ETH Zurich

General Info

Rank: #9 Worldwide
#2 in Europe
Papers: 153
Number of Researchers: 191
APA
(average papers per authors):
0.8
Country: SWITZERLAND

Activity Map

Contributors

  • Srdjan Capkun (41 papers)
  • David Basin (20 papers)
  • Adrian Perrig (17 papers)
  • Martin Vechev (15 papers)
  • Petar Tsankov (11 papers)
  • Ralf Sasse (9 papers)
  • Kari Kostiainen (8 papers)
  • Kaveh Razavi (8 papers)
  • Benjamin Bichsel (6 papers)
  • Karl Wust (5 papers)
  • Patrick Leu (5 papers)
  • Laurent Vanbever (5 papers)
  • Sinisa Matetic (5 papers)
  • Kenneth G. Paterson (5 papers)
  • Samuel Steffen (5 papers)
  • Arthur Gervais (5 papers)
  • Nikolaos Karapanos (4 papers)
  • Hubert Ritzdorf (4 papers)
  • Dana Drachsler Cohen (4 papers)
  • Cristina Basescu (3 papers)
  • Raphael M. Reischuk (3 papers)
  • Pawel Szalachowski (3 papers)
  • Mridula Singh (3 papers)
  • Aritra Dhar (3 papers)
  • Jonghoon Kwon (3 papers)
  • Marc Roeschlin (3 papers)
  • Mario Strasser (3 papers)
  • Christina Popper (3 papers)
  • Joel Reardon (3 papers)
  • Manu Drijvers (3 papers)
  • Timon Gehr (3 papers)
  • Esfandiar Mohammadi (3 papers)
  • Patrick Jattke (3 papers)
  • Ce Zhang (3 papers)
  • Kasper Bonne Rasmussen (3 papers)
  • Jingxuan He (3 papers)
  • Kenny Paterson (3 papers)
  • Moritz Schneider (3 papers)
  • Boris Danev (2 papers)
  • Claudio Marforio (2 papers)
  • Claudio Soriente (2 papers)
  • Reza Shokri (2 papers)
  • Maria Apostolaki (2 papers)
  • Enis Ulqinaku (2 papers)
  • Joel Wanner (2 papers)
  • Roland Meier (2 papers)
  • Thomas R. Gross (2 papers)
  • Cas Cremers (2 papers)
  • Nils Ole Tippenhauer (2 papers)
  • Aanjhan Ranganathan (2 papers)
  • Stephanos Matsumoto (2 papers)
  • Onur Mutlu (2 papers)
  • Lorenz Breidenbach (2 papers)
  • Anwar Hithnawi (2 papers)
  • Jorge Toro-Pozo (2 papers)
  • Flavien Solt (2 papers)
  • Mario Frank (2 papers)
  • Joachim M. Buhmann (2 papers)
  • Christoph Sprenger (2 papers)
  • Veselin Raychev (2 papers)
  • Gregor Seiler (2 papers)
  • Carlos Cotrini (2 papers)
  • Luka Rimanic (2 papers)
  • Shweta Shinde (2 papers)
  • Konstantin Taranov (2 papers)
  • Benjamin Rothenberger (2 papers)
  • Torsten Hoefler (2 papers)
  • Marc Wyss (2 papers)
  • Aurelien Francillon (1 papers)
  • Davide Zanetti (1 papers)
  • Guillaume Felley (1 papers)
  • Gian Marti (1 papers)
  • Jan Muller (1 papers)
  • Taeho Lee (1 papers)
  • Claude Hahni (1 papers)
  • Sikhar Patranabis (1 papers)
  • Loris Diana (1 papers)
  • and Kari Kostiainen (1 papers)
  • Hahni Claude (1 papers)
  • Fabio Streun (1 papers)
  • Laurent Chuat (1 papers)
  • Cyrill Krahenbuhl (1 papers)
  • Mathias Payer (1 papers)
  • Tobias Hartmann (1 papers)
  • Benedikt Schmidt (1 papers)
  • Luka Malisa (1 papers)
  • Alessandro Chiesa (1 papers)
  • Alexandros Filios (1 papers)
  • Raluca Ada Popa (1 papers)
  • Matthew Mirman (1 papers)
  • Daniel Moser (1 papers)
  • Damien Desfontaines (1 papers)
  • Jeremie Kim (1 papers)
  • Minesh Patel (1 papers)
  • Michael Kurth (1 papers)
  • Hasan Hassan (1 papers)
  • Dimitar Dimitrov (1 papers)
  • Joseph Lallemand (1 papers)
  • Kristina Hostakova (1 papers)
  • Ilija Bogunovic (1 papers)
  • Alexander Viand (1 papers)
  • Dennis Jackson (1 papers)
  • Eleanor McMurtry (1 papers)
  • Stijn Gunter (1 papers)
  • Igors Stepanovs (1 papers)
  • Michele Marazzi (1 papers)
  • Daniele Lain (1 papers)
  • Roger Baumgartner (1 papers)
  • Sebastian Modersheim (1 papers)
  • Luca Vigano (1 papers)
  • Boris Koepf (1 papers)
  • Andreas P. Streich (1 papers)
  • Thomas Heydt-Benjamin (1 papers)
  • Ueli Maurer (1 papers)
  • Bjorn Tackmann (1 papers)
  • Elli Androulaki (1 papers)
  • Srdjan Marinovic (1 papers)
  • Mohammad Torabi Dashti (1 papers)
  • Adish Singla (1 papers)
  • Chen Chen (1 papers)
  • Daniele Enrico Asoni (1 papers)
  • David Barrera (1 papers)
  • Jannik Dreier (1 papers)
  • Glykantzis Vasileios (1 papers)
  • Ramy Khalil (1 papers)
  • Martin Kucera (1 papers)
  • Marco Guarnieri (1 papers)
  • Mathias Humbert (1 papers)
  • Andrei Marian Dan (1 papers)
  • Florian Buenzli (1 papers)
  • Sergiu Costea (1 papers)
  • Martin Hirt (1 papers)
  • Lucca Hirschi (1 papers)
  • Vincent Stettler (1 papers)
  • Christian Badertscher (1 papers)
  • Pesho Ivanov (1 papers)
  • Mislav Balunovic (1 papers)
  • Nodar Ambroladze (1 papers)
  • Lorenz Breindenbach (1 papers)
  • Luca Corinzia (1 papers)
  • Thilo Weghorn (1 papers)
  • Sven Hammann (1 papers)
  • Mario Gersbach (1 papers)
  • Noa Melchior (1 papers)
  • Silvan Egli (1 papers)
  • Sofia Giampietro (1 papers)
  • Maurice Weber (1 papers)
  • Gishor Sivanrupan (1 papers)
  • Felix Gunther (1 papers)
  • Mia Filic (1 papers)
  • Anupama Unnikrishnan (1 papers)
  • Daniele De Sensi (1 papers)
  • Noah Delius (1 papers)
  • Nikola Jovanovic (1 papers)
  • Marc Fischer (1 papers)
  • Giacomo Giuliari (1 papers)
  • Jonas Mohler (1 papers)
  • Florian Tramer (1 papers)
  • Lara Bruseghini (1 papers)
  • Martin Burkhart (1 papers)
  • Dilip Many (1 papers)
  • Xenofontas Dimitropoulos (1 papers)
  • Antonio Barresi (1 papers)
  • Ramya Jayaram Masti (1 papers)
  • Devendra Rai (1 papers)
  • Christian Muller (1 papers)
  • Lothar Thiele (1 papers)
  • Mansoor Ahmed (1 papers)
  • David Sommer (1 papers)
  • AbdelRahman Abdou (1 papers)
  • Karl Wuest (1 papers)
  • Markus Legner (1 papers)
  • Tobias Klenze (1 papers)
  • Hossein Shafagh (1 papers)
  • Lukas Burkhalter (1 papers)
  • Ivan Puddu (1 papers)
  • Miro Haller (1 papers)
  • Finn de Ridder (1 papers)
  • Dino Bollinger (1 papers)
  • Karel Kubicek (1 papers)
  • Martin Kotuliak (1 papers)
  • Simon Erni (1 papers)
  • Marc Roschlin (1 papers)
  • Raphael Eikenberg (1 papers)
  • Daniel Trujillo (1 papers)
  • Giovanni Camurati (1 papers)
  • Claudio Anliker (1 papers)
  • Francois Wirz (1 papers)
  • Johannes Wikner (1 papers)
  • Jean-Pierre Smith (1 papers)
  • Luca Dolfi (1 papers)

Papers

"CDiff: a new reduction technique for constraint-based analysis of security protocols"

David Basin, Sebastian Modersheim, Luca Vigano, ... -- CCS 2003

"An Information-Theoretic Model for Adaptive Side-Channel Attacks"

Boris Koepf, David Basin, ... -- CCS 2007

"Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping"

Srdjan Capkun, Mario Strasser, Christina Popper, ... -- Oakland 2008

"Location Privacy of Distance Bounding Protocols"

Kasper Bonne Rasmussen, Srdjan Capkun, ... -- CCS 2008

"Unbounded Verification, Falsification, and Characterization of Security Protocols by Pattern Refinement"

Cas Cremers, ... -- CCS 2008

"A Class of Probabilistic Models for Role Engineering"

Mario Frank, David Basin, Joachim M. Buhmann, ... -- CCS 2008

"A probabilistic approach to hybrid role mining"

Mario Frank, Andreas P. Streich, David Basin, Joachim M. Buhmann, ... -- CCS 2009

"Proximity-based access control for implantable medical devices"

Kasper Bonne Rasmussen, Thomas Heydt-Benjamin, Srdjan Capkun, ... -- CCS 2009

"Physical-layer Identification of RFID Devices"

Srdjan Capkun, Boris Danev, ... -- Usenix 2009

"Jamming-resistant Broadcast Communication without Shared Keys"

Srdjan Capkun, Mario Strasser, Christina Popper, ... -- Usenix 2009

"Developing security protocols by refinement"

Christoph Sprenger, David Basin, ... -- CCS 2010

"On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption"

Ueli Maurer, Bjorn Tackmann, ... -- CCS 2010

"SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics"

Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos, ... -- Usenix 2010

"Realization of RF Distance Bounding"

Kasper Bonne Rasmussen, Srdjan Capkun, ... -- Usenix 2010

"Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars"

Aurelien Francillon, Boris Danev, Srdjan Capkun, ... -- NDSS 2011

"On the Requirements for Successful GPS Spoofing Attacks"

Nils Ole Tippenhauer, Christina Popper, Srdjan Capkun, ... -- CCS 2011

"Safe Loading - A Foundation for Secure Execution of Untrusted Programs"

Mathias Payer, Tobias Hartmann, Thomas R. Gross, ... -- Oakland 2012

"Distance Hijacking Attacks on Distance Bounding Protocols"

Cas Cremers, Benedikt Schmidt, Srdjan Capkun, ... -- Oakland 2012

"Double-Spending Fast Payments in Bitcoin"

Elli Androulaki, Srdjan Capkun, ... -- CCS 2012

"Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory"

Joel Reardon, Srdjan Capkun, David Basin, ... -- Usenix 2012

"Tailing RFID Tags for Clone Detection"

Davide Zanetti, Srdjan Capkun, ... -- NDSS 2013

"On Limitations of Friendly Jamming for Confidentiality"

Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun, ... -- Oakland 2013

"SoK: Secure Data Deletion"

Joel Reardon, David Basin, Srdjan Capkun, ... -- Oakland 2013

"OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms"

Adrian Perrig, ... -- CCS 2013

"Secure Data Deletion from Persistent Media"

Joel Reardon, Hubert Ritzdorf, David Basin, Srdjan Capkun, ... -- CCS 2013

"Smartphones as Practical and Secure Location Verification Tokens for Payments"

Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun, ... -- NDSS 2014

"Automated Verification of Group Key Agreement Protocols"

Ralf Sasse, David Basin, ... -- Oakland 2014

"Fail-Secure Access Control"

Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David Basin, ... -- CCS 2014

"Mechanized Network Origin and Path Authenticity Proofs"

Cristina Basescu, Adrian Perrig, ... -- CCS 2014

"PoliCert: Secure and Flexible TLS Certificate Management"

Pawel Szalachowski, Stephanos Matsumoto, Adrian Perrig, ... -- CCS 2014

"ARPKI: Attack Resilient Public-key Infrastructure"

David Basin, Adrian Perrig, Ralf Sasse, Pawel Szalachowski, ... -- CCS 2014

"Quantifying Web-Search Privacy"

Arthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, ... -- CCS 2014

"On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications"

Nikolaos Karapanos, Srdjan Capkun, ... -- Usenix 2014

"Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms"

Reza Shokri, ... -- NDSS 2015

"ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data"

Raphael M. Reischuk, ... -- Oakland 2015

"Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs"

Alessandro Chiesa, ... -- Oakland 2015

"HORNET: High-speed Onion Routing at the Network Layer"

Chen Chen, Daniele Enrico Asoni, David Barrera, Adrian Perrig, ... -- CCS 2015

"Tampering with the Delivery of Blocks and Transactions in Bitcoin"

Arthur Gervais, Hubert Ritzdorf, Srdjan Capkun, ... -- CCS 2015

"Automated Symbolic Proofs of Observational Equivalence"

David Basin, Jannik Dreier, Ralf Sasse, ... -- CCS 2015

"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity"

Antonio Barresi, Thomas R. Gross, ... -- Usenix 2015

"RAPTOR: Routing Attacks on Privacy in Tor"

Laurent Vanbever, ... -- Usenix 2015

"Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound"

Nikolaos Karapanos, Claudio Marforio, Claudio Soriente, Srdjan Capkun, ... -- Usenix 2015

"Thermal Covert Channels on Multi-core Platforms"

Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Muller, Lothar Thiele, Srdjan Capkun, ... -- Usenix 2015

"SIBRA: Scalable Internet Bandwidth Reservation Architecture"

Cristina Basescu, Raphael M. Reischuk, Pawel Szalachowski, Adrian Perrig, ... -- NDSS 2016

"High-Speed Inter-domain Fault Localization"

Cristina Basescu, Adrian Perrig, ... -- Oakland 2016

"Verena: End-to-End Integrity Protection for Web Applications"

Nikolaos Karapanos, Alexandros Filios, Raluca Ada Popa, Srdjan Capkun, ... -- Oakland 2016

"On the Security and Performance of Proof of Work Blockchains"

Arthur Gervais, Karl Wust, Glykantzis Vasileios, Hubert Ritzdorf, Srdjan Capkun, ... -- CCS 2016

"Computational Soundness of Dalvik Bytecode"

Esfandiar Mohammadi, ... -- CCS 2016

"Statistical Deobfuscation of Android Applications"

Benjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin Vechev, ... -- CCS 2016

"Hijacking Bitcoin: Routing Attacks on Cryptocurrencies"

Maria Apostolaki, Laurent Vanbever, ... -- Oakland 2017

"IKP: Turning a PKI Around with Decentralized Automated Incentives"

Stephanos Matsumoto, Raphael M. Reischuk, ... -- Oakland 2017

"One TPM to Bind Them All: Fixing TPM2.0 for Provably Secure Anonymous Attestation"

Manu Drijvers, ... -- Oakland 2017

"Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain"

Manu Drijvers, ... -- CCS 2017

"Revive: Rebalancing Off-Blockchain Payment Networks"

Ramy Khalil, Arthur Gervais, ... -- CCS 2017

"Synthesis of Permissive Privacy Enforcement"

Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin Vechev, ... -- CCS 2017

"walk2friends: Inferring Social Links from Mobility Profiles"

Mathias Humbert, ... -- CCS 2017

"ROTE: Rollback Protection for Trusted Execution"

Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Srdjan Capkun, ... -- Usenix 2017

"TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing."

Hubert Ritzdorf, Karl Wust, Guillaume Felley, Srdjan Capkun, ... -- NDSS 2018

"AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation"

Timon Gehr, Matthew Mirman, Dana Drachsler Cohen, Petar Tsankov, Martin Vechev, ... -- Oakland 2018

"Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two"

Esfandiar Mohammadi, ... -- Oakland 2018

"Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks"

Daniel Moser, ... -- Oakland 2018

"Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy"

Esfandiar Mohammadi, ... -- CCS 2018

"SECURIFY: Practical Security Analysis of Smart Contracts"

Petar Tsankov, Andrei Marian Dan, Dana Drachsler Cohen, Florian Buenzli, Martin Vechev, ... -- CCS 2018

"Secure Opportunistic Multipath Key Exchange"

Sergiu Costea, ... -- CCS 2018

"An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants"

Martin Hirt, ... -- CCS 2018

"Formal Analysis of 5G Authentication"

David Basin, Lucca Hirschi, Ralf Sasse, Vincent Stettler, ... -- CCS 2018

"Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability"

Christian Badertscher, ... -- CCS 2018

"Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability"

Gregor Seiler, ... -- CCS 2018

"DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization"

Benjamin Bichsel, Timon Gehr, Dana Drachsler Cohen, Petar Tsankov, Martin Vechev, ... -- CCS 2018

"Debin: Predicting Debug Information in Stripped Binaries"

Jingxuan He, Pesho Ivanov, Petar Tsankov, Veselin Raychev, Martin Vechev, ... -- CCS 2018

"NetHide: Secure and Practical Network Topology Obfuscation"

Roland Meier, Petar Tsankov, Laurent Vanbever, Martin Vechev, ... -- Usenix 2018

"Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts"

Lorenz Breidenbach, ... -- Usenix 2018

"DelegaTEE: Brokered Delegation Using Trusted Execution Environments"

Sinisa Matetic, Moritz Schneider, Srdjan Capkun, ... -- Usenix 2018

"UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks"

Mridula Singh, Patrick Leu, Srdjan Capkun, ... -- NDSS 2019

"SABRE: Protecting Bitcoin against Routing Attacks"

Maria Apostolaki, Gian Marti, Jan Muller, Laurent Vanbever, ... -- NDSS 2019

"KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale"

Damien Desfontaines, ... -- Oakland 2019

"On the Security of Two-Round Multi-Signatures"

Manu Drijvers, ... -- Oakland 2019

"Learning to Fuzz from Symbolic Execution with Application to Smart Contracts"

Jingxuan He, Mislav Balunovic, Nodar Ambroladze, Petar Tsankov, Martin Vechev, ... -- CCS 2019

"Seems Legit: Automated Analysis of Subtle Attacks on Protocols that use Signatures"

Ralf Sasse, ... -- CCS 2019

"Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware"

Lorenz Breindenbach, ... -- CCS 2019

"The Next 700 Policy Miners: A Universal Method for Building Policy Miners"

Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David Basin, ... -- CCS 2019

"User Account Access Graphs"

Sven Hammann, Ralf Sasse, David Basin, ... -- CCS 2019

"zkay: Specifying and Enforcing Data Privacy in Smart Contracts"

Samuel Steffen, Benjamin Bichsel, Mario Gersbach, Noa Melchior, Petar Tsankov, Martin Vechev, ... -- CCS 2019

"UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband"

Mridula Singh, Patrick Leu, AbdelRahman Abdou, Srdjan Capkun, ... -- Usenix 2019

"BITE: Bitcoin Lightweight Client Privacy using Trusted Execution"

Sinisa Matetic, Karl Wuest, Moritz Schneider, Kari Kostiainen, Srdjan Capkun, ... -- Usenix 2019

"ProtectIOn: Root-of-Trust for IO in Compromised Platforms"

Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun, ... -- NDSS 2020

"Snappy: Fast On-chain Payments with Practical Collaterals"

Karl Wust, Aritra Dhar, Kari Kostiainen, Srdjan Capkun, ... -- NDSS 2020

"SVLAN: Secure & Scalable Network Virtualization"

Jonghoon Kwon, Taeho Lee, Claude Hahni, Adrian Perrig, ... -- NDSS 2020

"Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers"

Jeremie Kim, Minesh Patel, Onur Mutlu, ... -- Oakland 2020

"Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability"

Lorenz Breidenbach, ... -- Oakland 2020

"Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement"

Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, Srdjan Capkun, ... -- Oakland 2020

"NetCAT: Practical Cache Attacks for the Network"

Michael Kurth, ... -- Oakland 2020

"TRRespass: Exploiting the Many Sides of Target Row Refresh"

Hasan Hassan, Onur Mutlu, ... -- Oakland 2020

"VerX: Safety Verification of Smart Contracts"

Dimitar Dimitrov, Dana Drachsler Cohen, Martin Vechev, ... -- Oakland 2020

"ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts"

Karl Wust, Sinisa Matetic, Silvan Egli, Kari Kostiainen, Srdjan Capkun, ... -- CCS 2020

"A Performant, Misuse-Resistant API for Primality Testing"

Kenny Paterson, ... -- CCS 2020

"Speculative Probing: Hacking Blind in the Spectre Era"

Kaveh Razavi, ... -- CCS 2020

"EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet"

Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, Adrian Perrig, ... -- Usenix 2020

"A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols"

Ralf Sasse, David Basin, ... -- Usenix 2020

"Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams"

Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, ... -- Usenix 2020

"Remote Side-Channel Attacks on Anonymous Transactions"

Kenny Paterson, ... -- Usenix 2020

"Forward and Backward Private Conjunctive Searchable Symmetric Encryption"

Sikhar Patranabis, ... -- NDSS 2021

"Bitcontracts: Supporting Smart Contracts in Legacy Blockchains"

Karl Wust, Loris Diana, and Kari Kostiainen, Sinisa Matetic, Srdjan Capkun, ... -- NDSS 2021

"Mondrian: Comprehensive Inter-domain Network Zoning Architecture"

Jonghoon Kwon, Hahni Claude, Adrian Perrig, ... -- NDSS 2021

"A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer"

Joseph Lallemand, ... -- Oakland 2021

"Bitcoin-Compatible Virtual Channels"

Kristina Hostakova, ... -- Oakland 2021

"CrossTalk: Speculative Data Leaks Across Cores Are Real"

Kaveh Razavi, ... -- Oakland 2021

"DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers"

Benjamin Bichsel, Samuel Steffen, Ilija Bogunovic, Martin Vechev, ... -- Oakland 2021

"SoK: Fully Homomorphic Encryption Compilers"

Alexander Viand, Patrick Jattke, Anwar Hithnawi, ... -- Oakland 2021

"The EMV Standard: Break, Fix, Verify"

David Basin, Ralf Sasse, Jorge Toro-Pozo, ... -- Oakland 2021

"The Provable Security of Ed25519: Theory and Practice"

Dennis Jackson, ... -- Oakland 2021

"Verifying Table-Based Elections"

David Basin, Sofia Giampietro, ... -- CCS 2021

"DataLens: Scalable Privacy Preserving Training via Gradient Compression and Aggregation"

Luka Rimanic, Ce Zhang, ... -- CCS 2021

"TSS: Transformation-Specific Smoothing for Robustness Certification"

Maurice Weber, Luka Rimanic, Ce Zhang, ... -- CCS 2021

"Learning to Explore Paths for Symbolic Execution"

Jingxuan He, Gishor Sivanrupan, Petar Tsankov, Martin Vechev, ... -- CCS 2021

"The Security of ChaCha20-Poly1305 in the Multi-User Setting"

Felix Gunther, Kenny Paterson, ... -- CCS 2021

"Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing"

Gregor Seiler, ... -- CCS 2021

"SmashEx: Smashing SGX Enclaves Using Exceptions"

Shweta Shinde, ... -- CCS 2021

"Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions"

David Basin, Ralf Sasse, Jorge Toro-Pozo, ... -- Usenix 2021

"Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend"

Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Capkun, ... -- Usenix 2021

"SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript"

Finn de Ridder, Kaveh Razavi, ... -- Usenix 2021

"Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols"

Enis Ulqinaku, Srdjan Capkun, ... -- Usenix 2021

"ReDMArk: Bypassing RDMA Security Mechanisms"

Benjamin Rothenberger, Konstantin Taranov, Adrian Perrig, Torsten Hoefler, ... -- Usenix 2021

"Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing"

Fabio Streun, Joel Wanner, Adrian Perrig, ... -- NDSS 2022

"ditto: WAN Traffic Obfuscation at Line Rate"

Roland Meier, Laurent Vanbever, ... -- NDSS 2022

"V-Range: Enabling Secure Ranging in 5G Wireless Networks"

Marc Roeschlin, Srdjan Capkun, ... -- NDSS 2022

"KASPER: Scanning for Generalized Transient Execution Gadgets in the Linux"

Kaveh Razavi, ... -- NDSS 2022

"F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure"

Laurent Chuat, Cyrill Krahenbuhl, Adrian Perrig, ... -- NDSS 2022

"Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems"

Eleanor McMurtry, ... -- Oakland 2022

"Blacksmith: Compromising Target Row Refresh by Rowhammering in the Frequency Domain"

Patrick Jattke, Stijn Gunter, Kaveh Razavi, ... -- Oakland 2022

"Four Attacks and a Proof for Telegram"

Kenneth G. Paterson, Igors Stepanovs, ... -- Oakland 2022

"LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis"

Ce Zhang, ... -- Oakland 2022

"PROTRR: Principled yet Optimal In-DRAM Target Row Refresh"

Michele Marazzi, Patrick Jattke, Flavien Solt, Kaveh Razavi, ... -- Oakland 2022

"Phishing in Organizations: Findings from a Large-Scale and Long-Term Study"

Daniele Lain, Kari Kostiainen, Srdjan Capkun, ... -- Oakland 2022

"ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs"

Samuel Steffen, Benjamin Bichsel, Roger Baumgartner, Martin Vechev, ... -- Oakland 2022

"Adversarial Correctness and Privacy for Probabilistic Data Structures"

Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, ... -- CCS 2022

"NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications"

Konstantin Taranov, Benjamin Rothenberger, Daniele De Sensi, Adrian Perrig, Torsten Hoefler, ... -- CCS 2022

"Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation"

Kari Kostiainen, Noah Delius, Srdjan Capkun, ... -- CCS 2022

"Private and Reliable Neural Network Inference"

Nikola Jovanovic, Marc Fischer, Samuel Steffen, Martin Vechev, ... -- CCS 2022

"Protecting Critical Inter-Domain Communication through Flyover Reservations"

Marc Wyss, Giacomo Giuliari, Jonas Mohler, Adrian Perrig, ... -- CCS 2022

"Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets"

Florian Tramer, ... -- CCS 2022

"Victory by KO: Attacking OpenPGP Using Key Overwriting"

Lara Bruseghini, Kenneth G. Paterson, ... -- CCS 2022

"Zapper: Smart Contracts with Data and Identity Privacy"

Samuel Steffen, Benjamin Bichsel, Martin Vechev, ... -- CCS 2022

"Elasticlave: An Efficient Memory Model for Enclaves"

Shweta Shinde, ... -- Usenix 2022

"Automating Cookie Consent and GDPR Violation Detection"

Dino Bollinger, Karel Kubicek, Carlos Cotrini, David Basin, ... -- Usenix 2022

"LTrack: Stealthy Tracking of Mobile Phones in LTE"

Martin Kotuliak, Simon Erni, Patrick Leu, Marc Roschlin, Srdjan Capkun, ... -- Usenix 2022

"Breaking Bridgefy, again: Adopting libsignal is not enough"

Raphael Eikenberg, Kenneth G. Paterson, ... -- Usenix 2022

"TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering"

Daniel Trujillo, ... -- Usenix 2022

"Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging"

Patrick Leu, Giovanni Camurati, Marc Roeschlin, Claudio Anliker, Srdjan Capkun, ... -- Usenix 2022

"Creating a Secure Underlay for the Internet"

Joel Wanner, Jonghoon Kwon, Francois Wirz, Adrian Perrig, ... -- Usenix 2022

"CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL"

Flavien Solt, Kaveh Razavi, ... -- Usenix 2022

"RETBLEED: Arbitrary Speculative Code Execution with Return Instructions"

Johannes Wikner, Kaveh Razavi, ... -- Usenix 2022

"QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework"

Jean-Pierre Smith, Luca Dolfi, Adrian Perrig, ... -- Usenix 2022