ETH Zurich

General Info

Rank: #18 Worldwide
#1 in Europe
Number of Papers: 53
Number of Researchers: 72
APA
(average papers per authors):
0.7
Country: SWITZERLAND

Activity Map

Contributors

  • Srdjan Capkun (23 papers)
  • David Basin (11 papers)
  • Adrian Perrig (6 papers)
  • Nikolaos Karapanos (4 papers)
  • Cristina Basescu (3 papers)
  • Mario Strasser (3 papers)
  • Christina Popper (3 papers)
  • Joel Reardon (3 papers)
  • Kasper Bonne Rasmussen (3 papers)
  • Hubert Ritzdorf (3 papers)
  • Arthur Gervais (3 papers)
  • Boris Danev (2 papers)
  • Claudio Marforio (2 papers)
  • Claudio Soriente (2 papers)
  • Reza Shokri (2 papers)
  • Raphael M. Reischuk (2 papers)
  • Pawel Szalachowski (2 papers)
  • Thomas R. Gross (2 papers)
  • Cas Cremers (2 papers)
  • Nils Ole Tippenhauer (2 papers)
  • Aanjhan Ranganathan (2 papers)
  • Ralf Sasse (2 papers)
  • Mario Frank (2 papers)
  • Joachim M. Buhmann (2 papers)
  • Petar Tsankov (2 papers)
  • Aurelien Francillon (1 papers)
  • Davide Zanetti (1 papers)
  • Kari Kostiainen (1 papers)
  • Dominique Unruh (1 papers)
  • William Maisel (1 papers)
  • Mathias Payer (1 papers)
  • Tobias Hartmann (1 papers)
  • Benedikt Schmidt (1 papers)
  • Dan Kramer (1 papers)
  • MD (1 papers)
  • Luka Malisa (1 papers)
  • Alessandro Chiesa (1 papers)
  • Alexandros Filios (1 papers)
  • Raluca Ada Popa (1 papers)
  • Martin Burkhart (1 papers)
  • Dilip Many (1 papers)
  • Xenofontas Dimitropoulos (1 papers)
  • Antonio Barresi (1 papers)
  • Laurent Vanbever (1 papers)
  • Ramya Jayaram Masti (1 papers)
  • Devendra Rai (1 papers)
  • Christian Muller (1 papers)
  • Lothar Thiele (1 papers)
  • Sebastian Modersheim (1 papers)
  • Luca Vigano (1 papers)
  • Boris Koepf (1 papers)
  • Stefan Katzenbeisser (1 papers)
  • Mehmet Celik (1 papers)
  • Andreas P. Streich (1 papers)
  • Thomas Heydt-Benjamin (1 papers)
  • Christoph Sprenger (1 papers)
  • Ueli Maurer (1 papers)
  • Bjorn Tackmann (1 papers)
  • Elli Androulaki (1 papers)
  • Srdjan Marinovic (1 papers)
  • Mohammad Torabi Dashti (1 papers)
  • Tyler Moore (1 papers)
  • Adish Singla (1 papers)
  • Daniele Enrico Asoni (1 papers)
  • David Barrera (1 papers)
  • Jannik Dreier (1 papers)
  • Karl Wust (1 papers)
  • Glykantzis Vasileios (1 papers)
  • Esfandiar Mohammadi (1 papers)
  • Benjamin Bichsel (1 papers)
  • Veselin Raychev (1 papers)
  • Martin Vechev (1 papers)

Papers

"CDiff: a new reduction technique for constraint-based analysis of security protocols"

David Basin, Sebastian Modersheim, Luca Vigano, ... -- CCS 2003

"Simulatable Security and Concurrent Composition"

Dominique Unruh, ... -- Oakland 2006

"Privacy Preserving Error Resilient DNA Searching through Oblivious Automata"

Stefan Katzenbeisser, Mehmet Celik, ... -- CCS 2007

"An Information-Theoretic Model for Adaptive Side-Channel Attacks"

Boris Koepf, David Basin, ... -- CCS 2007

"Location Privacy of Distance Bounding Protocols"

Kasper Bonne Rasmussen, Srdjan Capkun, ... -- CCS 2008

"A Class of Probabilistic Models for Role Engineering"

Mario Frank, David Basin, Joachim M. Buhmann, ... -- CCS 2008

"Unbounded Verification, Falsification, and Characterization of Security Protocols by Pattern Refinement"

Cas Cremers, ... -- CCS 2008

"Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses"

William Maisel, ... -- Oakland 2008

"Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping"

Srdjan Capkun, Mario Strasser, Christina Popper, ... -- Oakland 2008

"A probabilistic approach to hybrid role mining"

Mario Frank, Andreas P. Streich, David Basin, Joachim M. Buhmann, ... -- CCS 2009

"Proximity-based access control for implantable medical devices"

Kasper Bonne Rasmussen, Thomas Heydt-Benjamin, Srdjan Capkun, ... -- CCS 2009

"Physical-layer Identification of RFID Devices"

Srdjan Capkun, Boris Danev, ... -- Usenix 2009

"Jamming-resistant Broadcast Communication without Shared Keys"

Srdjan Capkun, Mario Strasser, Christina Popper, ... -- Usenix 2009

"On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption"

Ueli Maurer, Bjorn Tackmann, ... -- CCS 2010

"Realization of RF Distance Bounding"

Kasper Bonne Rasmussen, Srdjan Capkun, ... -- Usenix 2010

"Developing security protocols by refinement"

Christoph Sprenger, David Basin, ... -- CCS 2010

"SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics"

Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos, ... -- Usenix 2010

"Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars"

Aurelien Francillon, Boris Danev, Srdjan Capkun, ... -- NDSS 2011

"On the Requirements for Successful GPS Spoofing Attacks"

Nils Ole Tippenhauer, Christina Popper, Srdjan Capkun, ... -- CCS 2011

"Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory"

Joel Reardon, Srdjan Capkun, David Basin, ... -- Usenix 2012

"Double-Spending Fast Payments in Bitcoin"

Elli Androulaki, Srdjan Capkun, ... -- CCS 2012

"Safe Loading - A Foundation for Secure Execution of Untrusted Programs"

Mathias Payer, Tobias Hartmann, Thomas R. Gross, ... -- Oakland 2012

"Distance Hijacking Attacks on Distance Bounding Protocols"

Cas Cremers, Benedikt Schmidt, Srdjan Capkun, ... -- Oakland 2012

"Secure Data Deletion from Persistent Media"

Joel Reardon, Hubert Ritzdorf, David Basin, Srdjan Capkun, ... -- CCS 2013

"SoK: Secure Data Deletion"

Joel Reardon, David Basin, Srdjan Capkun, ... -- Oakland 2013

"Tailing RFID Tags for Clone Detection"

Davide Zanetti, Srdjan Capkun, ... -- NDSS 2013

"OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms"

Adrian Perrig, ... -- CCS 2013

"On Limitations of Friendly Jamming for Confidentiality"

Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun, ... -- Oakland 2013

"Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors"

Dan Kramer, MD, ... -- Oakland 2013

"Automated Verification of Group Key Agreement Protocols"

Ralf Sasse, David Basin, ... -- Oakland 2014

"On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications"

Nikolaos Karapanos, Srdjan Capkun, ... -- Usenix 2014

"Quantifying Web-Search Privacy"

Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, ... -- CCS 2014

"PoliCert: Secure and Flexible TLS Certificate Management"

Pawel Szalachowski, Adrian Perrig, ... -- CCS 2014

"A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning"

Tyler Moore, ... -- CCS 2014

"Smartphones as Practical and Secure Location Verification Tokens for Payments"

Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun, ... -- NDSS 2014

"Fail-Secure Access Control"

Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David Basin, ... -- CCS 2014

"Mechanized Network Origin and Path Authenticity Proofs"

Cristina Basescu, Adrian Perrig, ... -- CCS 2014

"Tampering with the Delivery of Blocks and Transactions in Bitcoin"

Arthur Gervais, Hubert Ritzdorf, Srdjan Capkun, ... -- CCS 2015

"Automated Symbolic Proofs of Observational Equivalence"

David Basin, Jannik Dreier, Ralf Sasse, ... -- CCS 2015

"HORNET: High-speed Onion Routing at the Network Layer"

Daniele Enrico Asoni, David Barrera, Adrian Perrig, ... -- CCS 2015

"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity"

Antonio Barresi, Thomas R. Gross, ... -- Usenix 2015

"RAPTOR: Routing Attacks on Privacy in Tor"

Laurent Vanbever, ... -- Usenix 2015

"Thermal Covert Channels on Multi-core Platforms"

Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Muller, Lothar Thiele, Srdjan Capkun, ... -- Usenix 2015

"Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms"

Reza Shokri, ... -- NDSS 2015

"Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound"

Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun, ... -- Usenix 2015

"ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data"

Raphael M. Reischuk, ... -- Oakland 2015

"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs"

Alessandro Chiesa, ... -- Oakland 2015

"Verena: End-to-End Integrity Protection for Web Applications"

Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun, ... -- Oakland 2016

"On the Security and Performance of Proof of Work Blockchains"

Arthur Gervais, Karl Wust, Glykantzis Vasileios, Hubert Ritzdorf, Srdjan Capkun, ... -- CCS 2016

"SIBRA: Scalable Internet Bandwidth Reservation Architecture"

Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, ... -- NDSS 2016

"High-Speed Inter-domain Fault Localization"

Cristina Basescu, Adrian Perrig, ... -- Oakland 2016

"Computational Soundness of Dalvik Bytecode"

Esfandiar Mohammadi, ... -- CCS 2016

"Statistical Deobfuscation of Android Applications"

Benjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin Vechev, ... -- CCS 2016