Robert Künnemann

Orcid: 0000-0003-0822-9283

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany


According to our database1, Robert Künnemann authored at least 33 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adaptive Exploit Generation against Security Devices and Security APIs.
CoRR, 2024

Computationally Bounded Robust Compilation and Universally Composable Security.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

SpecMon: Modular Black-Box Runtime Monitoring of Security Protocols.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice.
ACM Trans. Priv. Secur., May, 2023

Automated Security Analysis of Exposure Notification Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Accountable Javascript Code Delivery.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

CryptoBap: A Binary Analysis Platform for Cryptographic Protocols.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Lifted Stackelberg Planning.
Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, 2023

2022
Sapic+: protocol verifiers of the world, unite!
IACR Cryptol. ePrint Arch., 2022

2021
Verifying Accountability for Unbounded Sets of Participants.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Accountability in the Decentralised-Adversary Setting.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

On the Soundness of Infrastructure Adversaries.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Faster Stackelberg Planning via Symbolic Search and Information Sharing.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation.
Proceedings of the Computer Security - ESORICS 2020, 2020

Short Paper: Modular Black-box Runtime Verification of Security Protocols.
Proceedings of the PLAS'20: Proceedings of the 15th Workshop on Programming Languages and Analysis for Security, 2020

TrollThrottle - Raising the Cost of Astroturfing.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11.
IACR Cryptol. ePrint Arch., 2019

Causality & Control Flow.
Proceedings of the 4th Workshop on Formal Reasoning about Causation, 2019

Universal Composability is Secure Compilation.
CoRR, 2019

Towards automated network mitigation analysis.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Automated Verification of Accountability in Security Protocols.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2018
Accountability in Security Protocols.
IACR Cryptol. ePrint Arch., 2018

Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Stackelberg Planning: Towards Effective Leader-Follower State Space Search.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Sufficient and necessary causation are dual.
CoRR, 2017

Simulated Penetration Testing and Mitigation Analysis.
CoRR, 2017

A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Automated analysis of security protocols with global state.
J. Comput. Secur., 2016

Computational Soundness for Dalvik Bytecode.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Automated Backward Analysis of PKCS#11 v2.20.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

2014
Foundations for analyzing security APIs in the symbolic and computational model. (Fondations d'analyse de APIs de sécurité dans le modèle symbolique et calculatoire).
PhD thesis, 2014

2012
Universally Composable Key-Management.
IACR Cryptol. ePrint Arch., 2012

YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012


  Loading...