Joeri de Ruiter
Joeri de Ruiter
Specialist security and privacy at SURF
Verified email at - Homepage
Cited by
Cited by
Protocol state fuzzing of TLS implementations
J de Ruiter, E Poll
24th USENIX Security Symposium (USENIX Security 15), 193-206, 2015
EMV in a nutshell
J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter
Technical Report, 2016
Formal models of bank cards for free
F Aarts, J De Ruiter, E Poll
Software Testing, Verification and Validation Workshops (ICSTW), 2013 IEEE …, 2013
Defeating IMSI Catchers
F van den Broek, R Verdult, J de Ruiter
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Analysis of Secure Key Storage Solutions on Android
T Cooijmans, J de Ruiter, E Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
Formal analysis of the EMV protocol suite
J de Ruiter, E Poll
Theory of Security and Applications, 113-129, 2012
Relay Cost Bounding for Contactless EMV Payments
T Chothia, FD Garcia, J de Ruiter, J van den Breekel, M Thompson
Automated Reverse Engineering using Lego®
G Chalupar, S Peherstorfer, E Poll, J de Ruiter
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
Model learning and model checking of SSH implementations
P Fiterău-Broştean, T Lenaerts, E Poll, J de Ruiter, F Vaandrager, ...
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model …, 2017
cMix: Anonymization by High-Performance Scalable Mixing
D Chaum, F Javani, A Kate, A Krasnova, J de Ruiter, AT Sherman
Analysis of DTLS Implementations Using Protocol State Fuzzing
P Fiterau-Brostean, B Jonsson, R Merget, J de Ruiter, K Sagonas, ...
29th USENIX Security Symposium (USENIX Security 20), 2523-2540, 2020
cMix: mixing with minimal real-time asymmetric cryptographic operations
D Chaum, D Das, F Javani, A Kate, A Krasnova, J De Ruiter, AT Sherman
International Conference on Applied Cryptography and Network Security, 557-578, 2017
Designed to fail: A USB-connected reader for online banking
A Blom, G de Koning Gans, E Poll, J de Ruiter, R Verdult
17th Nordic Conference on Secure IT Systems (NordSec 2012), Lecture Notes in …, 2012
The SmartLogic tool: Analysing and testing smart card protocols
G de Koning Gans, J de Ruiter
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake
CMM Stone, T Chothia, J de Ruiter
European Symposium on Research in Computer Security, 325-345, 2018
Polymorphic encryption and pseudonymisation for personalised healthcare
E Verheul, B Jacobs, C Meijer, M Hildebrandt, J de Ruiter
Cryptology ePrint Archive, 2016
Modelling and analysis of a hierarchy of distance bounding attacks
T Chothia, J De Ruiter, B Smyth
27th USENIX Security Symposium, USENIX Security, 2018
Protocol state machines and session languages: specification, implementation, and security flaws
E Poll, J de Ruiter, A Schubert
Security and Privacy Workshops (SPW), 2015 IEEE, 125-133, 2015
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols
T Chothia, M Ordean, J de Ruiter, RJ Thomas
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Lessons learned in the analysis of the EMV and TLS security protocols
J de Ruiter
PhD thesis, Radboud University Nijmegen, 2015
The system can't perform the operation now. Try again later.
Articles 1–20