Erik Poll

Affiliations:
  • Radboud University Nijmegen


According to our database1, Erik Poll authored at least 78 papers between 1993 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fuzzers for stateful systems: Survey and Research Directions.
CoRR, 2023

Evaluating the Fork-Awareness of Coverage-Guided Fuzzers.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Security of EV-Charging Protocols.
CoRR, 2022

2021
Adversarial Examples on Object Recognition: A Comprehensive Survey.
ACM Comput. Surv., 2021

Deep Repulsive Prototypes for Adversarial Robustness.
CoRR, 2021

Blockchain adoption drivers: The rationality of irrational choices.
Concurr. Comput. Pract. Exp., 2021

Compromised Through Compression - Privacy Implications of Smart Meter Traffic Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2021

2020
Learning to Learn from Mistakes: Robust Optimization for Adversarial Noise.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

Blockchain Utility in Use Cases: Observations, Red Flags, and Requirements.
Proceedings of the Euro-Par 2020: Parallel Processing Workshops, 2020

Towards Using Probabilistic Models to Design Software Systems with Inherent Uncertainty.
Proceedings of the Software Architecture - 14th European Conference, 2020

Drivers and Impediments: Experts Opinions on Blockchain Adoption in the Netherlands.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

2019
Assessing interoperability solutions for distributed ledgers.
Pervasive Mob. Comput., 2019

Non-Repudiation and End-to-End Security for Electric-Vehicle Charging.
Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, 2019

2018
Strings Considered Harmful.
login Usenix Mag., 2018

Is Java Card ready for hash-based signatures?
IACR Cryptol. ePrint Arch., 2018

Adversarial Examples - A Complete Characterisation of the Phenomenon.
CoRR, 2018

Tactical Safety Reasoning. A Case for Autonomous Vehicles.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

LangSec Revisited: Input Security Flaws of the Second Kind.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

A Security Analysis of the ETSI ITS Vehicular Communications.
Proceedings of the Computer Safety, Reliability, and Security, 2018

A Standard Driven Software Architecture for Fully Autonomous Vehicles.
Proceedings of the 2018 IEEE International Conference on Software Architecture Companion, 2018

Inferring OpenVPN State Machines Using Protocol State Fuzzing.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

The Drivers Behind Blockchain Adoption: The Rationality of Irrational Choices.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

What Blockchain Alternative Do You Need?
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

2017
Model learning and model checking of SSH implementations.
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017

2016
Logical Attacks on Secured Containers of the Java Card Platform.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
An Information-Centric Communication Infrastructure for Real-Time State Estimation of Active Distribution Networks.
IEEE Trans. Smart Grid, 2015

Protocol State Fuzzing of TLS Implementations.
Proceedings of the 24th USENIX Security Symposium, 2015

Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

An RFID Skimming Gate Using Higher Harmonics.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015

Securing the Information Infrastructure for EV Charging.
Proceedings of the Wireless and Satellite Systems, 2015

A security architecture for the publish/subscribe C-DAX middleware.
Proceedings of the IEEE International Conference on Communication, 2015

2014
Automated Reverse Engineering using Lego®.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

Analysis of Secure Key Storage Solutions on Android.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2013
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches.
Proceedings of the Open Identity Summit 2013, September 9th, 2013

The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions.
Proceedings of the Policies and Research in Identity Management, 2013

Formal Models of Bank Cards for Free.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

A security protocol for information-centric networking in smart grids.
Proceedings of the SEGS'13, 2013

A Comparison of Time-Memory Trade-Off Attacks on Stream Ciphers.
Proceedings of the Progress in Cryptology, 2013

2012
Designed to Fail: A USB-Connected Reader for Online Banking.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

2011
Formal Analysis of the EMV Protocol Suite.
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011

2010
Midlet Navigation Graphs in JML.
Proceedings of the Formal Methods: Foundations and Applications, 2010

2009
Teaching Program Specification and Verification Using JML and ESC/Java2.
Proceedings of the Teaching Formal Methods, Second International Conference, 2009

Model-Based Testing of Electronic Passports.
Proceedings of the Formal Methods for Industrial Critical Systems, 2009

Type-Based Object Immutability with Flexible Initialization.
Proceedings of the ECOOP 2009, 2009

2008
Malicious Code on Java Card Smartcards: Attacks and Countermeasures.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
AHA: Amortized Heap Space Usage Analysis.
Proceedings of the Eighth Symposium on Trends in Functional Programming, 2007

Immutable Objects for a Java-Like Language.
Proceedings of the Programming Languages and Systems, 2007

A JML Tutorial: Modular Specification and Verification of Functional Behavior for Java.
Proceedings of the Computer Aided Verification, 19th International Conference, 2007

2006
MOBIUS: Mobility, Ubiquity, Security.
Proceedings of the Trustworthy Global Computing, Second Symposium, 2006

2005
Beyond Assertions: Advanced Specification and Verification with JML and ESC/Java2.
Proceedings of the Formal Methods for Components and Objects, 4th International Symposium, 2005

2004
Reasoning about Card Tears and Transactions in Java Card.
Proceedings of the Fundamental Approaches to Software Engineering, 2004

Formal Techniques for Java-Like Programs (FTfJP).
Proceedings of the Object-Oriented Technology: ECOOP 2004 Workshop Reader, 2004

2003
Coalgebras and monads in the semantics of Java.
Theor. Comput. Sci., 2003

An overview of JML tools and applications.
Proceedings of the Eighth International Workshop on Formal Methods for Industrial Critical Systems, 2003

Implementing a Formally Verifiable Security Protocol in Java Card.
Proceedings of the Security in Pervasive Computing, 2003

From Finite State Machines to Provably Correct Java Card Applets.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Java Program Verification at Nijmegen: Developments and Perspective.
Proceedings of the Software Security, 2003

Formal Techniques for Java-Like Programs.
Proceedings of the Object-Oriented Technology: ECOOP 2003 Workshop Reader, 2003

2002
Formal Techniques for Java-like Programs.
Proceedings of the Object-Oriented Technology, 2002

A Java Reference Model of Transacted Memory for Smart Cards.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

2001
From Algebras and Coalgebras to Dialgebras.
Proceedings of the Coalgebraic Methods in Computer Science, 2001

Formal specification of the JavaCard API in JML: the APDU class.
Comput. Networks, 2001

A Logic for the Java Modeling Language JML.
Proceedings of the Fundamental Approaches to Software Engineering, 2001

Towards a Full Formal Specification of the JavaCard API.
Proceedings of the Smart Card Programming and Security, 2001

Formal Techniques for Java Programs.
Proceedings of the Object-Oriented Technology ECOOP 2001 Workshop Reader, 2001

2000
A Coalgebraic Semantics of Subtyping.
Proceedings of the Coalgebraic Methods in Computer Science, 2000

JML (poster session): notations and tools supporting detailed design in Java.
Proceedings of the Addendum to the 2000 Proceedings of the Conference on Object-Oriented Programming Systems, 2000

Formal Specification and Verification of JavaCard's Application Identifier Class.
Proceedings of the Java on Smart Cards: Programming and Security, 2000

Integrating Computer Algebra and Reasoning through the Type System of Aldor.
Proceedings of the Frontiers of Combining Systems, 2000

Specification of the JavaCard API in JML.
Proceedings of the Smart Card Research and Advanced Applications, 2000

A Monad for Basic Java Semantics.
Proceedings of the Algebraic Methodology and Software Technology. 8th International Conference, 2000

1999
A Type-Theoretic Memory Model for Verification of Sequential Java Programs.
Proceedings of the Recent Trends in Algebraic Development Techniques, 1999

A Logic for Abstract Data Types as Existential Types.
Proceedings of the Typed Lambda Calculi and Applications, 4th International Conference, 1999

Safe Proof Checking in Type Theory with Y.
Proceedings of the Computer Science Logic, 13th International Workshop, 1999

1998
Expansion Postponement for Normalising Pure Type Systems.
J. Funct. Program., 1998

1997
System F with Width-Subtyping and Record Updating.
Proceedings of the Theoretical Aspects of Computer Software, Third International Symposium, 1997

1994
Pure Type Systems with Definitions.
Proceedings of the Logical Foundations of Computer Science, Third International Symposium, 1994

1993
CPO-Models for Second Order Lambda Calculus with Recursive Types and Subtyping.
RAIRO Theor. Informatics Appl., 1993


  Loading...