Some tools M Clavel, F Durán, S Eker, P Lincoln, N Martí-Oliet, J Meseguer, C Talcott, ... All About Maude-A High-Performance Logical Framework: How to Specify …, 2007 | 1569 | 2007 |
A formal analysis of 5G authentication D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 436 | 2018 |
ARPKI: Attack resilient public-key infrastructure D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 172 | 2014 |
Folding variant narrowing and optimal variant termination S Escobar, R Sasse, J Meseguer The Journal of Logic and Algebraic Programming 81 (7-8), 898-928, 2012 | 171 | 2012 |
Automated symbolic proofs of observational equivalence D Basin, J Dreier, R Sasse Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 116 | 2015 |
A systematic approach to uncover security flaws in GUI logic S Chen, J Meseguer, R Sasse, HJ Wang, YM Wang 2007 IEEE Symposium on Security and Privacy (SP'07), 71-85, 2007 | 76 | 2007 |
Design, analysis, and implementation of ARPKI: An attack-resilient public-key infrastructure D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski IEEE Transactions on Dependable and Secure Computing 15 (3), 393-408, 2016 | 64 | 2016 |
Automated verification of group key agreement protocols B Schmidt, R Sasse, C Cremers, D Basin 2014 IEEE Symposium on Security and Privacy, 179-194, 2014 | 62 | 2014 |
Variant narrowing and equational unification S Escobar, J Meseguer, R Sasse Electronic Notes in Theoretical Computer Science 238 (3), 103-119, 2009 | 60 | 2009 |
Beyond subterm-convergent equational theories in automated verification of stateful protocols J Dreier, C Duménil, S Kremer, R Sasse Principles of Security and Trust: 6th International Conference, POST 2017 …, 2017 | 58 | 2017 |
The EMV standard: Break, fix, verify D Basin, R Sasse, J Toro-Pozo 2021 IEEE Symposium on Security and Privacy (SP), 1766-1781, 2021 | 57 | 2021 |
Automated unbounded verification of stateful cryptographic protocols with exclusive OR J Dreier, L Hirschi, S Radomirovic, R Sasse 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 359-373, 2018 | 51 | 2018 |
Seems legit: Automated analysis of subtle attacks on protocols that use signatures D Jackson, C Cremers, K Cohn-Gordon, R Sasse Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 48 | 2019 |
Symbolically analyzing security protocols using tamarin D Basin, C Cremers, J Dreier, R Sasse ACM SIGLOG News 4 (4), 19-30, 2017 | 43 | 2017 |
A comprehensive formal analysis of 5G handover A Peltonen, R Sasse, D Basin Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 41 | 2021 |
Automatic validation of transformation rules for Java verification against a rewriting semantics W Ahrendt, A Roth, R Sasse International Conference on Logic for Programming Artificial Intelligence …, 2005 | 35 | 2005 |
Java+ ITP: A verification tool based on Hoare logic and algebraic semantics R Sasse, J Meseguer Electronic Notes in Theoretical Computer Science 176 (4), 29-46, 2007 | 33 | 2007 |
Formal analysis and implementation of a tpm 2.0-based direct anonymous attestation scheme S Wesemeyer, CJP Newton, H Treharne, L Chen, R Sasse, J Whitefield Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 31 | 2020 |
A spectral analysis of noise: A comprehensive, automated, formal analysis of {Diffie-Hellman} protocols G Girol, L Hirschi, R Sasse, D Jackson, C Cremers, D Basin 29th USENIX Security Symposium (USENIX Security 20), 1857-1874, 2020 | 30 | 2020 |
Effective symbolic protocol analysis via equational irreducibility conditions S Erbatur, S Escobar, D Kapur, Z Liu, C Lynch, C Meadows, J Meseguer, ... Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 30 | 2012 |