Folgen
Ralf Sasse
Ralf Sasse
Senior Scientist in Computer Science, ETH Zurich
Bestätigte E-Mail-Adresse bei inf.ethz.ch - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Some tools
M Clavel, F Durán, S Eker, P Lincoln, N Martí-Oliet, J Meseguer, C Talcott, ...
All About Maude-A High-Performance Logical Framework: How to Specify …, 2007
15612007
A formal analysis of 5G authentication
D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
4232018
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1702014
Folding variant narrowing and optimal variant termination
S Escobar, R Sasse, J Meseguer
The Journal of Logic and Algebraic Programming 81 (7-8), 898-928, 2012
1702012
Automated symbolic proofs of observational equivalence
D Basin, J Dreier, R Sasse
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1162015
A systematic approach to uncover security flaws in GUI logic
S Chen, J Meseguer, R Sasse, HJ Wang, YM Wang
2007 IEEE Symposium on Security and Privacy (SP'07), 71-85, 2007
752007
A systematic approach to uncover security flaws in GUI logic
S Chen, J Meseguer, R Sasse, HJ Wang, YM Wang
2007 IEEE Symposium on Security and Privacy (SP'07), 71-85, 2007
752007
Automated verification of group key agreement protocols
B Schmidt, R Sasse, C Cremers, D Basin
2014 IEEE Symposium on Security and Privacy, 179-194, 2014
642014
Design, analysis, and implementation of ARPKI: An attack-resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
IEEE Transactions on Dependable and Secure Computing 15 (3), 393-408, 2016
632016
The EMV standard: Break, fix, verify
D Basin, R Sasse, J Toro-Pozo
2021 IEEE Symposium on Security and Privacy (SP), 1766-1781, 2021
592021
Variant narrowing and equational unification
S Escobar, J Meseguer, R Sasse
Electronic Notes in Theoretical Computer Science 238 (3), 103-119, 2009
592009
Beyond subterm-convergent equational theories in automated verification of stateful protocols
J Dreier, C Duménil, S Kremer, R Sasse
Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017
572017
Automated unbounded verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirovic, R Sasse
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 359-373, 2018
532018
Seems legit: Automated analysis of subtle attacks on protocols that use signatures
D Jackson, C Cremers, K Cohn-Gordon, R Sasse
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
432019
Symbolically analyzing security protocols using tamarin
D Basin, C Cremers, J Dreier, R Sasse
ACM SIGLOG News 4 (4), 19-30, 2017
422017
A comprehensive formal analysis of 5G handover
A Peltonen, R Sasse, D Basin
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
392021
Automatic validation of transformation rules for Java verification against a rewriting semantics
W Ahrendt, A Roth, R Sasse
International Conference on Logic for Programming Artificial Intelligence …, 2005
352005
Java+ ITP: A verification tool based on Hoare logic and algebraic semantics
R Sasse, J Meseguer
Electronic Notes in Theoretical Computer Science 176 (4), 29-46, 2007
332007
Card brand mixup attack: bypassing the {PIN} in {non-Visa} cards by using them for visa transactions
D Basin, R Sasse, J Toro-Pozo
30th USENIX Security Symposium (USENIX Security 21), 179-194, 2021
302021
Formal analysis and implementation of a TPM 2.0-based direct anonymous attestation scheme
S Wesemeyer, CJP Newton, H Treharne, L Chen, R Sasse, J Whitefield
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
302020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20