Joeri de Ruiter
Joeri de Ruiter
Research engineer at SIDN Labs
Verified email at sidn.nl - Homepage
TitleCited byYear
Protocol state fuzzing of TLS implementations
J de Ruiter, E Poll
24th USENIX Security Symposium (USENIX Security 15), 193-206, 2015
1232015
Formal models of bank cards for free
F Aarts, J De Ruiter, E Poll
Software Testing, Verification and Validation Workshops (ICSTW), 2013 IEEEá…, 2013
712013
Defeating IMSI Catchers
F van den Broek, R Verdult, J de Ruiter
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communicationsá…, 2015
552015
Analysis of Secure Key Storage Solutions on Android
T Cooijmans, J de Ruiter, E Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphonesá…, 2014
552014
Formal analysis of the EMV protocol suite
J de Ruiter, E Poll
Theory of Security and Applications, 113-129, 2012
482012
Automated Reverse Engineering using Lego«
G Chalupar, S Peherstorfer, E Poll, J de Ruiter
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
392014
Relay Cost Bounding for Contactless EMV Payments
T Chothia, FD Garcia, J de Ruiter, J van den Breekel, M Thompson
362015
Model learning and model checking of SSH implementations
P Fiterău-Broştean, T Lenaerts, E Poll, J de Ruiter, F Vaandrager, ...
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Modelá…, 2017
29*2017
cMix: Anonymization by High-Performance Scalable Mixing
D Chaum, F Javani, A Kate, A Krasnova, J de Ruiter, AT Sherman
282016
Designed to fail: A USB-connected reader for online banking
A Blom, G de Koning Gans, E Poll, J de Ruiter, R Verdult
17th Nordic Conference on Secure IT Systems (NordSec 2012), Lecture Notes iná…, 2012
252012
The SmartLogic tool: Analysing and testing smart card protocols
G de Koning Gans, J de Ruiter
2012 IEEE Fifth International Conference on Software Testing, Verificationá…, 2012
242012
cMix: mixing with minimal real-time asymmetric cryptographic operations
D Chaum, D Das, F Javani, A Kate, A Krasnova, J De Ruiter, AT Sherman
International Conference on Applied Cryptography and Network Security, 557-578, 2017
142017
Polymorphic Encryption and Pseudonymisation for Personalised Healthcare.
ER Verheul, B Jacobs, C Meijer, M Hildebrandt, J de Ruiter
IACR Cryptology ePrint Archive 2016, 411, 2016
142016
Protocol state machines and session languages: specification, implementation, and security flaws
E Poll, J de Ruiter, A Schubert
Security and Privacy Workshops (SPW), 2015 IEEE, 125-133, 2015
122015
EMV in a nutshell
J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter
Technical Report, 2016
112016
Modelling and analysis of a hierarchy of distance bounding attacks
T Chothia, J De Ruiter, B Smyth
27th USENIX Security Symposium, USENIX Security, 2018
102018
Lessons learned in the analysis of the EMV and TLS security protocols
J de Ruiter
PhD thesis, Radboud University Nijmegen, 2015
102015
Model checking under fairness in ProB and its application to fair exchange protocols
DM Williams, J de Ruiter, W Fokkink
International Colloquium on Theoretical Aspects of Computing, 168-182, 2012
92012
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
CMM Stone, T Chothia, J de Ruiter
European Symposium on Research in Computer Security, 325-345, 2018
72018
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols
T Chothia, M Ordean, J de Ruiter, RJ Thomas
Proceedings of the 2017 ACM on Asia Conference on Computer andá…, 2017
62017
The system can't perform the operation now. Try again later.
Articles 1–20