Παρακολούθηση
Joeri de Ruiter
Joeri de Ruiter
Specialist security and privacy at SURF
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα surf.nl - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Protocol state fuzzing of TLS implementations
J de Ruiter, E Poll
24th USENIX Security Symposium (USENIX Security 15), 193-206, 2015
3312015
EMV in a nutshell
J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter
Technical Report, 2016
1772016
Formal models of bank cards for free
F Aarts, J De Ruiter, E Poll
Software Testing, Verification and Validation Workshops (ICSTW), 2013 IEEE …, 2013
1252013
Analysis of DTLS Implementations Using Protocol State Fuzzing
P Fiterau-Brostean, B Jonsson, R Merget, J de Ruiter, K Sagonas, ...
29th USENIX Security Symposium (USENIX Security 20), 2523-2540, 2020
1062020
Defeating IMSI Catchers
F van den Broek, R Verdult, J de Ruiter
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1052015
Model learning and model checking of SSH implementations
P Fiterău-Broştean, T Lenaerts, E Poll, J de Ruiter, F Vaandrager, ...
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model …, 2017
1022017
Analysis of Secure Key Storage Solutions on Android
T Cooijmans, J de Ruiter, E Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
952014
Formal analysis of the EMV protocol suite
J de Ruiter, E Poll
Theory of Security and Applications, 113-129, 2012
782012
Automated Reverse Engineering using Lego®
G Chalupar, S Peherstorfer, E Poll, J de Ruiter
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
692014
Relay Cost Bounding for Contactless EMV Payments
T Chothia, FD Garcia, J de Ruiter, J van den Breekel, M Thompson
642015
cMix: mixing with minimal real-time asymmetric cryptographic operations
D Chaum, D Das, F Javani, A Kate, A Krasnova, J De Ruiter, AT Sherman
International Conference on Applied Cryptography and Network Security, 557-578, 2017
602017
cMix: Anonymization by High-Performance Scalable Mixing
D Chaum, F Javani, A Kate, A Krasnova, J de Ruiter, AT Sherman
572016
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
CMM Stone, T Chothia, J de Ruiter
European Symposium on Research in Computer Security, 325-345, 2018
492018
A Responsible Internet to Increase Trust in the Digital World
C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ...
Journal of Network and Systems Management 28 (4), 882-922, 2020
462020
Inferring OpenVPN State Machines Using Protocol State Fuzzing
LA Daniel, E Poll, J de Ruiter
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 11-19, 2018
352018
Designed to fail: A USB-connected reader for online banking
A Blom, G de Koning Gans, E Poll, J de Ruiter, R Verdult
17th Nordic Conference on Secure IT Systems (NordSec 2012), Lecture Notes in …, 2012
342012
Modelling and analysis of a hierarchy of distance bounding attacks
T Chothia, J De Ruiter, B Smyth
27th USENIX Security Symposium, USENIX Security, 2018
312018
Polymorphic encryption and pseudonymisation for personalised healthcare
E Verheul, B Jacobs, C Meijer, M Hildebrandt, J de Ruiter
Cryptology ePrint Archive, 2016
302016
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols
T Chothia, M Ordean, J de Ruiter, RJ Thomas
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
252017
The SmartLogic tool: Analysing and testing smart card protocols
G de Koning Gans, J de Ruiter
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
252012
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20