publications

publications by type in reversed chronological order.

Journals

  1. IsaNet: A framework for verifying secure data plane protocols
    Tobias Klenze, Christoph Sprenger, and David A. Basin
    J. Comput. Secur., 2023
  2. IsaNet: Formalization of a Verification Framework for Secure Data Plane Protocols
    Tobias Klenze, and Christoph Sprenger
    Arch. Formal Proofs, 2022
  3. Igloo: soundly linking compositional refinement and separation logic for distributed system verification
    Christoph Sprenger, Tobias Klenze, Marco Eilers, Felix A. Wolf, Peter Müller, Martin Clochard, and David A. Basin
    Proc. ACM Program. Lang., 2020
  4. Refining security protocols
    Christoph Sprenger, and David A. Basin
    J. Comput. Secur., 2018
  5. Abstractions for security protocol verification
    Thanh Binh Nguyen, Christoph Sprenger, and Cas Cremers
    J. Comput. Secur., 2018
  6. Refining Authenticated Key Agreement with Strong Adversaries
    Joseph Lallemand, and Christoph Sprenger
    Arch. Formal Proofs, 2017
  7. Developing Security Protocols by Refinement
    Christoph Sprenger, and Ivano Somaini
    Arch. Formal Proofs, 2017
  8. Consensus Refined
    Ognjen Maric, and Christoph Sprenger
    Arch. Formal Proofs, 2015
  9. Compositional verification of sequential programs with procedures
    Dilian GurovMarieke Huisman, and Christoph Sprenger
    Inf. Comput., 2008
  10. On global induction mechanisms in a \(\mathrmμ\)-calculus with explicit approximations
    Christoph Sprenger, and Mads Dam
    RAIRO Theor. Informatics Appl., 2003
  11. SCIDDLE: A tool for large scale distributed computing
    Peter Arbenz, Christoph Sprenger, Hans Peter Lüthi, and Stefan Vogel
    Concurr. Pract. Exp., 1995

Conferences

  1. S&P 2023
    Sound Verification of Security Protocols: From Design to Interoperable Implementations
    Linard Arquint, Felix A. Wolf, Joseph LallemandRalf SasseChristoph Sprenger, Sven N. Wiesner, David A. Basin, and Peter Müller
    In 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, 2023
  2. CSF 2022
    N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures
    Thilo Weghorn, Si Liu, Christoph SprengerAdrian Perrig, and David A. Basin
    In 35th IEEE Computer Security Foundations Symposium, CSF 2022, Haifa, Israel, August 7-10, 2022, 2022
  3. CSF 2021
    Formal Verification of Secure Forwarding Protocols
    Tobias Klenze, Christoph Sprenger, and David A. Basin
    In 34th IEEE Computer Security Foundations Symposium, CSF 2021, Dubrovnik, Croatia, June 21-25, 2021, 2021
  4. EuroS&P 2020
    SoK: Delegation and Revocation, the Missing Links in the Web’s Chain of Trust
    Laurent Chuat, AbdelRahman Abdou, Ralf SasseChristoph SprengerDavid A. Basin, and Adrian Perrig
    In IEEE European Symposium on Security and Privacy, EuroS&P 2020, Genoa, Italy, September 7-11, 2020, 2020
  5. USENIX Sec. 2020
    EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
    Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, and Adrian Perrig
    In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, 2020
  6. CAV 2017
    Cutoff Bounds for Consensus Algorithms
    Ognjen Maric, Christoph Sprenger, and David A. Basin
    In Computer Aided Verification - 29th International Conference, CAV 2017, Heidelberg, Germany, July 24-28, 2017, Proceedings, Part II, 2017
  7. EuroS&P 2017
    Refining Authenticated Key Agreement with Strong Adversaries
    Joseph LallemandDavid A. Basin, and Christoph Sprenger
    In 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017, 2017
  8. DSN 2015
    Consensus Refined
    Ognjen Maric, Christoph Sprenger, and David A. Basin
    In 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015, Rio de Janeiro, Brazil, June 22-25, 2015, 2015
  9. POST 2015
    Abstractions for Security Protocol Verification
    Thanh Binh Nguyen, and Christoph Sprenger
    In Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings, 2015
  10. FM 2014
    Verification of a Transactional Memory Manager under Hardware Failures and Restarts
    Ognjen Maric, and Christoph Sprenger
    In FM 2014: Formal Methods - 19th International Symposium, Singapore, May 12-16, 2014. Proceedings, 2014
  11. POST 2013
    Sound Security Protocol Transformations
    Thanh Binh Nguyen, and Christoph Sprenger
    In Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, 2013
  12. CSF 2012
    Refining Key Establishment
    Christoph Sprenger, and David A. Basin
    In 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012, 2012
  13. CCS 2010
    Developing security protocols by refinement
    Christoph Sprenger, and David A. Basin
    In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, 2010
  14. CSF 2008
    Cryptographically-Sound Protocol-Model Abstractions
    Christoph Sprenger, and David A. Basin
    In Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, 2008
  15. TPHOLs 2007
    A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols
    Christoph Sprenger, and David A. Basin
    In Theorem Proving in Higher Order Logics, 20th International Conference, TPHOLs 2007, Kaiserslautern, Germany, September 10-13, 2007, Proceedings, 2007
  16. CSFW 2006
    Cryptographically Sound Theorem Proving
    Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, and Michael Waidner
    In 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, 2006
  17. FASE 2004
    Checking Absence of Illicit Applet Interactions: A Case Study
    Marieke HuismanDilian GurovChristoph Sprenger, and Gennady Chugunov
    In Fundamental Approaches to Software Engineering, 7th International Conference, FASE 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004 Barcelona, Spain, March 29 - april 2, 2004, Proceedings, 2004
  18. MEMOCODE 2004
    Compositional verification for secure loading of smart card applets
    Christoph SprengerDilian Gurov, and Marieke Huisman
    In 2nd ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2004), 23-25 June 2004, San Diego, California, USA, Proceedings, 2004
  19. FoSSaCS 2003
    On the Structure of Inductive Reasoning: Circular and Tree-Shaped Proofs in the \(\mathrmμ\)-Calculus
    Christoph Sprenger, and Mads Dam
    In Foundations of Software Science and Computational Structures, (FoSSaCS 2003), 2003
  20. MEMOCODE 2003
    A Verification Methodology for Infinite-State Message Passing Systems
    Christoph Sprenger, and Krzysztof Worytkiewicz
    In 1st ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2003), 24-26 June 2003, Mont Saint-Michel, France, Proceedings, 2003
  21. FICS 2002
    A note on global induction in a mu-calculus with explicit approximations
    Christoph Sprenger, and Mads Dam
    In Fixed Points in Computer Science, FICS 2002, Copenhagen, Denmark, 20-21 July 2002, Preliminary Proceedings, 2002
  22. TACAS 1998
    A Verified Model Checker for the Modal \(\mathrmμ\)-calculus in Coq
    Christoph Sprenger
    In Tools and Algorithms for Construction and Analysis of Systems, 4th International Conference, TACAS ’98, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS’98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings, 1998
  23. SCIDDLE: A Tool for Large Scale Cooperative Computing
    Peter Arbenz, Hans Peter Lüthi, Christoph Sprenger, and Stefan Vogel
    In High-Performance Computing and Networking, International Conference and Exhibition, HPCN Europe 1994, Munich, Germany, April 18-20, 1994, Proceedings, Volume II: Networking and Tools, 1994

Technical Reports

  1. Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version)
    Linard Arquint, Felix A. Wolf, Joseph LallemandRalf SasseChristoph Sprenger, Sven N. Wiesner, David A. Basin, and Peter Müller
    2022
  2. Igloo: Soundly Linking Compositional Refinement and Separation Logic for Distributed System Verification
    Christoph Sprenger, Tobias Klenze, Marco Eilers, Felix A. Wolf, Peter Müller, Martin Clochard, and David A. Basin
    2020
  3. Proxy Certificates: The Missing Link in the Web’s Chain of Trust
    Laurent Chuat, AbdelRahman Abdou, Ralf SasseChristoph SprengerDavid A. Basin, and Adrian Perrig
    2019
  4. Cryptographically Sound Theorem Proving
    Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, and Michael Waidner
    2006
    IACR Cryptol. ePrint Arch.

Theses

  1. Deductive Local Model Checking – On the Verification of CTL* Properties of Infinite-State Reactive Systems
    Christoph Sprenger
    EPFL, Lausanne, Switzerland, 2000
    PhD thesis