A more complete and recent list can be found at DBLP.
Journal publications
Steve Kremer and Robert Künnemann. “Automated analysis of security protocols with global state”. In: Journal of Computer Security, vol. 24, no. 5. IOC Press, 2016. pp. 583-616. (ZIP (long version + model files))
Conference publications
Alexander Dax, Sven Tangermann, Robert Künnemann, and Michael Backes. “How to wrap it up - A formally verified proposal for the use of authenticated
wrapping in PKCS#11”. CSF 2019 (PDF | PDF (long version))
Robert Künnemann, Ilkan Esiyok, and Michael Backes. “Automated Verification of Accountability in Security Protocols”. CSF 2019 (distinguished paper) (PDF | PDF (long version))
Michael Backes, Joerg Hoffmann, Robert Künnemann, Patrick Speicher, Marcel Steinmetz. "Towards Automated Network Mitigation Analysis". SAC 2019 (PDF | PDF (long version))
Robert Künnemann, Deepak Garg, Michael Backes. "Causality & Control flow". CREST 2019 (PDF | PDF (long version))
Patrick Speicher, Marcel Steinmetz, Michael Backes, Jörg Hoffmann, Robert Künnemann. "Stackelberg Planning: Towards Effective Leader-Follower State Space Search". AAAI 2018
Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes. "Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure". EuroS&P 2018
Michael Backes, Jannik Dreier, Steve Kremer and Robert Künnemann. "A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange". EuroS&P 2017 (PDF | PDF (long version) | code + model files)
Michael Backes, Robert Künnemann and Esfandiar Mohammadi. "Computational Soundness of Dalvik Bytecode". In Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16). ACM, 2016. pp. 717-730. (PDF | PDF (long version))
Robert Künnemann. "Automated backward analysis of PKCS#11 v2.20". In Principles of Security and Trust (POST'15). Springer, 2015, pp. 219-238. (PDF | PDF (long version) | ZIP (long version + model files) )
Steve Kremer and Robert Künnemann. “Automated analysis of security protocols with global state”. In: Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P'14). IEEE Computer Society Press, May 2014. (PDF (long version))
Steve Kremer, Robert Künnemann and Graham Steel. “Universally Composable Key-Management”. In: European Symposium on Research in Computer Security. Springer, 2013, pp. 327–344. ( PDF | PDF (long version) | BibTeX + Abstract )
Robert Künnemann and Graham Steel. “YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM”. In: Workshop on Security and Trust Management. Springer, 2012, pp. 257–272. ( PDF | BibTeX + Abstract )
wrapping in PKCS#11”. CSF 2019 (PDF | PDF (long version))
Robert Künnemann, Ilkan Esiyok, and Michael Backes. “Automated Verification of Accountability in Security Protocols”. CSF 2019 (distinguished paper) (PDF | PDF (long version))
Michael Backes, Joerg Hoffmann, Robert Künnemann, Patrick Speicher, Marcel Steinmetz. "Towards Automated Network Mitigation Analysis". SAC 2019 (PDF | PDF (long version))
Robert Künnemann, Deepak Garg, Michael Backes. "Causality & Control flow". CREST 2019 (PDF | PDF (long version))
Patrick Speicher, Marcel Steinmetz, Michael Backes, Jörg Hoffmann, Robert Künnemann. "Stackelberg Planning: Towards Effective Leader-Follower State Space Search". AAAI 2018
Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes. "Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure". EuroS&P 2018
Michael Backes, Jannik Dreier, Steve Kremer and Robert Künnemann. "A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange". EuroS&P 2017 (PDF | PDF (long version) | code + model files)
Michael Backes, Robert Künnemann and Esfandiar Mohammadi. "Computational Soundness of Dalvik Bytecode". In Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS'16). ACM, 2016. pp. 717-730. (PDF | PDF (long version))
Robert Künnemann. "Automated backward analysis of PKCS#11 v2.20". In Principles of Security and Trust (POST'15). Springer, 2015, pp. 219-238. (PDF | PDF (long version) | ZIP (long version + model files) )
Steve Kremer and Robert Künnemann. “Automated analysis of security protocols with global state”. In: Proceedings of the 35th IEEE Symposium on Security and Privacy (S&P'14). IEEE Computer Society Press, May 2014. (PDF (long version))
Steve Kremer, Robert Künnemann and Graham Steel. “Universally Composable Key-Management”. In: European Symposium on Research in Computer Security. Springer, 2013, pp. 327–344. ( PDF | PDF (long version) | BibTeX + Abstract )
Robert Künnemann and Graham Steel. “YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM”. In: Workshop on Security and Trust Management. Springer, 2012, pp. 257–272. ( PDF | BibTeX + Abstract )
Thesis Manuscripts
Robert Künnemann. Foundations for analyzing security APIs in the symbolic and computational model . Ph.D. thesis. École normale supérieure de Cachan, Cachan, France, October 2010. (PDF)
Robert Künnemann. Game-theoretic notions of Incoercibility. Master's thesis. Saarland University, Saarbrücken, Germany, September 2010. (PDF)
Robert Künnemann. Game-theoretic notions of Incoercibility. Master's thesis. Saarland University, Saarbrücken, Germany, September 2010. (PDF)
Talks
2019
|
25/06/2019 , "How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS#11", CSF 2019 (Hoboken, NJ, USA)
28/06/2019 , "Automated Verification of Accountability in Security Protocols", CSF 2019 (Hoboken, NJ, USA) 07/04/2019 "Causation & Control-flow", 4th Workshop on Formal Reasoning about Causation, Responsibility, & Explanations in Science & Technology (Prague, Czech Republic) |
2018
|
26/06/2018 "Stackelberg Planning and its Application in Security Analysis", Scheduling and Planning Applications woRKshop (SPARK), invited talk with Jörg Hoffmann (Delft, Netherlands)
12/03/2018 "Mechanized verification of accountability in security protocols", Grande Region Security and Reliability Day 2018, (Saarbrücken, Germany) |
2017 |
23/05/2017 "Towards a Game-theoretic Notion of Incoercibility", reading group at Applied Security and Information Assurance Group, University of Luxemburg (Luxemburg, Luxemburg)
09/03/2017 "A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange", Grande Region Security and Reliability Day 2017, (Luxemburg, Luxemburg) |
2016 |
27/07/2016 "Computational Soundness for Dalvik Bytecode", Workshop on Foundations of Computer Security 2016 (FCS), affiliated with CSF (Lisbon, Portugal
|
2015 |
17/04/2015 "Automated Backward Analysis of PKCS#11 v2.20", 4th International Conference on Principles of Security and Trust (POST) (London, UK)
|
2014
|
02/04/2014 "The MAC in the box project", Third Workshop on Formal Methods And Tools for Security (FMATS3) (Cambridge, UK)
04/02/2014 "Foundations for Analyzing Security APIs in the symbolic and computational model", MAIS Graduate Seminar (Darmstadt, Germany) |
2013
|
10/09/2013 "Universally Composable Key-Management", ESORICS 2013 (Egham, UK)
23/07/2013 "A Survey on Protocol Verification an Security APIs", MAIS working group (Darmstadt, Germany) |
2012
|
26/11/2012 "Yubisecure? Formal Security Analysis Results for the Yubikey and YubiHSM", Dagstuhl Seminar Analysis of Security APIs (Dagstuhl, Germany)
14/09/2012 "Yubisecure? Formal Security Analysis Results for the Yubikey and YubiHSM", 8th International Workshop on Security and Trust Management (STM 2012) (Pisa, Italy) 17/07/2012 "A Survey on Protocol Verification and Security APIs", Reading group at the Institute of Information Security, ETH Zürich (Zürich, Switzerland) 28/06/2012 "A Survey on Protocol Verification and Security APIs", 6th International Workshop on Analysis of Security APIs (Harvard University, Cambridge MA, USA) 16/03/2012 "Universally Composable Key-management", 2012 Grande Region Security and Reliability Day (Nancy, France) |
2011
|
08/12/2011 "Universally Composable Key-management", Groupe de travail SECSI (Cachan, France)
08/06/2011 "Secure APIs and Simulation-based Security", Séminaire du LSV (Pierrefonds, France) |
2010
|
04/11/2010 "Game-theoretic Notions of Incoercibility", Groupe de travail SECSI (Cachan, France)
|