default search action
Ralf Sasse
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]David A. Basin, Xenia Hofmeier, Ralf Sasse, Jorge Toro-Pozo:
Getting Chip Card Payments Right. FM (1) 2024: 29-51 - [i8]Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David A. Basin:
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. IACR Cryptol. ePrint Arch. 2024: 1226 (2024) - [i7]Felix Linker, Ralf Sasse, David A. Basin:
A Formal Analysis of Apple's iMessage PQ3 Protocol. IACR Cryptol. ePrint Arch. 2024: 1395 (2024) - 2023
- [c35]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. SP 2023: 1077-1093 - 2022
- [j5]David A. Basin, Cas Cremers, Jannik Dreier, Ralf Sasse:
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols. IEEE Secur. Priv. 20(3): 24-32 (2022) - [c34]Sven Hammann, Michael Crabb, Sasa Radomirovic, Ralf Sasse, David A. Basin:
"I'm Surprised So Much Is Connected". CHI 2022: 620:1-620:13 - [d2]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. Version v1.0.0. Zenodo, 2022 [all versions] - [d1]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. Version v1.0.0. Zenodo, 2022 [all versions] - [i6]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version). CoRR abs/2212.04171 (2022) - 2021
- [c33]David A. Basin, Ralf Sasse, Jorge Toro-Pozo:
The EMV Standard: Break, Fix, Verify. SP 2021: 1766-1781 - [c32]David A. Basin, Ralf Sasse, Jorge Toro-Pozo:
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions. USENIX Security Symposium 2021: 179-194 - [c31]Aleksi Peltonen, Ralf Sasse, David A. Basin:
A comprehensive formal analysis of 5G handover. WISEC 2021: 1-12 - 2020
- [j4]Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse:
Verification of stateful cryptographic protocols with exclusive OR. J. Comput. Secur. 28(1): 1-34 (2020) - [c30]Sven Hammann, Ralf Sasse, David A. Basin:
Privacy-Preserving OpenID Connect. AsiaCCS 2020: 277-289 - [c29]Stephan Wesemeyer, Christopher J. P. Newton, Helen Treharne, Liqun Chen, Ralf Sasse, Jorden Whitefield:
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme. AsiaCCS 2020: 784-798 - [c28]Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig:
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust. EuroS&P 2020: 624-638 - [c27]Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David A. Basin:
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. USENIX Security Symposium 2020: 1857-1874 - [i5]David A. Basin, Ralf Sasse, Jorge Toro-Pozo:
The EMV Standard: Break, Fix, Verify. CoRR abs/2006.08249 (2020)
2010 – 2019
- 2019
- [c26]David A. Basin, Lucca Hirschi, Ralf Sasse:
Symbolic Analysis of Identity-Based Protocols. Foundations of Security, Protocols, and Equational Reasoning 2019: 112-134 - [c25]Sven Hammann, Sasa Radomirovic, Ralf Sasse, David A. Basin:
User Account Access Graphs. CCS 2019: 1405-1422 - [c24]Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse:
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures. CCS 2019: 2165-2180 - [c23]Jorden Whitefield, Liqun Chen, Ralf Sasse, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. EuroS&P 2019: 127-141 - [i4]Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig:
Proxy Certificates: The Missing Link in the Web's Chain of Trust. CoRR abs/1906.10775 (2019) - [i3]Lucca Hirschi, Ralf Sasse, Jannik Dreier:
Security Issues in the 5G Standard and How Formal Methods Come to the Rescue. ERCIM News 2019(117) (2019) - [i2]Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon, Ralf Sasse:
Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures. IACR Cryptol. ePrint Arch. 2019: 779 (2019) - 2018
- [j3]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure. IEEE Trans. Dependable Secur. Comput. 15(3): 393-408 (2018) - [c22]David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler:
A Formal Analysis of 5G Authentication. CCS 2018: 1383-1396 - [c21]Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse:
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR. CSF 2018: 359-373 - [i1]David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler:
Formal Analysis of 5G Authentication. CoRR abs/1806.10360 (2018) - 2017
- [j2]David A. Basin, Cas Cremers, Jannik Dreier, Ralf Sasse:
Symbolically analyzing security protocols using tamarin. ACM SIGLOG News 4(4): 19-30 (2017) - [c20]Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse:
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. POST 2017: 117-140 - 2016
- [c19]Ralf Sasse:
Automated Symbolic Proofs of Security Protocols. UNIF 2016: 6-8 - 2015
- [c18]David A. Basin, Michel Keller, Sasa Radomirovic, Ralf Sasse:
Alice and Bob Meet Equational Theories. Logic, Rewriting, and Concurrency 2015: 160-180 - [c17]David A. Basin, Jannik Dreier, Ralf Sasse:
Automated Symbolic Proofs of Observational Equivalence. CCS 2015: 1144-1155 - 2014
- [c16]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
ARPKI: Attack Resilient Public-Key Infrastructure. CCS 2014: 382-393 - [c15]Benedikt Schmidt, Ralf Sasse, Cas Cremers, David A. Basin:
Automated Verification of Group Key Agreement Protocols. IEEE Symposium on Security and Privacy 2014: 179-194 - 2013
- [c14]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse:
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis. CADE 2013: 231-248 - 2012
- [b1]Ralf Sasse:
Security models in rewriting logic for cryptographic protocols and browsers. University of Illinois Urbana-Champaign, USA, 2012 - [j1]Santiago Escobar, Ralf Sasse, José Meseguer:
Folding variant narrowing and optimal variant termination. J. Log. Algebraic Methods Program. 81(7-8): 898-928 (2012) - [c13]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse:
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. ESORICS 2012: 73-90 - [c12]Ralf Sasse, Samuel T. King, José Meseguer, Shuo Tang:
IBOS: A Correct-By-Construction Modular Browser. FACS 2012: 224-241 - 2011
- [c11]Santiago Escobar, Deepak Kapur, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Ralf Sasse:
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption. PPDP 2011: 65-76 - [c10]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Ralf Sasse:
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis. UNIF 2011: 59-64 - 2010
- [c9]Ralf Sasse, Santiago Escobar, Catherine Meadows, José Meseguer:
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA. STM 2010: 163-178 - [c8]Santiago Escobar, Ralf Sasse, José Meseguer:
Folding Variant Narrowing and Optimal Variant Termination. WRLA 2010: 52-68
2000 – 2009
- 2009
- [c7]Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer:
Model-Checking DoS Amplification for VoIP Session Initiation. ESORICS 2009: 390-405 - 2008
- [c6]Santiago Escobar, José Meseguer, Ralf Sasse:
Effectively Checking the Finite Variant Property. RTA 2008: 79-93 - [c5]Santiago Escobar, José Meseguer, Ralf Sasse:
Equational Unification by Variant Narrowing (Extended Abstract). UNIF 2008: 35-39 - [c4]Santiago Escobar, José Meseguer, Ralf Sasse:
Variant Narrowing and Equational Unification. WRLA 2008: 103-119 - 2007
- [c3]José Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang:
A Systematic Approach to Uncover Security Flaws in GUI Logic. S&P 2007: 71-85 - [p1]Manuel Clavel, Francisco Durán, Steven Eker, Patrick Lincoln, Narciso Martí-Oliet, José Meseguer, Carolyn L. Talcott, Christiano Braga, Azadeh Farzan, Joe Hendrix, Peter Csaba Ölveczky, Miguel Palomino, Ralf Sasse, Mark-Oliver Stehr, Alberto Verdejo:
Some Tools. All About Maude 2007: 667-693 - 2006
- [c2]Ralf Sasse, José Meseguer:
Java+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics. WRLA 2006: 29-46 - 2005
- [c1]Wolfgang Ahrendt, Andreas Roth, Ralf Sasse:
Automatic Validation of Transformation Rules for Java Verification Against a Rewriting Semantics. LPAR 2005: 412-426
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint