Joeri de Ruiter

Orcid: 0000-0003-1535-2335

According to our database1, Joeri de Ruiter authored at least 34 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




UDM: Private user discovery with minimal information disclosure.
Cryptologia, 2022

Global Distributed Secure Mapping of Network Addresses.
Proceedings of the TAURIN'21: Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, 2021

A National Programmable Infrastructure to Experiment with Next-Generation Networks.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Next-generation internet at terabit speed: SCION in P4.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

A Responsible Internet to Increase Trust in the Digital World.
J. Netw. Syst. Manag., 2020

Analysis of DTLS Implementations Using Protocol State Fuzzing.
Proceedings of the 29th USENIX Security Symposium, 2020

State machine inference of QUIC.
CoRR, 2019

Is Java Card ready for hash-based signatures?
IACR Cryptol. ePrint Arch., 2018

Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Inferring OpenVPN State Machines Using Protocol State Fuzzing.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Extending Automated Protocol State Learning for the 802.11 4-Way Handshake.
Proceedings of the Computer Security, 2018

Model learning and model checking of SSH implementations.
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 2017

An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

TRAKS: A Universal Key Management Scheme for ERTMS.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations.
Proceedings of the Applied Cryptography and Network Security, 2017

Polymorphic Encryption and Pseudonymisation for Personalised Healthcare.
IACR Cryptol. ePrint Arch., 2016

cMix: Anonymization byHigh-Performance Scalable Mixing.
IACR Cryptol. ePrint Arch., 2016

Learning From Others' Mistakes: Penetration Testing IoT Devices in the Classroom.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

A Formal Security Analysis of ERTMS Train to Trackside Protocols.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2016

A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Protocol State Fuzzing of TLS Implementations.
Proceedings of the 24th USENIX Security Symposium, 2015

Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

An RFID Skimming Gate Using Higher Harmonics.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015

Relay Cost Bounding for Contactless EMV Payments.
Proceedings of the Financial Cryptography and Data Security, 2015

Defeating IMSI Catchers.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Automated algebraic analysis of structure-preserving signature schemes.
IACR Cryptol. ePrint Arch., 2014

Automated Reverse Engineering using Lego®.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

Analysis of Secure Key Storage Solutions on Android.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions.
Proceedings of the Policies and Research in Identity Management, 2013

Formal Models of Bank Cards for Free.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Designed to Fail: A USB-Connected Reader for Online Banking.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

Model Checking under Fairness in ProB and Its Application to Fair Exchange Protocols.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2012, 2012

The SmartLogic Tool: Analysing and Testing Smart Card Protocols.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Formal Analysis of the EMV Protocol Suite.
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011