Sjouke Mauw

Orcid: 0000-0002-2818-4433

Affiliations:
  • University of Luxembourg


According to our database1, Sjouke Mauw authored at least 148 papers between 1987 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Software-Based Memory Erasure with relaxed isolation requirements: Extended Version.
CoRR, 2024

SSI, from Specifications to Protocol? Formally Verify Security!
Proceedings of the ACM on Web Conference 2024, 2024

Software-Based Memory Erasure with Relaxed Isolation Requirements.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Formal Verification and Solutions for Estonian E-Voting.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
On the optimal resistance against mafia and distance fraud in distance-bounding protocols.
Comput. Commun., October, 2023

When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied <i>π</i>-calculus.
Theor. Comput. Sci., May, 2023

Anomaly Detection Using Deep Learning Respecting the Resources on Board a CubeSat.
J. Aerosp. Inf. Syst., 2023

Dripping the Poison: The Instruments of Bias. A Qualitative Case Study of News Articles in Four Languages over Nine Years.
FLAP, 2023

Automated generation of attack trees with optimal shape and labelling.
CoRR, 2023

Election Verifiability in Receipt-Free Voting Protocols.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Language Ideology Bias in Conversational Technology.
Proceedings of the Chatbot Research and Design - 7th International Workshop, 2023

Provably Unlinkable Smart Card-based Payments.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation.
Knowl. Inf. Syst., 2022

Contingent payments from two-party signing and verification for abelian groups.
IACR Cryptol. ePrint Arch., 2022

Modelling Agent-Skipping Attacks in Message Forwarding Protocols.
CoRR, 2022

BelElect: A New Dataset for Bias Research from a "Dark" Platform.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

A Graphical Proof Theory of Logical Time.
Proceedings of the 7th International Conference on Formal Structures for Computation and Deduction, 2022

Is Eve nearby? Analysing protocols under the distant-attacker assumption.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
Discovering ePassport Vulnerabilities using Bisimilarity.
Log. Methods Comput. Sci., 2021

Provably Improving Election Verifiability in Belenios.
IACR Cryptol. ePrint Arch., 2021

Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen EMV Payments.
CoRR, 2021

Examining Linguistic Biases in Telegram with a Game Theoretic Analysis.
Proceedings of the Disinformation in Open Online Media, 2021

Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2021, 2021

2020
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing.
ACM Trans. Softw. Eng. Methodol., 2020

Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee.
Proc. Priv. Enhancing Technol., 2020

Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios.
IACR Cryptol. ePrint Arch., 2020

Attribute evaluation on attack trees with incomplete information.
Comput. Secur., 2020

Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees.
Proceedings of the Graphical Models for Security - 7th International Workshop, 2020

Active Re-identification Attacks on Periodically Released Dynamic Social Graphs.
Proceedings of the Computer Security - ESORICS 2020, 2020

ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Conditional adjacency anonymity in social graphs under active attacks.
Knowl. Inf. Syst., 2019

Robust active attacks on social graphs.
Data Min. Knowl. Discov., 2019

Attack-Tree Series: A Case for Dynamic Attack Tree Analysis.
Proceedings of the Graphical Models for Security - 6th International Workshop, 2019

Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity.
Proceedings of the Computer Security - ESORICS 2019, 2019

Post-Collusion Security and Distance Bounding.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Anonymising social graphs in the presence of active attackers.
Trans. Data Priv., 2018

Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

Distance-Bounding Protocols: Verification without Time and Location.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement.
Proceedings of the 5th International Workshop on Graphical Models for Security, 2018

Automated Identification of Desynchronisation Attacks on Shared Secrets.
Proceedings of the Computer Security, 2018

2017
Semantics for Specialising Attack Trees based on Linear Logic.
Fundam. Informaticae, 2017

Rethinking (k, 𝓁)-anonymity in social graphs: (k, 𝓁)-adjacency anonymity and (k, 𝓁)-(adjacency) anonymous transformations.
CoRR, 2017

Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online Elections.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Refinement-Aware Generation of Attack Trees.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

A Security Perspective on Publication Metrics.
Proceedings of the Security Protocols XXV, 2017

2016
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Man-in-the-Middle Attacks Evolved... but Our Security Models Didn't.
Proceedings of the Security Protocols XXIV, 2016

Optimality Results on the Security of Lookup-Based Protocols.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016

A Class of Precomputation-Based Distance-Bounding Protocols.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Counteracting Active Attacks in Social Network Graphs.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

2015
Comparing distance bounding protocols: A critical mission supported by decision theory.
Comput. Commun., 2015

Security analysis of socio-technical physical systems.
Comput. Electr. Eng., 2015

Location-Private Interstellar Communication (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Location-Private Interstellar Communication.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Attack Trees with Sequential Conjunction.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Generalizing Multi-party Contract Signing.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Attack-defense trees.
J. Log. Comput., 2014

On Robustness of Trust Systems.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

A Symbolic Algorithm for the Analysis of Robust Timed Automata.
Proceedings of the FM 2014: Formal Methods, 2014

2013
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Location Assurance and Privacy in GNSS Navigation.
ERCIM News, 2013

Privacy and verifiability in voting systems: Methods, developments and trends.
Comput. Sci. Rev., 2013

ADTool: Security Analysis with Attack- Defense Trees (Extended Version)
CoRR, 2013

ADTool: Security Analysis with Attack-Defense Trees.
Proceedings of the Quantitative Evaluation of Systems - 10th International Conference, 2013

Message from ESSS 2013 Workshop Co-chairs.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

A Trust Framework for Evaluating GNSS Signal Integrity.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Demonstrating a trust framework for evaluating GNSS signal integrity.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Probabilistic Model Checking of the PDGF Signaling Pathway.
Trans. Comp. Sys. Biology, 2012

A trust-augmented voting scheme for collaborative privacy management.
J. Comput. Secur., 2012

Game-based verification of contract signing protocols with minimal messages.
Innov. Syst. Softw. Eng., 2012

Input online review data and related bias in recommender systems.
Decis. Support Syst., 2012

Comparative Analysis of Clustering Protocols with Probabilistic Model Checking.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Quantitative Questions on Attack-Defense Trees.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

A Group Signature Based Electronic Toll Pricing System.
Proceedings of the Seventh International Conference on Availability, 2012

Operational Semantics and Verification of Security Protocols
Information Security and Cryptography, Springer, ISBN: 978-3-540-78636-8, 2012

2011
A Study of the PDGF Signaling Pathway with PRISM
Proceedings of the Proceedings Third International Workshop on Computational Models for Cell Processes, 2011

mCarve: Carving Attributed Dump Sets.
Proceedings of the 20th USENIX Security Symposium, 2011

Fairness in Non-Repudiation Protocols.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Selective Location Blinding Using Hash Chains (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Selective Location Blinding Using Hash Chains.
Proceedings of the Security Protocols XIX, 2011

2010
Fair Exchange.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Security Protocols for Secret Santa.
Proceedings of the Security Protocols XVIII, 2010

Security Protocols for Secret Santa (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Foundations of Attack-Defense Trees.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent.
Proceedings of the Decision and Game Theory for Security, 2010

2009
A formal framework for quantifying voter-controlled privacy.
J. Algorithms, 2009

Game-Based Verification of Multi-Party Contract Signing Protocols.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

An Algebra for Trust Dilution and Trust Fusion.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

Secure Ownership and Ownership Transfer in RFID Systems.
Proceedings of the Computer Security, 2009

Minimal Message Complexity of Asynchronous Multi-party Contract Signing.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Towards a Decision Model Based on Trust and Security Risk Management.
Proceedings of the Seventh Australasian Information Security Conference, 2009

Measuring Voter-Controlled Privacy.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Preface.
Sci. Comput. Program., 2008

A framework for compositional verification of security protocols.
Inf. Comput., 2008

Untraceability of RFID Protocols.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Rights Management for Role-Based Access Control.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

A Certified Email Protocol Using Key Chains.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Injective synchronisation: An extension of the authentication hierarchy.
Theor. Comput. Sci., 2006

Data Anonymity in the FOO Voting Scheme.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

Forward Secure Communication in Wireless Sensor Networks.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

2005
Preface.
Proceedings of the First International Workshop on Security and Trust Management, 2005

A Syntactic Criterion for Injectivity of Authentication Protocols.
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, 2005

XML Security in the Next Generation Optical Disc Context.
Proceedings of the Secure Data Management, 2005

Foundations of Attack Trees.
Proceedings of the Information Security and Cryptology, 2005

2004
Language-Driven System Design.
Int. J. Softw. Eng. Knowl. Eng., 2004

Analysing the BKE-security Protocol with <i>µ</i>CRL.
Proceedings of the 6th AMAST Workshop on Real-Time Systems, 2004

Checking Secrecy by Means of Partial Order Reduction.
Proceedings of the System Analysis and Modeling, 4th International SDL and MSC Workshop, 2004

A Formalization of Anonymity and Onion Routing.
Proceedings of the Computer Security, 2004

2003
Task Allocation in a Multi-Server System.
J. Sched., 2003

Automatic Conformance Testing of Internet Applications.
Proceedings of the Formal Approaches to Software Testing, 2003

Operational Semantics of Security Protocols.
Proceedings of the Scenarios: Models, 2003

2002
A hierarchy of communication models for Message Sequence Charts.
Sci. Comput. Program., 2002

Test Selection, Trace Distance and Heuristics.
Proceedings of the Testing of Communicating Systems XIV, Applications to Internet Technologies and Services, Proceedings of the IFIP 14th International Conference on Testing Communicating Systems, 2002

2001
Impossible futures and determinism.
Inf. Process. Lett., 2001

An algorithm for the asynchronous Write-All problem based on process collision.
Distributed Comput., 2001

Introduction by the guest editor.
Comput. Lang., 2001

An MSC Based Representation of DiCons.
Proceedings of the SDL 2001: Meeting UML, 2001

Specifying internet applications with DiCons.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

A Process Algebra for Interworkings.
Proceedings of the Handbook of Process Algebra, 2001

2000
Probabilities In The Torx Test Derivation Algorithm.
Proceedings of the SAM 2000, 2000

IC Design Validation Using Message Sequence Charts.
Proceedings of the 26th EUROMICRO 2000 Conference, 2000

1999
Operational Semantics for MSC'96.
Comput. Networks, 1999

Model Checking for Managers.
Proceedings of the Theoretical and Practical Aspects of SPIN Model Checking, 1999

MSC and data: dynamic variables.
Proceedings of the SDL '99 The Next Millennium, 1999

Formal Test Automation: A Simple Experiment.
Proceedings of the Testing of Communicating Systems: Method and Applications, 1999

1997
Test Generation for Intelligent Networks Using Model Checking.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1997

High-level message sequence charts.
Proceedings of the SDL '97 Time for Testing, 1997

1996
Design and Analysis of Dynamic Leader Election Protocols in Broadcast Networks.
Distributed Comput., 1996

The Formalization of Message Sequence Charts.
Comput. Networks ISDN Syst., 1996

Refinement in Interworkings.
Proceedings of the CONCUR '96, 1996

1995
Delayed choice for process algebra with abstraction.
Proceedings of the CONCUR '95: Concurrency Theory, 1995

1994
An Algebraic Semantics of Basic Message Sequence Charts.
Comput. J., 1994

Delayed choice: an operator for joining Message Sequence Charts.
Proceedings of the Formal Description Techniques VII, 1994

Regularity of BPA-Systems is Decidable.
Proceedings of the CONCUR '94, 1994

1991
Uniform Algebraic Specifications of Finite Sets with Equality.
Int. J. Found. Comput. Sci., 1991

A Proof Assistant for PSF.
Proceedings of the Computer Aided Verification, 3rd International Workshop, 1991

1989
An Introduction to PSFd.
Proceedings of the TAPSOFT'89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, 1989

Specification of the Transit Node in PSF<sub>d</sub>.
Proceedings of the Algebraic Methods II: Theory, 1989

A Process Specification Formalism Based on Static COLD.
Proceedings of the Algebraic Methods II: Theory, 1989

1987
An Algebraic Specification of Process Algebra, Including Two Examples.
Proceedings of the Algebraic Methods: Theory, 1987


  Loading...