Michael Backes
Orcid: 0000-0002-7130-9211Affiliations:
- CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- Saarland University, Computer Science Department, Saarbrücken, Germany
According to our database1,
Michael Backes
authored at least 378 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2023, "For contributions to information security and privacy".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on cispa.de
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
CoRR, 2024
<i>ModSCAN</i>: Measuring Stereotypical Bias in Large Vision-Language Models from Vision and Language Modalities.
CoRR, 2024
Generated Data with Fake Privacy: Hidden Dangers of Fine-tuning Large Language Models on Generated Data.
CoRR, 2024
Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm?
CoRR, 2024
Breaking Agents: Compromising Autonomous LLM Agents Through Malfunction Amplification.
CoRR, 2024
CoRR, 2024
Do You Even Lift? Strengthening Compiler Security Guarantees Against Spectre Attacks.
CoRR, 2024
UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images.
CoRR, 2024
CoRR, 2024
Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Measuring the Effects of Stack Overflow Code Snippet Evolution on Open-Source Software Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
The Death and Life of Great Prompts: Analyzing the Evolution of LLM Prompts from the Structural Perspective.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
ModSCAN: Measuring Stereotypical Bias in Large Vision-Language Models from Vision and Language Modalities.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
ACM Trans. Priv. Secur., May, 2023
Mach. Learn., March, 2023
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts.
CoRR, 2023
Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.
CoRR, 2023
Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning.
CoRR, 2023
CoRR, 2023
Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models.
CoRR, 2023
Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing.
CoRR, 2023
CoRR, 2023
CoRR, 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version).
CoRR, 2022
CoRR, 2022
Comput. Secur., 2022
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
CoRR, 2021
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications.
Proceedings of the 30th USENIX Security Symposium, 2021
Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions.
Proceedings of the 30th USENIX Security Symposium, 2021
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
CoRR, 2020
CoRR, 2020
Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning.
CoRR, 2020
CoRR, 2020
Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks.
CoRR, 2020
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks.
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the ETRA '20 Adjunct: 2020 Symposium on Eye Tracking Research and Applications, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Proc. Priv. Enhancing Technol., 2019
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 4th Workshop on Formal Reasoning about Causation, 2019
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IEEE ACM Trans. Comput. Biol. Bioinform., 2018
IACR Cryptol. ePrint Arch., 2018
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version).
IACR Cryptol. ePrint Arch., 2018
Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
CoRR, 2018
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
CoRR, 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
IEEE Secur. Priv., 2017
Who Controls the Internet?: Analyzing Global Threats using Property Graph Traversals.
Proceedings of the 26th International Conference on World Wide Web, 2017
Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
login Usenix Mag., 2016
Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks.
Proc. Priv. Enhancing Technol., 2016
J. Priv. Confidentiality, 2016
CoRR, 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification.
Proceedings of the 25th USENIX Security Symposium, 2016
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis.
Proceedings of the 25th USENIX Security Symposium, 2016
You Get Where You're Looking for: The Impact of Information Sources on Code Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
From Zoos to Safaris - From Closed-World Enforcement to Open-World Assessment of Privacy.
Proceedings of the Foundations of Security Analysis and Design VIII, 2016
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Math. Struct. Comput. Sci., 2015
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information.
IACR Cryptol. ePrint Arch., 2015
How well do you blend into the crowd? - d-convergence: A novel paradigm for quantifying privacy in the age of Big-Data.
CoRR, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
J. Comput. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Android Security Framework: Enabling Generic and Extensible Access Control on Android.
CoRR, 2014
Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the Symposium on Applied Computing, 2014
Computational Soundness Results for ProVerif - Bridging the Gap from Trace Properties to Uniformity.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012
On the Development and Formalization of an Extensible Code Generator for Real Life Security Protocols.
Proceedings of the NASA Formal Methods, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Advances in Visual Computing - 8th International Symposium, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Certified Programs and Proofs - First International Conference, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Computer Security, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
2008
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles.
J. Comput. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
Proceedings of the Logic for Programming, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the Computer Aided Verification, 20th International Conference, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Computer Security, 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
Int. J. Inf. Sec., 2005
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the International Workshop on Security and Concurrency, SecCo@CONCUR 2005, 2005
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005
Proceedings of the Computer Security, 2005
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
2004
A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol.
IEEE J. Sel. Areas Commun., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Foundations of Security Analysis and Design III, 2004
Proceedings of the Computer Security, 2004
Proceedings of the Computer Security, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27, 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification.
Proceedings of the New Security Paradigms Workshop 2003, 2003
Proceedings of the Computer Security, 2003
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
Proceedings of the Business Process Management, International Conference, 2003
2002
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation.
Proceedings of the FME 2002: Formal Methods, 2002
Proceedings of the Computer Security, 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002