References of "Mauw, Sjouke 50002343"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailPUF-based authentication protocol to address ticket-switching of RFID-tagged items
Mauw, Sjouke UL; Piramuthu, S.

in Proc. 8th Workshop on Security and Trust Management, Pisa, Italy, September 13-14 2012 (2015)

Ticket-switching incidents where customers switch the price tag or bar code in order to pay a lower amount for their ‘purchased item’ is not uncommon in retail stores. Since the item has to pass through a ... [more ▼]

Ticket-switching incidents where customers switch the price tag or bar code in order to pay a lower amount for their ‘purchased item’ is not uncommon in retail stores. Since the item has to pass through a check-out counter before leaving the store, it has a (even if miniscule) positive probability of being identified. However, when item-level RFID tags are used in an automated check-out environment, the probability of such incidents coming to light is estimated to be almost zero. We propose an authentication protocol for this scenario using a pair of item-level RFID tags, one of which is PUF-enabled to resist cloning attacks. [less ▲]

Detailed reference viewed: 117 (0 UL)
Full Text
Peer Reviewed
See detailLocation-private interstellar communication (Transcript of Discussion)
Mauw, Sjouke UL

in Proc.\ 23rd Security Protocols Workshop (2015)

Detailed reference viewed: 78 (2 UL)
Full Text
Peer Reviewed
See detailComparing distance bounding protocols: A critical mission supported by decision theory
Avoine, Gildas; Mauw, Sjouke UL; Trujillo Rasua, Rolando UL

in Computer Communications (2015), 67

Detailed reference viewed: 117 (7 UL)
See detailProceedings 4th International Workshop on Engineering Safety and Security Systems
Pang, Jun UL; Liu, Yang; Mauw, Sjouke UL

Book published by EPTCS - 184 (2015)

Detailed reference viewed: 104 (4 UL)
Full Text
Peer Reviewed
See detailFP-Block: Usable Web Privacy by Controlling Browser Fingerprinting
Ferreira Torres, Christof UL; Jonker, Hugo; Mauw, Sjouke UL

in Pernul, Günther; Y A Ryan, Peter; Weippl, Edgar (Eds.) Computer Security -- ESORICS 2015 (2015)

Online tracking of users is used for benign goals, such as detecting fraudulent logins, but also to invade user privacy. We posit that for non-oppressed users, tracking within one website does not have a ... [more ▼]

Online tracking of users is used for benign goals, such as detecting fraudulent logins, but also to invade user privacy. We posit that for non-oppressed users, tracking within one website does not have a substantial negative impact on privacy, while it enables legitimate benefits. In contrast, cross-domain tracking negatively impacts user privacy, while being of little benefit to the user. Existing methods to counter fingerprint-based tracking treat cross-domain tracking and regular tracking the same. This often results in hampering or disabling desired functionality, such as embedded videos. By distinguishing between regular and cross-domain tracking, more desired functionality can be preserved. We have developed a prototype tool, FP-Block, that counters cross-domain fingerprint-based tracking while still allowing regular tracking. FP-Block ensures that any embedded party will see a different, unrelatable fingerprint for each site on which it is embedded. Thus, the user’s fingerprint can no longer be tracked across the web, while desired functionality is better preserved compared to existing methods. [less ▲]

Detailed reference viewed: 353 (5 UL)
Full Text
Peer Reviewed
See detailA symbolic algorithm for the analysis of robust timed automata
Kordy, Piotr UL; Langerak, Rom; Mauw, Sjouke UL et al

in 19th International Symposium on Formal Methods (FM'14), 12-16 May 2014 (2014, May)

Detailed reference viewed: 96 (2 UL)
Peer Reviewed
See detailProceedings First International Workshop on Graphical Models for Security, GraMSec 2014
Kordy, Barbara UL; Mauw, Sjouke UL; Pieters, Pieters

in First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014 (2014)

Detailed reference viewed: 32 (1 UL)
Full Text
Peer Reviewed
See detailOn Robustness of Trust Systems
Zhang, Jie; Yang, Liu; Mauw, Sjouke UL et al

in 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014 (2014)

Detailed reference viewed: 86 (0 UL)
See detailProceedings of the 10th International Workshop on Security and Trust Management (STM 2014)
Mauw, Sjouke UL; Jensen, Christian Damsgaard

Book published by Springer (2014)

Detailed reference viewed: 43 (1 UL)
See detailInformaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of the Art
Paredaens, Jan; Bijlsma, Lex; Boot, Peter et al

Report (2014)

Detailed reference viewed: 36 (0 UL)
Full Text
Peer Reviewed
See detailOn Robustness of Trust Systems
Zhang, Jie; Yang, Liu; Mauw, Sjouke UL et al

in 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014 (2014)

Detailed reference viewed: 96 (0 UL)
Full Text
Peer Reviewed
See detailDEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity
Chen, Xihui UL; Harpes, Carlo; Lenzini, Gabriele UL et al

in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November)

Through real-life experiments, it has been proved that spoofing is a practical threat to applications using the free civil service provided by Global Navigation Satellite Systems (GNSS). In this paper, we ... [more ▼]

Through real-life experiments, it has been proved that spoofing is a practical threat to applications using the free civil service provided by Global Navigation Satellite Systems (GNSS). In this paper, we demonstrate a prototype that can verify the integrity of GNSS civil signals. By integrity we intuitively mean that civil signals originate from a GNSS satellite without having been artificially interfered with. Our prototype provides interfaces that can incorporate existing spoofing detection methods whose results are then combined into an overall evaluation of the signal’s integrity, which we call integrity level. Considering the various security requirements from different applications, integrity levels can be calculated in many ways determined by their users. We also present an application scenario that deploys our prototype and offers a public central service – localisation assurance certification. Through experiments, we successfully show that our prototype is not only effective but also efficient in practice. [less ▲]

Detailed reference viewed: 311 (14 UL)
Full Text
See detailMessage from ESSS 2013 Workshop Co-chairs
Pang, Jun UL; Liu, Yang; Mauw, Sjouke UL

in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)

Detailed reference viewed: 118 (1 UL)
Full Text
Peer Reviewed
See detailPrivacy and verifiability in voting systems: Methods, developments and trends
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Computer Science Review (2013)

Detailed reference viewed: 154 (0 UL)
Full Text
Peer Reviewed
See detailA trust framework for evaluating GNSS signal integrity
Chen, Xihui UL; Lenzini, Gabriele UL; Martins, Miguel et al

in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

Detailed reference viewed: 304 (5 UL)
Full Text
Peer Reviewed
See detailADTool: Security Analysis with Attack-Defense Trees (Tool Demonstration Paper)
Kordy, Barbara UL; Kordy, Piotr UL; Mauw, Sjouke UL et al

in 10th International Conference on Quantitative Evaluation of SysTems (2013)

The ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack-defense trees. The main features of the ADTool are easy creation, efficient ... [more ▼]

The ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack-defense trees. The main features of the ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of attack trees, protection trees and defense trees, which are all particular instances of attack-defense trees. [less ▲]

Detailed reference viewed: 96 (8 UL)
Full Text
Peer Reviewed
See detailLocation Assurance and Privacy in GNSS Navigation
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele UL et al

in ERCIM News (2013), 2013(94),

The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a ... [more ▼]

The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a user’s location also gives rise to severe privacy concerns. Within an ESA (European Space Agency) funded project, we have developed a service that not only verifies the correctness of users’ locations but also enables users to control the accuracy of their revealed locations. [less ▲]

Detailed reference viewed: 109 (7 UL)
Full Text
Peer Reviewed
See detailDesign and formal analysis of a group signature based electronic toll pricing system
Chen, Xihui UL; Lenzini, Gabriele UL; Mauw, Sjouke UL et al

in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

Detailed reference viewed: 116 (13 UL)
Full Text
Peer Reviewed
See detailAttack-Defense Trees
Kordy, Barbara UL; Mauw, Sjouke UL; Radomirovic, Sasa UL et al

in Journal of Logic and Computation (2012)

Attack-defense trees are a novel methodology for graphical security modeling and assessment. They extend the well known formalism of attack trees by allowing nodes that represent defensive measures to ... [more ▼]

Attack-defense trees are a novel methodology for graphical security modeling and assessment. They extend the well known formalism of attack trees by allowing nodes that represent defensive measures to appear at any level of the tree. This enlarges the modeling capabilities of attack trees and makes the new formalism suitable for representing interactions between an attacker and a defender. Our formalization supports different semantical approaches for which we provide usage scenarios. We also formalize how to quantitatively analyze attack and defense scenarios using attributes. [less ▲]

Detailed reference viewed: 185 (15 UL)