David A. Basin
Orcid: 0000-0003-2952-939XAffiliations:
- ETH Zurich, Switzerland
According to our database1,
David A. Basin
authored at least 333 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2018, "For contributions to Information Security and Formal Methods".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
ACM Trans. Priv. Secur., November, 2024
Proc. VLDB Endow., August, 2024
Proc. ACM Manag. Data, February, 2024
Proc. Priv. Enhancing Technol., January, 2024
Proc. ACM Program. Lang., 2024
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Formal Methods - 26th International Symposium, 2024
Proceedings of the Computer Aided Verification - 36th International Conference, 2024
2023
Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System.
Proc. Priv. Enhancing Technol., October, 2023
Proc. VLDB Endow., 2023
Log. Methods Comput. Sci., 2023
J. Comput. Secur., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Security Protocols XXVIII, 2023
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the ACM SIGCOMM 2023 Conference, 2023
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023
Proceedings of the Formal Methods - 25th International Symposium, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Automated Technology for Verification and Analysis, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
Dataset, August, 2022
Sound Verification of Security Protocols: From Design to Interoperable Implementations.
Dataset, August, 2022
Information Security and Cryptography, Springer, ISBN: 978-3-031-05288-0, 2022
Proc. Priv. Enhancing Technol., 2022
Bridging the semantic gap between qualitative and quantitative models of distributed systems.
Proc. ACM Program. Lang., 2022
IEEE Secur. Priv., 2022
Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version).
CoRR, 2022
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Theoretical Aspects of Computing - ICTAC 2022, 2022
Proceedings of the 25th International Conference on Database Theory, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
Dataset, February, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Abstract Modeling of System Communication in Constructive Cryptography using CryptHOL.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Igloo: soundly linking compositional refinement and separation logic for distributed system verification.
Proc. ACM Program. Lang., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Runtime Verification - 20th International Conference, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Automated Reasoning - 10th International Joint Conference, 2020
Proceedings of the Automated Technology for Verification and Analysis, 2020
2019
Proceedings of the Runtime Verification - 19th International Conference, 2019
Proceedings of the 46th International Colloquium on Automata, Languages, and Programming, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
Proceedings of the Automated Technology for Verification and Analysis, 2019
Proceedings of the Automated Technology for Verification and Analysis, 2019
2018
Proceedings of the Handbook of Model Checking., 2018
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Automated Technology for Verification and Analysis, 2018
2017
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2017
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017
AERIAL: Almost Event-Rate Independent Algorithms for Monitoring Metric Regular Properties.
Proceedings of the RV-CuBES 2017. An International Workshop on Competitions, 2017
Proceedings of the Runtime Verification - 17th International Conference, 2017
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Computer Aided Verification - 29th International Conference, 2017
Proceedings of the Computer Aided Verification - 29th International Conference, 2017
Proceedings of the Automated Technology for Verification and Analysis, 2017
2016
Sci. Comput. Program., 2016
Formal Methods Syst. Des., 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
Inf. Process. Lett., 2015
Formal Methods Syst. Des., 2015
Proceedings of the 22nd International Symposium on Temporal Representation and Reasoning, 2015
Proceedings of the 35th IARCS Annual Conference on Foundation of Software Technology and Theoretical Computer Science, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Logic, Rewriting, and Concurrency, 2015
2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
IEEE Trans. Software Eng., 2014
ACM Trans. Inf. Syst. Secur., 2014
Obstruction-free authorization enforcement: Aligning security and business objectives.
J. Comput. Secur., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Runtime Verification - 5th International Conference, 2014
Proceedings of the Runtime Verification - 5th International Conference, 2014
Proceedings of the Principles of Security and Trust - Third International Conference, 2014
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014
Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2014
2013
J. Comput. Secur., 2013
J. Comput. Secur., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the International Symposium on Software Testing and Analysis, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Computer Aided Verification - 25th International Conference, 2013
Proceedings of the Industrial Deployment of System Engineering Methods, 2013
2012
ACM Trans. Inf. Syst. Secur., 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Runtime Verification, Third International Conference, 2012
Proceedings of the 7th International Workshop on Automation of Software Test, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Theor. Comput. Sci., 2011
Automatically deriving information-theoretic bounds for adaptive side-channel attacks.
J. Comput. Secur., 2011
Proceedings of the Eighteenth International Symposium on Temporal Representation and Reasoning, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the Runtime Verification - Second International Conference, 2011
Proceedings of the 22nd International Conference on Rewriting Techniques and Applications, 2011
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011
Proceedings of the Foundations of Security Analysis and Design VI, 2011
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Springer, ISBN: 978-3-642-24473-5, 2011
2010
Softw. Syst. Model., 2010
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.
J. Comput. Secur., 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC.
Proceedings of the Financial Cryptography and Data Security, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Computer Science Logic, 24th International Workshop, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Computer Aided Verification, 22nd International Conference, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Theorem Proving in Higher Order Logics, 22nd International Conference, 2009
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
IEEE Commun. Mag., 2008
Proceedings of the 15th International Symposium on Temporal Representation and Reasoning, 2008
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Formal Aspects Comput., 2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols.
Proceedings of the Theorem Proving in Higher Order Logics, 20th International Conference, 2007
Proceedings of the Model Driven Engineering Languages and Systems, 2007
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA).
Proceedings of the Kommunikation in Verteilten Systemen (KiVS), 2007
Proceedings of the Computer Security, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
ACM Trans. Softw. Eng. Methodol., 2006
Theor. Comput. Sci., 2006
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle.
Comput. Commun., 2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
Proceedings of the Emerging Trends in Information and Communication Security, 2006
Proceedings of the Computer Security, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Inform. Spektrum, 2005
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis.
Log. J. IGPL, 2005
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005
Proceedings of the Testing of Communicating Systems, 2005
Proceedings of the FM 2005: Formal Methods, 2005
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005
Rippling - meta-level guidance for mathematical reasoning.
Cambridge tracts in theoretical computer science 56, Cambridge University Press, ISBN: 978-0-521-83449-0, 2005
2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Proceedings of the Program Development in Computational Logic: A Decade of Research Advances in Logic-Based Program Development, 2004
2003
Theor. Comput. Sci., 2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the Computer Security, 2003
CDiff: a new reduction technique for constraint-based analysis of security protocols.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the ZB 2002: Formal Specification and Development in Z and B, 2002
Proceedings of the UML 2002 - The Unified Modeling Language, 5th International Conference, Dresden, Germany, September 30, 2002
Proceedings of the Theorem Proving in Higher Order Logics, 15th International Conference, 2002
Proceedings of the Model Checking of Software, 2002
Proceedings of the Formal Methods in Computer-Aided Design, 4th International Conference, 2002
Proceedings of the Computer Aided Verification, 14th International Conference, 2002
2001
Theor. Comput. Sci., 2001
Proceedings of the Logical Aspects of Cryptographic Protocol Verification, 2001
Proceedings of the 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001, 2001
2000
Proceedings of the 3rd International Workshop on Rewriting Logic and its Applications, 2000
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 2000
Proceedings of the Formal Methods in Computer-Aided Design, Third International Conference, 2000
Proceedings of the Computer Aided Verification, 12th International Conference, 2000
Proceedings of the Seventeenth National Conference on Artificial Intelligence and Twelfth Conference on on Innovative Applications of Artificial Intelligence, July 30, 2000
1999
Proceedings of the Algebraic Foundations of Systems Specification, 1999
Formal Methods Syst. Des., 1999
Proceedings of the 29th IEEE International Symposium on Multiple-Valued Logic, 1999
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999
Proceedings of the Computer Aided Verification, 11th International Conference, 1999
1998
Proceedings of the 1998 International Workshop on Rewriting Logic and its Applications, 1998
Artif. Intell., 1998
A Recipe for the Complexity Analysis of Non-Classical Logics.
Proceedings of the Frontiers of Combining Systems, Second International Workshop, 1998
Combining WS1S and HOL.
Proceedings of the Frontiers of Combining Systems, Second International Workshop, 1998
Proceedings of the Computers and Games, First International Conference, 1998
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998
1997
Proceedings of the KI-97: Advances in Artificial Intelligence, 1997
Proceedings of the Computational Logic and Proof Theory, 5th Kurt Gödel Colloquium, 1997
Proceedings of the Computer Science Logic, 11th International Workshop, 1997
1996
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1996
Proceedings of the Proceedings, 1996
Implementing Modal and Relevance Logics in a Logical Framework.
Proceedings of the Fifth International Conference on Principles of Knowledge Representation and Reasoning (KR'96), 1996
A Topography of Labelled Modal Logics.
Proceedings of the Frontiers of Combining Systems, 1996
Proceedings of the Formal Methods in Computer-Aided Design, First International Conference, 1996
1995
Proceedings of the Computer Aided Verification, 1995
Proceedings of the Algorithms, 1995
1994
Generalized Rewriting in Type Theory.
J. Inf. Process. Cybern., 1994
Proceedings of the Logic Programming Synthesis and Transformation, 1994
IsaWhelk Interpreted in Isabelle.
Proceedings of the Logic Programming, 1994
Coloured Rippling: An Extension of a Theorem Proving Heuristic.
Proceedings of the Eleventh European Conference on Artificial Intelligence, 1994
Proceedings of the Conditional and Typed Rewriting Systems, 4th International Workshop, 1994
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994
1993
Ann. Math. Artif. Intell., 1993
Proceedings of the 7th International Workshop on Software Specification and Design, 1993
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993
Middle-Out Reasoning for Logic Program Synthesis.
Proceedings of the Logic Programming, 1993
A Conservative Extension of First-order Logic and Its Application to Theorem Proving.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1993
1992
Proceedings of the Logic Program Synthesis and Transformation, 1992
An Adaptation of Proof-Planning to Declarer Play in Bridge.
Proceedings of the 10th European Conference on Artificial Intelligence, 1992
1991
Proceedings of the Theoretical Aspects of Computer Software, 1991
Proceedings of the Trends in Artificial Intelligence, 1991
1990
Building Problem Solving Environments in Constructive Type Theory.
PhD thesis, 1990
Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators in Isomorphism Complete.
Proceedings of the 10th International Conference on Automated Deduction, 1990
1989
Proceedings of the Hardware Specification, 1989
1988
Proceedings of the 9th International Conference on Automated Deduction, 1988