Seguir
Ralf Sasse
Ralf Sasse
Senior Scientist in Computer Science, ETH Zurich
Dirección de correo verificada de inf.ethz.ch - Página principal
Título
Citado por
Citado por
Año
Some tools
M Clavel, F Durán, S Eker, P Lincoln, N Martí-Oliet, J Meseguer, C Talcott, ...
All About Maude-A High-Performance Logical Framework: How to Specify …, 2007
15692007
A formal analysis of 5G authentication
D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
4232018
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1702014
Folding variant narrowing and optimal variant termination
S Escobar, R Sasse, J Meseguer
The Journal of Logic and Algebraic Programming 81 (7-8), 898-928, 2012
1702012
Automated symbolic proofs of observational equivalence
D Basin, J Dreier, R Sasse
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1162015
A systematic approach to uncover security flaws in GUI logic
S Chen, J Meseguer, R Sasse, HJ Wang, YM Wang
2007 IEEE Symposium on Security and Privacy (SP'07), 71-85, 2007
752007
A systematic approach to uncover security flaws in GUI logic
S Chen, J Meseguer, R Sasse, HJ Wang, YM Wang
2007 IEEE Symposium on Security and Privacy (SP'07), 71-85, 2007
752007
Automated verification of group key agreement protocols
B Schmidt, R Sasse, C Cremers, D Basin
2014 IEEE Symposium on Security and Privacy, 179-194, 2014
642014
Design, analysis, and implementation of ARPKI: An attack-resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
IEEE Transactions on Dependable and Secure Computing 15 (3), 393-408, 2016
632016
The EMV standard: Break, fix, verify
D Basin, R Sasse, J Toro-Pozo
2021 IEEE Symposium on Security and Privacy (SP), 1766-1781, 2021
592021
Variant narrowing and equational unification
S Escobar, J Meseguer, R Sasse
Electronic Notes in Theoretical Computer Science 238 (3), 103-119, 2009
592009
Beyond subterm-convergent equational theories in automated verification of stateful protocols
J Dreier, C Duménil, S Kremer, R Sasse
Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017
572017
Automated unbounded verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirovic, R Sasse
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 359-373, 2018
532018
Seems legit: Automated analysis of subtle attacks on protocols that use signatures
D Jackson, C Cremers, K Cohn-Gordon, R Sasse
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
432019
Symbolically analyzing security protocols using tamarin
D Basin, C Cremers, J Dreier, R Sasse
ACM SIGLOG News 4 (4), 19-30, 2017
422017
A comprehensive formal analysis of 5G handover
A Peltonen, R Sasse, D Basin
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
392021
Automatic validation of transformation rules for Java verification against a rewriting semantics
W Ahrendt, A Roth, R Sasse
International Conference on Logic for Programming Artificial Intelligence …, 2005
352005
Java+ ITP: A verification tool based on Hoare logic and algebraic semantics
R Sasse, J Meseguer
Electronic Notes in Theoretical Computer Science 176 (4), 29-46, 2007
332007
Card brand mixup attack: bypassing the {PIN} in {non-Visa} cards by using them for visa transactions
D Basin, R Sasse, J Toro-Pozo
30th USENIX Security Symposium (USENIX Security 21), 179-194, 2021
302021
Formal analysis and implementation of a TPM 2.0-based direct anonymous attestation scheme
S Wesemeyer, CJP Newton, H Treharne, L Chen, R Sasse, J Whitefield
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
302020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20