Zobrazeno 1 - 10
of 427
pro vyhledávání: '"BASIN, DAVID"'
Autor:
Pereira, João C., Klenze, Tobias, Giampietro, Sofia, Limbeck, Markus, Spiliopoulos, Dionysios, Wolf, Felix A., Eilers, Marco, Sprenger, Christoph, Basin, David, Müller, Peter, Perrig, Adrian
We present the first formally-verified Internet router, which is part of the SCION Internet architecture. SCION routers run a cryptographic protocol for secure packet forwarding in an adversarial environment. We verify both the protocol's network-wid
Externí odkaz:
http://arxiv.org/abs/2405.06074
Autor:
Linker, Felix, Basin, David
Social authentication has been suggested as a usable authentication ceremony to replace manual key authentication in messaging applications. Using social authentication, chat partners authenticate their peers using digital identities managed by ident
Externí odkaz:
http://arxiv.org/abs/2402.03199
Autor:
Krähenbühl, Cyrill, Wyss, Marc, Basin, David, Lenders, Vincent, Perrig, Adrian, Strohmeier, Martin
In its current state, the Internet does not provide end users with transparency and control regarding on-path forwarding devices. In particular, the lack of network device information reduces the trustworthiness of the forwarding path and prevents en
Externí odkaz:
http://arxiv.org/abs/2304.03108
Recently proposed systems aim at achieving privacy using locality-sensitive hashing. We show how these approaches fail by presenting attacks against two such systems: Google's FLoC proposal for privacy-preserving targeted advertising and the MinHash
Externí odkaz:
http://arxiv.org/abs/2302.13635
Snapshot isolation (SI) is a prevalent weak isolation level that avoids the performance penalty imposed by serializability and simultaneously prevents various undesired data anomalies. Nevertheless, SI anomalies have recently been found in production
Externí odkaz:
http://arxiv.org/abs/2301.07313
Autor:
Arquint, Linard, Wolf, Felix A., Lallemand, Joseph, Sasse, Ralf, Sprenger, Christoph, Wiesner, Sven N., Basin, David, Müller, Peter
We provide a framework consisting of tools and metatheorems for the end-to-end verification of security protocols, which bridges the gap between automated protocol verification and code-level proofs. We automatically translate a Tamarin protocol mode
Externí odkaz:
http://arxiv.org/abs/2212.04171
Publikováno v:
Logical Methods in Computer Science, Volume 19, Issue 4 (December 22, 2023) lmcs:10182
The relational calculus (RC) is a concise, declarative query language. However, existing RC query evaluation approaches are inefficient and often deviate from established algorithms based on finite tables used in database management systems. We devis
Externí odkaz:
http://arxiv.org/abs/2210.09964
Digital authentication is a mature field, offering a range of solutions with rigorous mathematical guarantees. Nevertheless, paper documents, where cryptographic techniques are not directly applicable, are still widely utilized due to usability and l
Externí odkaz:
http://arxiv.org/abs/2210.07884
Security Enhanced Linux (SELinux) is a security architecture for Linux implementing mandatory access control. It has been used in numerous security-critical contexts ranging from servers to mobile devices. But this is challenging as SELinux security
Externí odkaz:
http://arxiv.org/abs/2205.15915
Autor:
Basin, David1 (AUTHOR) basin@inf.ethz.ch, Debois, Søren2 (AUTHOR) debois@itu.dk, Hildebrandt, Thomas3 (AUTHOR) hilde@di.ku.dk
Publikováno v:
Journal of Computer Security. 2024, Vol. 32 Issue 3, p247-289. 43p.