Joeri de Ruiter
Joeri de Ruiter
Specialist security and privacy at SURF
Verified email at - Homepage
Cited by
Cited by
Protocol state fuzzing of TLS implementations
J de Ruiter, E Poll
24th USENIX Security Symposium (USENIX Security 15), 193-206, 2015
EMV in a nutshell
J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter
Technical Report, 2016
Formal models of bank cards for free
F Aarts, J De Ruiter, E Poll
Software Testing, Verification and Validation Workshops (ICSTW), 2013 IEEEá…, 2013
Analysis of DTLS Implementations Using Protocol State Fuzzing
P Fiterau-Brostean, B Jonsson, R Merget, J de Ruiter, K Sagonas, ...
29th USENIX Security Symposium (USENIX Security 20), 2523-2540, 2020
Defeating IMSI Catchers
F van den Broek, R Verdult, J de Ruiter
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
Model learning and model checking of SSH implementations
P Fiterău-Broştean, T Lenaerts, E Poll, J de Ruiter, F Vaandrager, ...
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Modelá…, 2017
Analysis of Secure Key Storage Solutions on Android
T Cooijmans, J de Ruiter, E Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphonesá…, 2014
Formal analysis of the EMV protocol suite
J de Ruiter, E Poll
Theory of Security and Applications, 113-129, 2012
Automated Reverse Engineering using Lego«
G Chalupar, S Peherstorfer, E Poll, J de Ruiter
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
Relay Cost Bounding for Contactless EMV Payments
T Chothia, FD Garcia, J de Ruiter, J van den Breekel, M Thompson
cMix: mixing with minimal real-time asymmetric cryptographic operations
D Chaum, D Das, F Javani, A Kate, A Krasnova, J De Ruiter, AT Sherman
International Conference on Applied Cryptography and Network Security, 557-578, 2017
cMix: Anonymization by High-Performance Scalable Mixing
D Chaum, F Javani, A Kate, A Krasnova, J de Ruiter, AT Sherman
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
CMM Stone, T Chothia, J de Ruiter
European Symposium on Research in Computer Security, 325-345, 2018
A Responsible Internet to Increase Trust in the Digital World
C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ...
Journal of Network and Systems Management 28 (4), 882-922, 2020
Inferring OpenVPN State Machines Using Protocol State Fuzzing
LA Daniel, E Poll, J de Ruiter
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 11-19, 2018
Designed to fail: A USB-connected reader for online banking
A Blom, G de Koning Gans, E Poll, J de Ruiter, R Verdult
17th Nordic Conference on Secure IT Systems (NordSec 2012), Lecture Notes iná…, 2012
Modelling and analysis of a hierarchy of distance bounding attacks
T Chothia, J De Ruiter, B Smyth
27th USENIX Security Symposium, USENIX Security, 2018
Polymorphic encryption and pseudonymisation for personalised healthcare
E Verheul, B Jacobs, C Meijer, M Hildebrandt, J de Ruiter
Cryptology ePrint Archive, 2016
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols
T Chothia, M Ordean, J de Ruiter, RJ Thomas
Proceedings of the 2017 ACM on Asia Conference on Computer andá…, 2017
The SmartLogic tool: Analysing and testing smart card protocols
G de Koning Gans, J de Ruiter
2012 IEEE Fifth International Conference on Software Testing, Verificationá…, 2012
The system can't perform the operation now. Try again later.
Articles 1–20