Current students

  1. Katriel Cohn-Gordon (PhD student)
  2. Martin Dehnel-Wild (PhD student)
  3. Luke Garratt (PhD student)
  4. Kevin Milner (PhD student)
  5. Nicholas Moore (PhD student)
  6. Dennis Jackson (PhD student)

Past PhD students

  1. Marko Horvat. Formal analysis of modern security protocols in current standards. PhD Thesis, University of Oxford, 2016.
  2. Michèle Feltz. Strengthening the Security of Key Exchange Protocols. PhD Thesis, ETH Zurich, May 2014.
  3. Simon Meier. Advancing Automated Security Protocol Verification. PhD Thesis, ETH Zurich, January 2013.

Past Bachelor/Master students

  1. Lara Schmid. Improving the ISO/IEC 11770 standard. Bachelor Thesis, ETH Zurich, 2013.
  2. Tomas Zgraggen. Analysing and Repairing the ISO 11770 Standard for Key Management. Bachelor Thesis, ETH Zurich, 2012.
  3. Rati Gelashvili. Attacks on re-keying and renegotiation in Key Exchange Protocols. Bachelor Thesis, ETH Zurich, 2012.
  4. Adrian Kyburz. An automated formal analysis of the security of the Internet Key Exchange (IKE) protocol in the presence of compromising adversaries. Master Thesis, ETH Zurich, 2010.
  5. Adrian Kyburz. Defending Against Compromising Adversaries. Semester Thesis, ETH Zurich, 2010.
  6. Alberto Piai. Extending the Scyther tool to verify aliveness and data agreement Semester Thesis. ETH Zurich, 2008.
  7. Simon Meier. Formalizing an Operational Semantics for Security Protocols. Semester Thesis and Master Thesis. ETH Zurich, 2007.
  8. Gijs Hollestelle. Automatic Classification of Attacks on Security Protocols, Master Thesis. Eindhoven University of Technology, 2005.
  9. Niek Palm. Bewijzen van Security Protocollen in een Trace Model, Master Thesis (in Dutch). Eindhoven University of Technology, 2005.
  10. Lutger Kunst. Automated Visualisation of Attacks, OOTI project. Eindhoven University of Technology, 2004.
  11. Leon Schrijvers and Martijn Coenen. War driving in Eindhoven, Project. Eindhoven University of Technology, 2003.

PhD committees

  1. Lucca Hirschi, Automated Verification of Privacy in Security Protocols: Back and Forth Between Theory & Practice. ENS Paris-Saclay, France, 2017.
  2. Marjan Skrobot, On Composability and Security of Game-based Password-Authenticated Key Exchange. University of Luxembourg, Luxembourg, 2017.
  3. Cyrille Wiedling, Formal Verification of Advanced Families of Security Protocols: E-Voting and APIs. University of Lorraine, France, 2014.
  4. Thomas Gibson-Robinson, Analysing Layered Security Protocols. University of Oxford, UK, 2013.
  5. Martin Eian. Robustness in Wireless Network Access Protocols. NTNU Trondheim, Norway, 2012.
  6. Augustin Sarr. Key Agreement Protocols: Security Models, Analysis, and Designs. University of Grenoble, France, 2010.