Available Papers
Responsible: Christoph Sprenger
- Modeling and Analyzing Security in the Presence of Compromising Adversaries
David Basin and Cas Cremers
- A Hierarchy of Authentication Specifications
Gavin Lowe
- Constraint Solving for Bounded-Process Cryptographic Protocol Analysis
Jonathan Millen and Vitaly Shmatikov
- An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
Bruno Blanchet
- Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs
Simon Meier, Cas Cremers, and David Basin
- Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps
Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuellar, and Llanos Tobarra
- Secret-Ballot Receipts: True Voter-Verifiable Elections
David Chaum
- A Practical Voter-Verifiable Election Scheme
David Chaum, Peter Y. A. Ryan, and Steve A. Schneider
- Verifying privacy-type properties of electronic voting protocols
Stéphanie Delaune, Steve Kremer, and Mark Ryan
Responsible: Ghassan Karame
- TaintDroid: An Information-Flow Tracking System for Realtime Privacy
Monitoring on Smartphones
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, A. N. Sheth.
- Physical-layer Identification of UHF RFID Tags
D. Zanetti, B. Danev, S. Capkun.
- Privacy-Preserving Outsourcing of Brute-Force Key Searches
G. Karame, S. Capkun, U. Maurer.
- Telex: Anticensorship in the Network Infrastructure
E. Wustrow, S. Wolchok, I. Goldberg, J. A. Halderman
- Reliably Erasing Data From Flash-Based Solid State Drives
M. Wei, L. M. Grupp, F. E. Spada, S. Swanson
- They Can Hear Your Heartbeats: Non-Invasive Security for Implanted Medical Devices
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi and K. Fu.
- Endorsed E-cash
J. Camenisch, A. Lysyanskaya, M. Meyerovich.
- Who Wrote This Code? Identifying the Authors of Program Binaries
N. Rosenblum, X. Zhu, B. Miller.
- Secure Untrusted Data Repository: SUNDR
J. Li, M. Krohn, D. Mazieres, and D. Sasha.
Responsible: Elias Raftopoulos
- Wireless Jamming Attacks under Dynamic Traffic Uncertainty
Yalin Evren Sagduyu, Randall Berry, and Anthony Ephremides
Contact: Gabriel Popa
- Optimal Filtering of Source Address Prefixes: Models and Algorithms
Fabio Soldo, Athina Markopoulou, and Katerina Argyraki
Contact: Elias Raftopoulos
- Mining Invariants from Console Logs for System Problem Detection
Jian-Guang Lou, Qiang Fu, Shenqi Yang, and Jiang Li
Contact: Elias Raftopoulos
- Interview with Stefan Savage: On the Spam Payment Trail
Stefan Savage
Contact: Stephan Neuhaus
- Phonotactic Reconstruction of Encrypted VoIP Conversations:Hookt on fon-iks
Andrew M. White, Austin R. Matthews, Kevin Z. Snow, Fabian Monrose
Contact: Stephan Neuhaus
- Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System
Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman, Kevin Xu, and Matt Blaze
Contact: Stephan Neuhaus
- Secure Friend Discovery in Mobile Social Networks
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
Contact:Udi Ben Porat
- PhishDef: URL Names Say It All
Anh Le, Athina Markopoulou, Michalis V. Faloutsos
Contact:Udi Ben Porat
- Uncovering Social Network Sybils in the Wild
Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai
Contact:Sacha Trifunovic