Ralf Sasse

According to our database1, Ralf Sasse authored at least 29 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures.
IACR Cryptology ePrint Archive, 2019

Security Issues in the 5G Standard and How Formal Methods Come to the Rescue.
ERCIM News, 2019

Proxy Certificates: The Missing Link in the Web's Chain of Trust.
CoRR, 2019

A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Symbolic Analysis of Identity-Based Protocols.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Sec. Comput., 2018

Formal Analysis of 5G Authentication.
CoRR, 2018

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

A Formal Analysis of 5G Authentication.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Symbolically analyzing security protocols using tamarin.
SIGLOG News, 2017

Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

2015
Automated Symbolic Proofs of Observational Equivalence.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Alice and Bob Meet Equational Theories.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

2014
Automated Verification of Group Key Agreement Protocols.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

ARPKI: Attack Resilient Public-Key Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
Proceedings of the Automated Deduction - CADE-24, 2013

2012
Folding variant narrowing and optimal variant termination.
J. Log. Algebr. Program., 2012

IBOS: A Correct-By-Construction Modular Browser.
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012

Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption.
Proceedings of the 13th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2011

2010
Folding Variant Narrowing and Optimal Variant Termination.
Proceedings of the Rewriting Logic and Its Applications - 8th International Workshop, 2010

Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

2009
Variant Narrowing and Equational Unification.
Electr. Notes Theor. Comput. Sci., 2009

Model-Checking DoS Amplification for VoIP Session Initiation.
Proceedings of the Computer Security, 2009

2008
Effectively Checking the Finite Variant Property.
Proceedings of the Rewriting Techniques and Applications, 19th International Conference, 2008

2007
Java+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics.
Electr. Notes Theor. Comput. Sci., 2007

A Systematic Approach to Uncover Security Flaws in GUI Logic.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007


2005
Automatic Validation of Transformation Rules for Java Verification Against a Rewriting Semantics.
Proceedings of the Logic for Programming, 2005


  Loading...