Follow
Mohammad Torabi Dashti
Mohammad Torabi Dashti
ETH Zurich
Verified email at duck.com
Title
Cited by
Cited by
Year
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1432012
SECFUZZ: Fuzz-testing security protocols
P Tsankov, MT Dashti, D Basin
2012 7th International Workshop on Automation of Software Test (AST), 1-7, 2012
1082012
A hybrid PKI-IBC based ephemerizer system
SK Nair, MT Dashti, B Crispo, AS Tanenbaum
New Approaches for Security, Privacy and Trust in Complex Environments …, 2007
552007
A Framework for Automatically Checking Anonymity with μCRL
T Chothia, S Orzan, J Pang, M Torabi Dashti
Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007
492007
Vera: A flexible model-based vulnerability testing tool
A Blome, M Ochoa, K Li, M Peroli, MT Dashti
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
352013
Distributed Analysis with μCRL: A Compendium of Case Studies
S Blom, JR Calamé, B Lisser, S Orzan, J Pang, J Van De Pol, MT Dashti, ...
International Conference on Tools and Algorithms for the Construction and …, 2007
352007
Minimal message complexity of asynchronous multi-party contract signing
S Mauw, S Radomirovic, MT Dashti
2009 22nd IEEE Computer Security Foundations Symposium, 13-25, 2009
292009
On the quest for impartiality: Design and analysis of a fair non-repudiation protocol
J Cederquist, R Corin, MT Dashti
Information and Communications Security: 7th International Conference, ICICS …, 2005
292005
Partial order reduction for branching security protocols
W Fokkink, MT Dashti, A Wijs
2010 10th International Conference on Application of Concurrency to System …, 2010
282010
Decentralized composite access control
P Tsankov, S Marinovic, MT Dashti, D Basin
Principles of Security and Trust: Third International Conference, POST 2014 …, 2014
262014
Semi-valid input coverage for fuzz testing
P Tsankov, MT Dashti, D Basin
Proceedings of the 2013 International Symposium on Software Testing and …, 2013
222013
A privacy-friendly RFID protocol using reusable anonymous tickets
M Asadpour, MT Dashti
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
222011
An intruder model for verifying liveness in security protocols
J Cederquist, MT Dashti
Proceedings of the fourth ACM workshop on Formal methods in security, 23-32, 2006
222006
Model-based detection of CSRF
M Rocchetto, M Ochoa, M Torabi Dashti
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
212014
Pruning state spaces with extended beam search
M Torabi Dashti, AJ Wijs
International Symposium on Automated Technology for Verification and …, 2007
192007
A certified email protocol using key chains
J Cederquist, MT Dashti, S Mauw
21st International Conference on Advanced Information Networking and …, 2007
192007
LTL is closed under topological closure
GP Maretić, MT Dashti, D Basin
Information Processing Letters 114 (8), 408-413, 2014
182014
Scalable, privacy preserving radio‐frequency identification protocol for the internet of things
M Asadpour, MT Dashti
Concurrency and Computation: Practice and Experience 27 (8), 1932-1950, 2015
142015
Test execution checkpointing for web applications
M Guarnieri, P Tsankov, T Buchs, M Torabi Dashti, D Basin
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
132017
Access control synthesis for physical spaces
P Tsankov, MT Dashti, D Basin
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 443-457, 2016
132016
The system can't perform the operation now. Try again later.
Articles 1–20