 Bytes)vertical_align_bottom | external pageDOIcall_made] - Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, and Stefano Paraboschi
A Model-driven Approach for Securing Software Architectures
In Proceedings of the 10th International Conference on Security and Cryptography
Pages 595-602, SCITEPRESS, 2013.
[DownloadBibTex (TXT, 417 Bytes)vertical_align_bottom] - Bruno Conchinha, David Basin and Carlos Caleiro
Symbolic probabilistic analysis of Off-line Guessing
In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)
LNCS 8134, pages 363-380, Springer, 2013.
[DownloadBibTex (TXT, 533 Bytes)vertical_align_bottom | DownloadPDF (PDF, 396 KB)vertical_align_bottom | external pageDOIcall_made] - Joel Reardon, Hubert Ritzdorf, David Basin, and Srdjan Capkun
Secure Data Deletion from Persistent Media
In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS)
Pages 271-284, 2013.
[DownloadBibTex (TXT, 654 Bytes)vertical_align_bottom | external pageDOIcall_made] - Andreas Lochbihler
Native Word
Archive of Formal Proofs, formal proof development
September 2013.
[DownloadBibTex (BIB, 288 Bytes)vertical_align_bottom | external pageURLcall_made] - Daniel Fischer, David Basin, Knut Eckstein, and Thomas Engel
Predictable Mobile Routing for Spacecraft Networks
In IEEE Transactions on Mobile Computing
Pages 1174-1187, 2013.
[DownloadBibTex (TXT, 443 Bytes)vertical_align_bottom | external pageDOIcall_made] - Mario Frank, Joachim M. Buhmann, and David Basin
Role Mining with Probabilistic Models
In ACM Transactions on Information and System Security (TISSEC)
Pages 15:1-15:28, 2013.
[DownloadBibTex (TXT, 519 Bytes)vertical_align_bottom | external pageDOIcall_made] - David Basin, Matus Harvan, Felix Klaedtke, and Eugen Zalinescu
Monitoring Data Usage in Distributed Systems
In IEEE Transactions on Software Engineering
Vol. 39, Issue 10, pages 1403-1426, 2013.
[DownloadBibTex (BIB, 465 Bytes)vertical_align_bottom | external pageDOIcall_made] - Joel Reardon, Srdjan Capkun, David Basin
SoK: Secure Data Deletion
In Proceedings of the IEEE Symposium on Security and Privacy (S&P)
Pages 301-315, 2013.
[DownloadBibTex (TXT, 580 Bytes)vertical_align_bottom | DownloadPDF (PDF, 177 KB)vertical_align_bottom | Downloadslides (PDF, 223 KB)vertical_align_bottom | external pageDOIcall_made] - Thai Son Hoang
An Introduction to the Event-B Modelling Method
In Industrial Deployment of System Engineering Methods
Pages 211-236, Springer, 2013.
[DownloadBibTex (BIB, 459 Bytes)vertical_align_bottom | external pageDOIcall_made] - Abian Blome, Martin Ochoa, Keqin Li, Michele Peroli and Mohammad Torabi Dashti
VERA: A flexible model-based vulnerability testing tool
In Proceedings of the Sixth International Conference on Software Testing, Verification and Validation (ICST)
Pages 471-478, IEEE, 2013.
[DownloadBibTex (TXT, 502 Bytes)vertical_align_bottom | external pageDOIcall_made] - Cas Cremers and Michèle Feltz
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
In Designs, Codes and Cryptography
Pages 1-36, 2013.
[DownloadBibTex (TXT, 529 Bytes)vertical_align_bottom | external pageDOIcall_made] - Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, and Douglas Stebila
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
In Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS)
LNCS 8134, pages 381-399, Springer, 2013.
[DownloadBibTex (TXT, 937 Bytes)vertical_align_bottom | external pageDOIcall_made] - Andreas Lochbihler
Ein maschinengeprüftes, typsicheres Modell der Nebenläufigkeit in Java: Sprachdefinition, virtuelle Maschine, Speichermodell und verifizierter Compiler
In Ausgezeichnete Informatikdissertationen 2012
Lecture Notes in Informatics D-13, pages 211-220, 2013.
[DownloadBibTex (BIB, 493 Bytes)vertical_align_bottom | DownloadPDF (PDF, 386 KB)vertical_align_bottom] - Andreas Lochbihler
Light-weight containers for Isabelle: efficient, extensible, nestable
In Interactive Theorem Proving (ITP)
LNCS 7998, pages 116-132, Springer, 2013.
[DownloadBibTex (BIB, 413 Bytes)vertical_align_bottom | DownloadPDF (PDF, 386 KB)vertical_align_bottom | external pageDOIcall_made] - Naoto Sato, Thai Son Hoang, David Basin, Hironobu Kuruma
Verification for Monitoring Requirements of Train Monitoring Systems in Event-B
In Information Processing Society of Japan Journal
Vol. 54, no. 6, pages 1738-1750, June 2013.
[DownloadBibTex (TXT, 312 Bytes)vertical_align_bottom | DownloadPDF (PDF, 1 MB)vertical_align_bottom | external pageDOIcall_made] - Simon Hudon and Thai Son Hoang
Systems Design Guided by Progress Concerns
In the Proceedings of the 10th Int. conference on intergrated Formal Methods (iFM)
LNCS 7940, Springer, June 2013.
[DownloadBibTex (TXT, 418 Bytes)vertical_align_bottom | external pageDOIcall_made] - Thai Son Hoang, Andreas Furst, and Jean-Raymond Abrial
Event-B Patterns and Their Tool Support
In Software and Systems Modelling,
Vol. 12, no. 2, pages 229–244, 2013.
[DownloadBibTex (BIB, 424 Bytes)vertical_align_bottom | external pageDOIcall_made] - Thai Son Hoang
Security invariants in discrete transition systems
In Formal Aspects of Computing,
Vol. 25, no. 1, pages 59–87, 2013.
[DownloadBibTex (TXT, 356 Bytes)vertical_align_bottom | external pageDOIcall_made] - Simon Meier, Benedikt Schmidt, Cas Cremers, and David Basin
The TAMARIN Prover for the Symbolic Analysis of Security Protocols
In the Proceedings of the 25th Int. Conference on Computer Aided Verification (CAV),
LNCS 8044, Springer, 2013, ISBN 978-3-642-39798-1
[DownloadBibTex (TXT, 546 Bytes)vertical_align_bottom | external pageDOIcall_made] - David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zalinescu
Monitoring of Temporal First-order Properties with Aggregations
In the Proceedings of the 4th Int. Conference on Runtime Verification (RV),
LNCS 8174, pages 40-58, Springer, 2013.
[DownloadBibTex (BIB, 492 Bytes)vertical_align_bottom | external pageDOIcall_made] - Petar Tsankov, Mohammad Torabi Dashti, and David Basin
Semi-valid Input Coverage for Fuzz Testing
In the Proceedings of the 22nd ACM Int. Symposium on Software Testing and Analysis (ISSTA),
Pages 56-66, 2013.
[DownloadBibTex (TXT, 663 Bytes)vertical_align_bottom | DownloadPDF (PDF, 504 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin and Thai Son Hoang
Technology Transfer
In Industrial Deployment of System Engineering Methods,
Chapter 13, pages 187-196, Springer, July 2013.
[DownloadBibTex (BIB, 448 Bytes)vertical_align_bottom | DownloadPDF (PDF, 158 KB)vertical_align_bottom | external pageDOIcall_made] - Andreas Lochbihler
Light-weight Containers
Archive of Formal Proofs, formal proof development,
April 2013.
[DownloadBibTex (BIB, 297 Bytes)vertical_align_bottom | external pageURLcall_made] - Oliver Friedmann, Felix Klaedtke, and Martin Lange
Ramsey Goes Visibly Pushdown
In the Proceedings of the 40th Int. Colloquium on Automata, Languages and Programming (ICALP),
LNCS 7966, pages 224-237, Springer, 2013.
[DownloadBibTex (TXT, 733 Bytes)vertical_align_bottom | external pageDOIcall_made] - Binh Thanh Nguyen and Christoph Sprenger
Sound Security Protocol Transformations
In the Proceedings of the Second Int. Conference on Principles of Security and Trust (POST),
LNCS 7796, pages 83-104, Springer, 2013.
[DownloadBibTex (TXT, 634 Bytes)vertical_align_bottom | external pageDOIcall_made] - David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Zalinescu
Monitoring Compliance Policies over Incomplete and Disagreeing Logs
In the Proceedings of the 3rd Int. Conference on Runtime Verification (RV)
LNCS 7687, pages 151-167, Springer, 2013.
[DownloadBibTex (TXT, 665 Bytes)vertical_align_bottom | external pageDOIcall_made] - Simon Meier and Cas Cremers and David A. Basin
Efficient Construction of Machine-Checked Symbolic Protocol Security Proofs
In Journal of Computer Security,
Vol. 21, no. 1, pages 41-87, 2013.
[DownloadBibTex (BIB, 2 KB)vertical_align_bottom | external pageDOIcall_made] - David Basin, Vincent Juge, Felix Klaedtke, Eugen Zalinescu
Enforceable Security Policies Revisited
In ACM Transactions on Information and System Security,
Vol. 16, Issue 1, 2013.
[DownloadBibTex (TXT, 425 Bytes)vertical_align_bottom | external pageDOIcall_made] - Editors: David A. Basin and John C. Mitchell
Second International Conference, Principles of Security and Trust
POST 2013, Springer Verlag, LNCS 7796, ISBN 978-3-642-36829-5
[DownloadBibTex (BIB, 656 Bytes)vertical_align_bottom | Downloadcover (JPEG, 26 KB)vertical_align_bottom | external pageDOIcall_made ]