
Our Mission
“Make the digital world more secure in a fundamental way”
ETH President Joël Mesot
Our Team
Information Security Group
ETH Zurich
Prof. Dr. David Basin
Dr. Juan Guarnizo Hernandez
Felix Linker
Mihael Liskij
Dr. Martin Ochoa
Jesus Solano
Programming Methodology Group
ETH Zurich
Prof. Dr. Peter Müller
Dr. Malte Schwerhoff
Linard Arquint
Felix Wolf
Network Security Group
ETH Zurich
Prof. Dr. Adrian Perrig
Christelle Gloor
Cyrill Krähenbühl
Juan A. García-Pardo
Usable Security And Privacy Group
University of Bonn
Prof. Dr. Matthew Smith
Lisa Geierhaas
Maximilian Häring
Publications
- L. Arquint, F. A. Wolf, J. Lallemand, R. Sasse, C. Sprenger, S. N. Wiesner, D. Basin, and P. Müller, “Sound Verification of Security Protocols: From Design to Interoperable Implementations,” in IEEE Symposium on Security and Privacy (S&P), Los Alamitos, CA, USA, 2023, pp. 1065-1081. doi:10.1109/SP46215.2023.00061
[BibTeX] [Download PDF]@inproceedings{ArquintWLSSWBM23, author = {Linard Arquint and Felix A. Wolf and Joseph Lallemand and Ralf Sasse and Christoph Sprenger and Sven N. Wiesner and David Basin and Peter M{\"{u}}ller}, title = {Sound Verification of Security Protocols: From Design to Interoperable Implementations}, booktitle = {IEEE Symposium on Security and Privacy (S{\&}P)}, volume = {}, issn = {}, pages = {1065-1081}, keywords = {protocol-verification;symbolic-security;automated-verification;tamarin;separation-logic;implementation}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, month = {may}, year = {2023}, doi = {10.1109/SP46215.2023.00061}, url = {https://pm.inf.ethz.ch/publications/ArquintWolfLallemandSasseSprengerWiesnerBasinMueller23.pdf} }
- L. Arquint, M. Schwerhoff, V. Mehta, and P. Müller, “A Generic Methodology for the Modular Verification of Security Protocol Implementations,” arXiv, 2212.02626, 2022. doi:10.48550/ARXIV.2212.02626
[BibTeX] [Download PDF]@techreport{ArquintSchwerhoffMehtaMueller22, author = {Linard Arquint and Malte Schwerhoff and Vaibhav Mehta and Peter M\"uller}, title = {A Generic Methodology for the Modular Verification of Security Protocol Implementations}, institution = {arXiv}, year = {2022}, number = {2212.02626}, doi = {10.48550/ARXIV.2212.02626}, url = {https://arxiv.org/abs/2212.02626} }
- M. Häring, E. Gerlitz, C. Tiefenau, M. Smith, D. Wermke, S. Fahl, and Y. Acar, “Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany,” in Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), 2021, p. 77–98.
[BibTeX] [Download PDF]@inproceedings {cwa1, author= {Maximilian H{\"a}ring and Eva Gerlitz and Christian Tiefenau and Matthew Smith and Dominik Wermke and Sascha Fahl and Yasemin Acar}, title = {Never ever or no matter what: Investigating Adoption Intentions and Misconceptions about the Corona-Warn-App in Germany}, booktitle = {Seventeenth Symposium on Usable Privacy and Security ({SOUPS} 2021)}, year = {2021}, isbn = {978-1-939133-25-0}, pages = {77--98}, url = {https://www.usenix.org/conference/soups2021/presentation/acar}, publisher = {{USENIX} Association}, month = aug, }
- F. A. Wolf, L. Arquint, M. Clochard, W. Oortwijn, J. C. Pereira, and P. Müller, “Gobra: Modular Specification and Verification of Go Programs,” in Computer Aided Verification (CAV), 2021, p. 367–379. doi:10.1007/978-3-030-81685-8_17
[BibTeX] [Download PDF]@inproceedings{WolfArquintClochardOortwijnPereiraMueller21, author = {F. A. Wolf and L. Arquint and M. Clochard and W. Oortwijn and J. C. Pereira and P. M\"uller}, title = {{G}obra: Modular Specification and Verification of Go Programs}, booktitle = {Computer Aided Verification (CAV)}, editor = {Silva, Alexandra and Leino, K. Rustan M.}, series = {LNCS}, volume = {12759}, publisher = {Springer International Publishing}, pages = {367--379}, year = {2021}, url = {http://pm.inf.ethz.ch/publications/getpdf.php?bibname=Own&id=WolfArquintClochardOortwijnPereiraMueller21.pdf}, doi = {10.1007/978-3-030-81685-8_17}, }
- D. A. Basin, A. Lochbihler, and R. S. Sefidgar, “CryptHOL: Game-based Proofs in Higher-order Logic,” Journal of Cryptology, pp. 1-73, 2020.
[BibTeX] [Download PDF]@article{Basin:2020:CryptHOL, author = {David A. Basin and Andreas Lochbihler and S. Reza Sefidgar}, title = {CryptHOL: Game-based Proofs in Higher-order Logic}, journal = {Journal of Cryptology}, year = {2020}, pages = {1-73}, url = {https://people.inf.ethz.ch/basin/pubs/jcrypto19.pdf}, }
- G. Girol, L. Hirschi, R. Sasse, D. Jackson, C. Cremers, and D. Basin, “A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols,” in 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, 2020.
[BibTeX] [Download PDF]@inproceedings {251584, author = {Guillaume Girol and Lucca Hirschi and Ralf Sasse and Dennis Jackson and Cas Cremers and David Basin}, title = {A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols}, booktitle = {29th {USENIX} Security Symposium ({USENIX} Security 20)}, year = {2020}, address = {Boston, MA}, url = {https://people.inf.ethz.ch/basin/pubs/usenix20.pdf}, publisher = {{USENIX} Association}, month = aug, }
- L. Chuat, A. Abdou, R. Sasse, C. Sprenger, D. Basin, and A. Perrig, “SoK: Delegation and Revocation, the Missing Links in the Web’s Chain of Trust,” in IEEE European Symposium on Security & Privacy, 2020. doi:10.1109/EuroSP48549.2020.00046
[BibTeX] [Download PDF]@inproceedings{Chuat:2020:SoK, author={L. Chuat and A. Abdou and R. Sasse and C. Sprenger and D. Basin and A. Perrig}, title={SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust}, booktitle={IEEE European Symposium on Security & Privacy}, year={2020}, url = {https://netsec.ethz.ch/publications/papers/sok-delegation-revocation.pdf}, doi = {10.1109/EuroSP48549.2020.00046}, }