{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:12Z","timestamp":1750220052126,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3596440","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"326-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Formal Methods for Payment Protocols"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2952-939X","authenticated-orcid":false,"given":"David","family":"Basin","sequence":"first","affiliation":[{"name":"ETH Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"volume-title":"Model Checking Security Protocols","author":"Basin David","key":"e_1_3_2_1_1_1","unstructured":"David Basin , Cas Cremers , and Catherine Meadows . 2018. Model Checking Security Protocols . Springer , Chapter\u00a024, 727\u2013762. David Basin, Cas Cremers, and Catherine Meadows. 2018. Model Checking Security Protocols. Springer, Chapter\u00a024, 727\u2013762."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.162"},{"key":"e_1_3_2_1_3_1","volume-title":"30th USENIX Security Symposium, USENIX Security 2021","author":"Basin A.","year":"2021","unstructured":"David\u00a0 A. Basin , Ralf Sasse , and Jorge Toro-Pozo . 2021 . Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions . In 30th USENIX Security Symposium, USENIX Security 2021 , August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 179\u2013194. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/basin David\u00a0A. Basin, Ralf Sasse, and Jorge Toro-Pozo. 2021. Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 179\u2013194. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/basin"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00037"},{"key":"e_1_3_2_1_5_1","first-page":"4","article-title":"Symbolically Analyzing Security Protocols using TAMARIN","volume":"4","author":"David\u00a0Basin Jannik\u00a0Dreier","year":"2017","unstructured":"Jannik\u00a0Dreier David\u00a0Basin , Cas\u00a0Cremers and Ralf Sasse . 2017 . Symbolically Analyzing Security Protocols using TAMARIN . SIGLOG News 4 , 4 (October 2017), 19\u201330. https:\/\/doi.org\/10.1145\/3157831.3157835 10.1145\/3157831.3157835 Jannik\u00a0Dreier David\u00a0Basin, Cas\u00a0Cremers and Ralf Sasse. 2017. Symbolically Analyzing Security Protocols using TAMARIN. SIGLOG News 4, 4 (October 2017), 19\u201330. https:\/\/doi.org\/10.1145\/3157831.3157835","journal-title":"SIGLOG News"},{"key":"e_1_3_2_1_6_1","volume-title":"32th USENIX Security Symposium, USENIX Security","author":"David\u00a0Basin Patrick\u00a0Schaller","year":"2023","unstructured":"Patrick\u00a0Schaller David\u00a0Basin and Jorge Toro-Pozo . 2023 . Inducing Authentication Failures to Bypass Credit Card PINs . In 32th USENIX Security Symposium, USENIX Security 2023. USENIX Association. To appear. Patrick\u00a0Schaller David\u00a0Basin and Jorge Toro-Pozo. 2023. Inducing Authentication Failures to Bypass Credit Card PINs. In 32th USENIX Security Symposium, USENIX Security 2023. USENIX Association. To appear."},{"key":"e_1_3_2_1_7_1","volume-title":"Formal Analysis of Diffie-Hellman Protocols. In 29th USENIX Security Symposium, USENIX Security 2020","author":"Girol Guillaume","year":"2020","unstructured":"Guillaume Girol , Lucca Hirschi , Ralf Sasse , Dennis Jackson , Cas Cremers , and David Basin . 2020 . A Spectral Analysis of Noise: A Comprehensive, Automated , Formal Analysis of Diffie-Hellman Protocols. In 29th USENIX Security Symposium, USENIX Security 2020 , August 12-14, 2020. USENIX Association , 1857\u20131874. Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, and David Basin. 2020. A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020. USENIX Association, 1857\u20131874."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3596440","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3596440"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":7,"alternative-id":["10.1145\/3579856.3596440","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3596440","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}