Follow
Joeri de Ruiter
Joeri de Ruiter
Specialist security and privacy at SURF
Verified email at surf.nl - Homepage
Title
Cited by
Cited by
Year
Protocol state fuzzing of TLS implementations
J de Ruiter, E Poll
24th USENIX Security Symposium (USENIX Security 15), 193-206, 2015
3682015
EMV in a nutshell
J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter
Technical Report, 2016
2012016
Analysis of DTLS Implementations Using Protocol State Fuzzing
P Fiterau-Brostean, B Jonsson, R Merget, J de Ruiter, K Sagonas, ...
29th USENIX Security Symposium (USENIX Security 20), 2523-2540, 2020
1402020
Formal models of bank cards for free
F Aarts, J De Ruiter, E Poll
Software Testing, Verification and Validation Workshops (ICSTW), 2013 IEEE …, 2013
1282013
Model learning and model checking of SSH implementations
P Fiterău-Broştean, T Lenaerts, E Poll, J de Ruiter, F Vaandrager, ...
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model …, 2017
1162017
Defeating IMSI Catchers
F van den Broek, R Verdult, J de Ruiter
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1112015
Analysis of Secure Key Storage Solutions on Android
T Cooijmans, J de Ruiter, E Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
962014
Formal analysis of the EMV protocol suite
J de Ruiter, E Poll
Theory of Security and Applications, 113-129, 2012
822012
cMix: mixing with minimal real-time asymmetric cryptographic operations
D Chaum, D Das, F Javani, A Kate, A Krasnova, J De Ruiter, AT Sherman
International Conference on Applied Cryptography and Network Security, 557-578, 2017
702017
Automated Reverse Engineering using Lego®
G Chalupar, S Peherstorfer, E Poll, J de Ruiter
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
702014
Relay Cost Bounding for Contactless EMV Payments
T Chothia, FD Garcia, J de Ruiter, J van den Breekel, M Thompson
672015
cMix: Anonymization by High-Performance Scalable Mixing
D Chaum, F Javani, A Kate, A Krasnova, J de Ruiter, AT Sherman
612016
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
CMM Stone, T Chothia, J de Ruiter
European Symposium on Research in Computer Security, 325-345, 2018
592018
A Responsible Internet to Increase Trust in the Digital World
C Hesselman, P Grosso, R Holz, F Kuipers, JH Xue, M Jonker, J de Ruiter, ...
Journal of Network and Systems Management 28 (4), 882-922, 2020
512020
Inferring OpenVPN State Machines Using Protocol State Fuzzing
LA Daniel, E Poll, J de Ruiter
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 11-19, 2018
412018
Designed to fail: A USB-connected reader for online banking
A Blom, G de Koning Gans, E Poll, J de Ruiter, R Verdult
17th Nordic Conference on Secure IT Systems (NordSec 2012), Lecture Notes in …, 2012
342012
Modelling and analysis of a hierarchy of distance bounding attacks
T Chothia, J De Ruiter, B Smyth
27th USENIX Security Symposium, USENIX Security, 2018
312018
Polymorphic encryption and pseudonymisation for personalised healthcare
E Verheul, B Jacobs, C Meijer, M Hildebrandt, J de Ruiter
Cryptology ePrint Archive, 2016
312016
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols
T Chothia, M Ordean, J de Ruiter, RJ Thomas
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
272017
A Tale of the OpenSSL State Machine: A Large-Scale Black-Box Analysis
J de Ruiter
Nordic Conference on Secure IT Systems, 169-184, 2016
262016
The system can't perform the operation now. Try again later.
Articles 1–20