Joeri de Ruiter

About me

I work as technical specialist security and privacy at SURF. My research interests lie in future internet architectures and the design and analysis of real-world security protocols (e.g. EMV and TLS). Previously I worked as research engineer at SIDN Labs, as assistant professor in the Digital Security (DS) group at the Institute for Computing and Information Sciences of the Radboud University Nijmegen and as a Research Fellow in the Security and Privacy group at the School of Computer Science of the University of Birmingham on the SCEPTICS project (SystematiC Evaluation Process for Threats to Industrial Control Systems).

Publications
David Chaum, Mario Yaksetig, Alan T. Sherman and Joeri de Ruiter
Cryptologia, Volume 46, 2022, Issue 4, p. 347-379
Joeri de Ruiter, Caspar Schutijser
CoNEXT '21: Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies, 2021, p. 119-125
Supraja Sridhara, François Wirz, Joeri de Ruiter, Caspar Schutijser, Markus Legner, Adrian Perrig
Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications, and Uses of a Responsible Internet, 2021, p. 1-7
Paola Grosso, Cristian Hesselman, Luuk Hendriks, Joseph Hill, Stavros Konstantaras, Ronald van der Pol, Victor Reijs, Joeri de Ruiter and Caspar Schutijser
IFIP/IEEE International Symposium on Integrated Network Management - Experience Session, IM 2021, 2021
Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras and Cees de Laat
Journal of Network and Systems Management, Springer, 2020, Volume 28, p. 882-922
Paul Fiterau-Brostean, Bengt Jonsson, Robert Merget, Joeri de Ruiter, Konstantinos Sagonas and Juraj Somorovsky
29th USENIX Security Symposium (USENIX Security 20), USENIX Association, 2020
Chris McMahon Stone, Tom Chothia and Joeri de Ruiter
23rd European Symposium on Research in Computer Security (ESORICS 2018), Lecture Notes in Computer Science, Springer, 2018, Volume 11098, p. 325-345
Tom Chothia, Joeri de Ruiter and Ben Smyth
27th USENIX Security Symposium (USENIX Security 18), USENIX Association, 2018
Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe and Jan Verschuren
IWSEC 2018: Advances in Information and Computer Security, Lecture Notes in Computer Science, Springer, 2018, Volume 11049, p. 127-142
Lesly-Ann Daniel, Joeri de Ruiter and Erik Poll
Security Protocol Implementations: Development and Analysis (SPIDA) workshop at European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE, 2018, p. 11-19
Richard J. Thomas, Mihai Ordean, Tom Chothia and Joeri de Ruiter
Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017), ACM, 2017, p. 327-338
Paul Fiterau-Brostean, Frits Vaandrager, Erik Poll, Joeri de Ruiter, Toon Lenaerts and Patrick Verleg
Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software (SPIN 2017), ACM, 2017, p. 142-151
David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter and Alan T. Sherman
International Conference on Applied Cryptography and Network Security (ACNS 2017), Lecture Notes in Computer Science, Springer, 2017, Volume 10355, p. 557-578
Tom Chothia, Mihai Ordean, Joeri de Ruiter and Richard J. Thomas
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS'17), ACM, 2017, p. 743-756
Joeri de Ruiter
Secure IT Systems: 21st Nordic Conference (NordSec 2016), Lecture Notes in Computer Science, Springer, 2016, Volume 10014, p. 169-184
Tom Chothia and Joeri de Ruiter
2016 USENIX Workshop on Advances in Security Education (ASE 16), USENIX Association, 2016
Eric Verheul, Bart Jacobs, Carlo Meijer, Mireille Hildebrandt and Joeri de Ruiter
Cryptology ePrint Archive, Report 2016/411
Joeri de Ruiter, Richard J. Thomas and Tom Chothia
Reliability, Safety, and Security of Railway Systems (RSSRail 2016), Lecture Notes in Computer Science, Springer, 2016, Volume 9707, p. 53-68
David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter and Alan T. Sherman
Cryptology ePrint Archive, Report 2016/008
Fabian van den Broek, Roel Verdult and Joeri de Ruiter
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS'15), ACM, 2015, p. 340-351
Lesson learned in the analysis of the EMV and TLS security protocols PDF Bibtex
Joeri de Ruiter
PhD thesis, Radboud University Nijmegen, 2015
Joeri de Ruiter and Erik Poll
24th USENIX Security Symposium (USENIX Security 15), USENIX Association, 2015
René Habraken, Peter Dolron, Erik Poll and Joeri de Ruiter
Radio Frequency Identification. Security and Privacy Issues (RFIDSec 2015), Lecture Notes in Computer Science, Springer, 2015, Volume 9440, p. 122-137
Erik Poll, Joeri de Ruiter and Aleksy Schubert
LangSec Workshop at Security and Privacy Workshops (SPW), IEEE, 2015, p. 125-133
Tom Chothia, Flavio Garcia, Joeri de Ruiter, Jordi van den Breekel and Matthew Thompson
Financial Cryptography and Data Security (FC 2015), Lecture Notes in Computer Science, Springer, 2015, Volume 8975, p. 189-206
Tim Cooijmans, Joeri de Ruiter and Erik Poll
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM 2014), ACM, 2014, p. 11-20
Joeri de Ruiter
Cryptology ePrint Archive, Report 2014/590
Georg Chalupar, Stefan Peherstorfer, Erik Poll and Joeri de Ruiter
8th USENIX Workshop on Offensive Technologies (WOOT'14), USENIX Association, 2014
Fides Aarts, Joeri de Ruiter and Erik Poll
4th International Workshop on Security Testing (SECTEST), in association with the 6th International Conference on Software Testing, Verification and Validation (ICST), IEEE, 2013, p. 461-468
Erik Poll and Joeri de Ruiter
Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings, IFIP Advances in Information and Communication Technology, Springer, 2013, Volume 396, p. 107-120
Arjan Blom, Gerhard de Koning Gans, Erik Poll, Joeri de Ruiter, Roel Verdult
Secure IT Systems - 17th Nordic Conference (NordSec 2012), Lecture Notes in Computer Science, Springer, 2012, Volume 7917, p. 1-16
David M. Williams, Joeri de Ruiter and Wan Fokkink
Theoretical Aspects of Computing - ICTAC 2012, Lecture Notes in Computer Science, Springer, 2012, Volume 7521, p. 168-182
Gerhard de Koning Gans and Joeri de Ruiter
3rd International Workshop on Security Testing (SECTEST), in association with the 5th International Conference on Software Testing, Verification and Validation (ICST), IEEE, 2012, p. 864-871
Joeri de Ruiter and Erik Poll
Theory of Security and Applications (TOSCA 2011), Lecture Notes in Computer Science, Springer, 2012, Volume 6993, p. 113-129
Joeri de Ruiter
Master thesis, Technische Universiteit Eindhoven, Berry Schoenmakers, Jorge Guajardo Merchan and Sandeep Kumar (supervisors), 2010
Blogs
Software

SCION in P4
An implementation of the SCION protocol in P4 for the Intel Tofino.

Scapy SCION
A Scapy layer for the SCION protocol.

IRATI Wireshark dissector
A dissector for Wireshark which can dissect packets exchanged by the IRATI stack, an implementation of RINA.

RPKI scripts
Scripts to parse and process RPKI files.

StateLearner
A tool to infer state machines from implementations.

JavaCardOpenPGP
An open source Java Card implementation of the OpenPGP smart card specifications.

IUU Flasher
A tool to flash/dump smart cards using the Infinity USB Unlimited.

ProVerif Editor
An editor to edit protocol specifications in the applied pi calculus and verify these using ProVerif.

OpenEMV
An open source Java Card implementation of the EMV standard.

Radboud Reader

Contact

Email: website at cypherpunk dot nl
PGP Key
Key fingerprint: A34E 0C33 1EE1 D89A BCBC 6E58 21E2 34E4 B5A0 2A54