Graham Steel

According to our database1, Graham Steel authored at least 36 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Mind Your Keys? A Security Evaluation of Java Keystores.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2016
Security Analysis of the W3C Web Cryptography API.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

APDU-Level Attacks in PKCS#11 Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

2015
Automated Proof and Flaw-Finding Tools in Cryptography.
IEEE Secur. Priv., 2015

Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
A generic security API for symmetric key management on cryptographic devices.
Inf. Comput., 2014

A Secure Key Management Interface with Asymmetric Cryptography.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

2012
Universally Composable Key-Management.
IACR Cryptol. ePrint Arch., 2012

Efficient Padding Oracle Attacks on Cryptographic Hardware.
IACR Cryptol. ePrint Arch., 2012

Analysis of Security APIs (Dagstuhl Seminar 12482).
Dagstuhl Reports, 2012

YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Revoke and let live: a secure key revocation api for cryptographic devices.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Formal Analysis of Security APIs.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Formal Analysis of Privacy for Anonymous Location Based Services.
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011

An Introduction to Security API Analysis.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

Security for Key Management Interfaces.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Formal Analysis of Protocols Based on TPM State Registers.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Mathematical and Algorithmic Foundations of the Internet.
Chapman and Hall / CRC Applied Algorithms and Data Structures Series, CRC Press, ISBN: 978-1-4398-3138-0, 2011

2010
Formal security analysis of PKCS#11 and proprietary extensions.
J. Comput. Secur., 2010

A Formal Analysis of Authentication in the TPM.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

Formal Analysis of Privacy for Vehicular Mix-Zones.
Proceedings of the Computer Security, 2010

Attacking and fixing PKCS#11 security tokens.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Blunting Differential Attacks on PIN Processing APIs.
Proceedings of the Identity and Privacy in the Internet Age, 2009

Towards a Type System for Security APIs.
Proceedings of the Foundations and Applications of Security Analysis, 2009

Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data.
Proceedings of the Foundations and Applications of Security Analysis, 2009

Type-Based Analysis of PIN Processing APIs.
Proceedings of the Computer Security, 2009

2008
Formal Analysis of PKCS#11.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Automatic Analysis of the Security of XOR-Based Key Management Schemes.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007

A Formal Theory of Key Conjuring.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Formal analysis of PIN block attacks.
Theor. Comput. Sci., 2006

Attacking Group Protocols by Refuting Incorrect Inductive Conjectures.
J. Autom. Reason., 2006

2005
The Importance of Non-theorems and Counterexamples in Program Verification.
Proceedings of the Verified Software: Theories, 2005

Deduction with XOR Constraints in Security API Modelling.
Proceedings of the Automated Deduction, 2005

2004
Discovering security protocol attacks by refuting incorrect inductive conjectures.
PhD thesis, 2004

Attacking Group Multicast Key Management Protocols Using Coral.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures.
Proceedings of the Automated Reasoning - Second International Joint Conference, 2004


  Loading...