Prof. Dr. Sjouke Mauw
|
|
||||||
| Faculté ou Centre | Faculté des Sciences, des Technologies et de Médecine | ||||||
| Department | Département Informatique | ||||||
| Adresse postale |
Université du Luxembourg Maison du Nombre 6, Avenue de la Fonte L-4364 Esch-sur-Alzette |
||||||
| Bureau sur le campus | MNO, E03 0325-020 | ||||||
|
|
|||||||
| Téléphone | (+352) 46 66 44 5480 | ||||||
| Fax | (+352) 46 66 44 35480 | ||||||
| Video |
Prof. Sjouke Mauw (SnT)
|
||||||
Since January 2007 I am full professor in "Security and Trust of Software Systems" at the University of Luxembourg in the Computer Science and Communications Research Unit.
Until 2007, I was associate professor (UHD) in computer science at the Formal Methods group of the Eindhoven University of Technology.
Topics of research
- Security protocols
- Security assessment
- Privacy
- Attack trees
- Digital Rights Management
- Mobile ad-hoc and sensor networks
- RFID's
For more Information see here.
Last updated on: mardi 29 octobre 2019
2020
Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios; ; ;
E-print/Working paper (2020)
Attribute evaluation on attack trees with incomplete information; ; ; ;
in Computers and Security (2020), 88(101630),
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs; ; ;
in Chen, Liqun; Li, Ninghui; Liang, Kaitai; Schneider, Steve (Eds.) Computer Security - ESORICS 2020 (2020, September 13)
Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee; ;
in Proceedings on Privacy Enhancing Technologies (2020), 2020(4), 131-152
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks; ; ; ; ;
in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), October 5–9, 2020, Taipei, Taiwan (2020)
Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees.; ; ;
in Graphical Models for Security - 7th International Workshop (2020)
Attack-Tree Series: A Case for Dynamic Attack Tree Analysis;
in Proc.\ 6th International Workshop on Graphical Models for Security (GraMSec'19) (2020)
Fine-grained Code Coverage Measurement in Automated Black-box Android Testing; ; ; ; ;
in ACM Transactions on Software Engineering and Methodology (2020), 29(4), 1-35
2019
Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity; ; ;
in Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity (2019, September 23)
Proceedings of the 15th International Workshop on Security and Trust Management (STM 2019);
Book published by Springer (2019)
Attack-Tree Series: A Case for Dynamic Attack Tree Analysis;
in Proc. 6th International Workshop on Graphical Models for Security (GraMSec'19) (2019)
Robust active attacks on social graphs; ;
in Data Mining and Knowledge Discovery (2019), 33(5), 1357-1392
Post-collusion security and distance bounding; ; ;
in Post-collusion security and distance bounding (2019, November 11)
2018
The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement; ;
in Proc.\ 5th International Workshop on Graphical Models for Security (GraMSec'18) (2018)
Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library; ; ;
in Katsikas, Sokratis; Alcaraz, Cristina (Eds.) Security and Trust Management. STM 2018. (2018, October)
Proceedings of the Fourth International Workshop on Graphical Models for Security (GraMSec 2017); ;
Book published by Springer (2018)
Anonymising social graphs in the presence of active attackers; ;
in Transactions on Data Privacy (2018), 11(2), 169-198
Conditional adjacency anonymity in social graphs under active attacks; ;
in Knowledge and Information Systems (2018)
Automated Identification of Desynchronisation Attacks on Shared Secrets; ; ;
in Automated Identification of Desynchronisation Attacks on Shared Secrets (2018, September)
Distance-Bounding Protocols: Verification without Time and Location; ; ;
in Proceedings of IEEE Symposium on Security and Privacy (SP), San Francisco 21-23 May 2018 (2018)
2017
Refinement-Aware Generation of Attack Trees; ; ; ;
in Livraga, Giovanni; Mitchell, Chris J. (Eds.) Security and Trust Management - 13th International Workshop (2017, September)
Semantics for specialising attack trees based on linear logic; ;
in Fundamenta Informaticae (2017), 153(1-2), 57-86
Model-driven situational awareness for moving target defense;
in Scanlon, Marc; Le-Khac, Nhien-An (Eds.) Proc. 16th European Conference on Cyber Warfare and Security (2017)
A security perspective on publication metrics;
in Stajano, F. (Ed.) Proc. 25th Security Protocols Workshop (2017)
Reverse Bayesian poisoning: How to use spam filters to manipulate online elections; ;
in Krimmer, L. (Ed.) Proc. 2nd International Joint Conference on Electronic Voting (2017)
2016
Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees; ; ; ;
in Proc. of GraMSec (2016)
Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0; ; ; ; ;
in Quantitative Evaluation of Systems - 13th International Conference (2016)
Proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016); ; ;
Book published by Springer (2016)
A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees; ;
in 12th International Workshop on Security and Trust Management (2016)
Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems; ;
in Barthe, Gilles; Markatos, Evangelos (Eds.) Security and Trust Management - STM 2016 (2016)
Optimality Results on the Security of Lookup-Based Protocols; ;
in Hancke, Gerard P.; Markantonakis, Konstantinos (Eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (2016, December)
A Class of Precomputation-based Distance-bounding Protocols; ;
in Proceedings of the 1st IEEE European Symposium on Security and Privacy (2016)
Counteracting active attacks in social network graphs; ;
in Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (2016)
2015
Comparing distance bounding protocols: A critical mission supported by decision theory; ;
in Computer Communications (2015), 67
FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting; ;
in Pernul, Günther; Y A Ryan, Peter; Weippl, Edgar (Eds.) Computer Security -- ESORICS 2015 (2015)
Attack Trees with Sequential Conjunction; ; ; ;
in Proceedings of the 30th IFIP TC 11 International Conference ICT Systems Security and Privacy Protection (SEC 2015) (2015)
Location-private interstellar communication (Transcript of Discussion)in Proc.\ 23rd Security Protocols Workshop (2015)
PUF-based authentication protocol to address ticket-switching of RFID-tagged items;
in Proc. 8th Workshop on Security and Trust Management, Pisa, Italy, September 13-14 2012 (2015)
Generalizing multi-party contract signing;
in Proc. 4th Conference on Principles of Security and Trust (POST'15) (2015)
Proceedings 4th International Workshop on Engineering Safety and Security Systems; ;
Book published by EPTCS - 184 (2015)
2014
Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014; ;
in First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014 (2014)
A symbolic algorithm for the analysis of robust timed automata; ; ;
in 19th International Symposium on Formal Methods (FM'14), 12-16 May 2014 (2014, May)
Proceedings of the 10th International Workshop on Security and Trust Management (STM 2014);
Book published by Springer (2014)
Informaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of the Art; ; ; ; ; ; ; ; ;
Report (2014)
On Robustness of Trust Systems; ; ;
in 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014 (2014)
On Robustness of Trust Systems; ; ;
in 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014 (2014)
2013
DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity; ; ; ; ;
in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)
A trust framework for evaluating GNSS signal integrity; ; ; ;
in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)
Design and formal analysis of a group signature based electronic toll pricing system; ; ;
in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75
Privacy and verifiability in voting systems: Methods, developments and trends; ;
in Computer Science Review (2013)
ADTool: Security Analysis with Attack-Defense Trees (Tool Demonstration Paper); ; ;
in 10th International Conference on Quantitative Evaluation of SysTems (2013)
Message from ESSS 2013 Workshop Co-chairs; ;
in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)
2012
Implementation and Validation of a Localisation Assurance Service Provider; ; ; ; ;
in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)
A group signature based electronic toll pricing system; ; ;
in Proc. 7th International Conference on Availability, Reliability and Security (2012)
Operational semantics and verification of security protocols;
Book published by Springer-Verlag (2012)
Location-Based Services: Privacy, Security and Assurance; ;
in Digital Enlightenment Yearbook 2012 (2012)
Quantitative Questions on Attack-Defense Trees; ;
in Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers (2012)
Comparative analysis of clustering protocols with probabilistic model checking; ; ;
in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012)
Detecting meaconing attacks by analysing the clock bias of GNSS receivers; ; ;
in European Navigation Conference (ENC 2012) (2012)
Input online review data and related bias in recommender systems; ; ;
in Decision Support Systems (2012), 53(3), 418-424
A trust-augmented voting scheme for collaborative privacy management; ; ; ;
in Journal of Computer Security (2012), 20(4), 437-459
Probabilistic model checking of the PDGF signaling pathway; ; ; ; ;
in Transactions on Computational Systems Biology (2012), XIV
Game-based verification of contract signing protocols with minimal messages; ; ;
in Innovations in Systems and Software Engineering (2012), 8
2011
Selective location blinding using hash chains; ;
in Proc. 19th International Workshop on Security Protocols (2011)
Selective location blinding using hash chains (transcript of discussion)in In B. Christianson et al., editor, Proc. 19th Security Protocols Workshop (2011), 7114
A trust-augmented voting scheme for collaborative privacy management; ; ; ;
in Proc. 6th International Workshop on Security and Trust Management (2011)
A study of the PDGF signaling pathway with PRISM; ; ; ; ;
in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67
2010
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent; ; ;
in Proceedings of GameSec 2010 (2010)
Foundations of Attack-Defense Trees; ; ;
in Proceedings of the 7th International Workshop on Formal Aspects of Security and Trust (2010)
Game-based verification of multi-party contract signing protocols; ; ;
in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)
2009
Towards a Decision Model Based on Trust and Security Risk Management; ; ; ;
in Proc. 7th Australasian Information Security Conference - AISC'09 (2009)
Towards a decision model based on trust and security risk management. In Ljiljana Brankovic and Willy Susilo; ; ; ;
in Seventh Australasian Information Security Conference (AISC 2009) (2009)
An algebra for trust dilution and trust fusion;
in Proc. 7th Workshop on Formal Aspects in Security and Trust (2009)
Discovering the core security requirements of DRM systems by means of objective trees;
in Handbook of Research on Secure Multimedia Distribution (2009)
A formal framework for quantifying voter-controlled privacy; ;
in Journal of Algorithms in Cognition, Informatics and Logic (2009)
Measuring voter-controlled privacy; ;
in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)
Minimal message complexity of asynchronous multi-party contract signing; ;
in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) (2009)
Secure ownership and ownership transfer in RFID systems; ; ;
in Proc. 14th European Symposium On Research In Computer Security (ESORICS'09) (2009)
2008
A framework for compositional verification of security protocols; ; ; ; ;
in Information & Computation (2008), 206(2-4), 425-459
Rights Management for Role-Based Access Control; ;
in Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC'08) (2008)
Chosen-name attacks: An overlooked class of type-flaw attacks; ;
in Electronic Notes in Theoretical Computer Science (2008), 197(2), 31-43
Untraceability of RFID Protocols; ;
in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (2008)
2007
A Certified Email Protocol Using Key Chains; ;
in Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW'07) (2007)
Data anonymity in the FOO voting scheme; ;
in Electronic Notes in Theoretical Computer Science (2007), 168
2006
Injective Synchronisation: an extension of the authentication hierarchy; ;
in Theoretical Computer Science (2006), 367(1-2), 139-161
1999
1996
Design and analysis of dynamic leader election protocols in broadcast networks; ; ;
in Distributed Computing (1996), 9(4), 157-171













