default search action
Robert Künnemann
Person information
- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Robert Künnemann, Marco Patrignani, Ethan Cecchetti:
Computationally Bounded Robust Compilation and Universally Composable Security. CSF 2024: 265-278 - [i19]Robert Künnemann, Marco Patrignani, Ethan Cecchetti:
Computationally Bounded Robust Compilation and Universally Composable Security. CoRR abs/2401.15041 (2024) - [i18]Kevin Morio, Robert Künnemann:
SpecMon: Modular Black-Box Runtime Monitoring of Security Protocols. CoRR abs/2409.02918 (2024) - [i17]Robert Künnemann, Julian Biehl:
Adaptive Exploit Generation against Security Devices and Security APIs. CoRR abs/2410.01568 (2024) - 2023
- [j2]Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, Michael Backes, Ben Stock, Robert Künnemann:
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. ACM Trans. Priv. Secur. 26(2): 18:1-18:36 (2023) - [c24]Philipp Sauer, Marcel Steinmetz, Robert Künnemann, Jörg Hoffmann:
Lifted Stackelberg Planning. ICAPS 2023: 370-374 - [c23]Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati:
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols. CCS 2023: 1362-1376 - [c22]Ilkan Esiyok, Pascal Berrang, Katriel Cohn-Gordon, Robert Künnemann:
Accountable Javascript Code Delivery. NDSS 2023 - [c21]Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann:
Automated Security Analysis of Exposure Notification Systems. USENIX Security Symposium 2023: 6593-6610 - [i16]Faezeh Nasrabadi, Robert Künnemann, Hamed Nemati:
CryptoBap: A Binary Analysis Platform for Cryptographic Protocols. CoRR abs/2308.14450 (2023) - 2022
- [c20]Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann:
SAPIC+: protocol verifiers of the world, unite! USENIX Security Symposium 2022: 3935-3952 - [i15]Ilkan Esiyok, Robert Künnemann, Pascal Berrang, Katriel Cohn-Gordon:
Accountable Javascript Code Delivery. CoRR abs/2202.09795 (2022) - [i14]Kevin Morio, Ilkan Esiyok, Dennis Jackson, Robert Künnemann:
Automated Security Analysis of Exposure Notification Systems. CoRR abs/2210.00649 (2022) - [i13]Vincent Cheval, Charlie Jacomme, Steve Kremer, Robert Künnemann:
Sapic+: protocol verifiers of the world, unite! IACR Cryptol. ePrint Arch. 2022: 741 (2022) - 2021
- [c19]Álvaro Torralba, Patrick Speicher, Robert Künnemann, Marcel Steinmetz, Jörg Hoffmann:
Faster Stackelberg Planning via Symbolic Search and Information Sharing. AAAI 2021: 11998-12006 - [c18]Alexander Dax, Robert Künnemann:
On the Soundness of Infrastructure Adversaries. CSF 2021: 1-16 - [c17]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in the Decentralised-Adversary Setting. CSF 2021: 1-16 - [c16]Kevin Morio, Robert Künnemann:
Verifying Accountability for Unbounded Sets of Participants. CSF 2021: 1-16 - [i12]Alexander Dax, Robert Künnemann:
On the Soundness of Infrastructure Adversaries. CoRR abs/2105.06731 (2021) - 2020
- [c15]Ilkan Esiyok, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes:
TrollThrottle - Raising the Cost of Astroturfing. ACNS (2) 2020: 456-476 - [c14]Kevin Morio, Dennis Jackson, Marco Vassena, Robert Künnemann:
Short Paper: Modular Black-box Runtime Verification of Security Protocols. PLAS@CCS 2020: 19-22 - [c13]Robert Künnemann, Hamed Nemati:
MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation. ESORICS (2) 2020: 525-545 - [i11]Ilkan Esiyok, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes:
Trollthrottle - Raising the Cost of Astroturfing. CoRR abs/2004.08836 (2020) - [i10]Kevin Morio, Robert Künnemann:
Verifying Accountability for Unbounded Sets of Participants. CoRR abs/2006.12047 (2020)
2010 – 2019
- 2019
- [c12]Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11. CSF 2019: 62-77 - [c11]Robert Künnemann, Ilkan Esiyok, Michael Backes:
Automated Verification of Accountability in Security Protocols. CSF 2019: 397-413 - [c10]Patrick Speicher, Marcel Steinmetz, Jörg Hoffmann, Michael Backes, Robert Künnemann:
Towards automated network mitigation analysis. SAC 2019: 1971-1978 - [c9]Robert Künnemann, Deepak Garg, Michael Backes:
Causality & Control Flow. CREST@ETAPS 2019: 32-46 - [i9]Marco Patrignani, Riad S. Wahby, Robert Künnemann:
Universal Composability is Secure Compilation. CoRR abs/1910.08634 (2019) - [i8]Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11. IACR Cryptol. ePrint Arch. 2019: 462 (2019) - 2018
- [c8]Patrick Speicher, Marcel Steinmetz, Michael Backes, Jörg Hoffmann, Robert Künnemann:
Stackelberg Planning: Towards Effective Leader-Follower State Space Search. AAAI 2018: 6286-6293 - [c7]Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes:
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure. EuroS&P 2018: 77-91 - [i7]Robert Künnemann, Ilkan Esiyok, Michael Backes:
Automated Verification of Accountability in Security Protocols. CoRR abs/1805.10891 (2018) - [i6]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in Security Protocols. IACR Cryptol. ePrint Arch. 2018: 127 (2018) - 2017
- [c6]Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann:
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. EuroS&P 2017: 76-91 - [i5]Michael Backes, Jörg Hoffmann, Robert Künnemann, Patrick Speicher, Marcel Steinmetz:
Simulated Penetration Testing and Mitigation Analysis. CoRR abs/1705.05088 (2017) - [i4]Robert Künnemann:
Sufficient and necessary causation are dual. CoRR abs/1710.09102 (2017) - 2016
- [j1]Steve Kremer, Robert Künnemann:
Automated analysis of security protocols with global state. J. Comput. Secur. 24(5): 583-616 (2016) - [c5]Michael Backes, Robert Künnemann, Esfandiar Mohammadi:
Computational Soundness for Dalvik Bytecode. CCS 2016: 717-730 - [i3]Michael Backes, Robert Künnemann, Esfandiar Mohammadi:
Computational Soundness for Dalvik Bytecode. CoRR abs/1608.04362 (2016) - 2015
- [c4]Robert Künnemann:
Automated Backward Analysis of PKCS#11 v2.20. POST 2015: 219-238 - 2014
- [b1]Robert Künnemann:
Foundations for analyzing security APIs in the symbolic and computational model. (Fondations d'analyse de APIs de sécurité dans le modèle symbolique et calculatoire). École normale supérieure de Cachan, France, 2014 - [c3]Steve Kremer, Robert Künnemann:
Automated Analysis of Security Protocols with Global State. IEEE Symposium on Security and Privacy 2014: 163-178 - [i2]Steve Kremer, Robert Künnemann:
Automated analysis of security protocols with global state. CoRR abs/1403.1142 (2014) - 2013
- [c2]Steve Kremer, Robert Künnemann, Graham Steel:
Universally Composable Key-Management. ESORICS 2013: 327-344 - 2012
- [c1]Robert Künnemann, Graham Steel:
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM. STM 2012: 257-272 - [i1]Steve Kremer, Robert Künnemann, Graham Steel:
Universally Composable Key-Management. IACR Cryptol. ePrint Arch. 2012: 189 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint