Bibliography
Major publications by the team in recent years
-
1M. Abadi, B. Blanchet, C. Fournet.
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, in: Journal of the ACM (JACM), October 2017, vol. 65, no 1, pp. 1 - 103. [ DOI : 10.1145/3127586 ]
https://hal.inria.fr/hal-01636616 -
2D. Ahman, C. Hriţcu, K. Maillard, G. Martínez, G. Plotkin, J. Protzenko, A. Rastogi, N. Swamy.
Dijkstra Monads for Free, in: 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), Paris, France, ACM, 2017, pp. 515-529, https://arxiv.org/abs/1608.06499. [ DOI : 10.1145/3009837.3009878 ]
https://hal.archives-ouvertes.fr/hal-01424794 -
3R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, G. Steel, J.-K. Tsay.
Efficient Padding Oracle Attacks on Cryptographic Hardware, in: CRYPTO, 2012, pp. 608–625. -
4K. Bhargavan, B. Blanchet, N. Kobeissi.
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, in: 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 483 - 502. [ DOI : 10.1109/SP.2017.26 ]
https://hal.inria.fr/hal-01575920 -
5K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Pironti, P.-Y. Strub.
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, in: IEEE Symposium on Security and Privacy (Oakland), 2014, pp. 98–113. -
6B. Blanchet.
A Computationally Sound Mechanized Prover for Security Protocols, in: IEEE Transactions on Dependable and Secure Computing, 2008, vol. 5, no 4, pp. 193–207, Special issue IEEE Symposium on Security and Privacy 2006. -
7B. Blanchet.
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, in: Foundations and Trends in Privacy and Security, October 2016, vol. 1, no 1–2, pp. 1–135. -
8C. Hritcu, M. Greenberg, B. Karel, B. C. Pierce, G. Morrisett.
All Your IFCException Are Belong to Us, in: IEEE Symposium on Security and Privacy (Oakland), 2013, pp. 3–17. -
9M. Isaakidis, H. Halpin, G. Danezis.
UnlimitID: Privacy-Preserving Federated Identity Management Using Algebraic MACs, in: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, New York, NY, USA, WPES '16, ACM, 2016, pp. 139–142.
http://doi.acm.org/10.1145/2994620.2994637 -
10Y. Juglaret, C. Hritcu, A. Azevedo de Amorim, B. Eng, B. C. Pierce.
Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation, in: 29th IEEE Symposium on Computer Security Foundations (CSF), IEEE Computer Society Press, July 2016, pp. 45–60. [ DOI : 10.1109/CSF.2016.11 ]
http://arxiv.org/abs/1602.04503
Doctoral Dissertations and Habilitation Theses
-
11E.-I. Bartzia.
A formalization of elliptic curves for cryptography, Université Paris-Saclay, February 2017.
https://pastel.archives-ouvertes.fr/tel-01563979
Articles in International Peer-Reviewed Journals
-
12M. Abadi, B. Blanchet, C. Fournet.
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, in: Journal of the ACM (JACM), October 2017, vol. 65, no 1, pp. 1 - 103. [ DOI : 10.1145/3127586 ]
https://hal.inria.fr/hal-01636616 -
13D. Ahman.
Handling Fibred Algebraic Effects, in: Proceedings of the ACM on Programming Languages, January 2018, vol. 2, no POPL. [ DOI : 10.1145/3158095 ]
https://hal.archives-ouvertes.fr/hal-01672734 -
14D. Ahman, C. Fournet, C. Hriţcu, K. Maillard, A. Rastogi, N. Swamy.
Recalling a Witness: Foundations and Applications of Monotonic State, in: Proceedings of the ACM on Programming Languages, January 2018, vol. 2, no POPL, https://arxiv.org/abs/1707.02466. [ DOI : 10.1145/3158153 ]
https://hal.archives-ouvertes.fr/hal-01672733 -
15K. Bhargavan, B. Beurdouche, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, J. K. Zinzindohoue.
A messy state of the union, in: Communications of the ACM, January 2017, vol. 60, no 2, pp. 99 - 107. [ DOI : 10.1145/3023357 ]
https://hal.inria.fr/hal-01673714 -
16W. J. Bowman, Y. Cong, N. Rioux, A. Ahmed.
Type‐Preserving CPS Translation of Σ and Π Types is Not Not Possible, in: Proceedings of the ACM on Programming Languages, January 2018, vol. 2, no POPL. [ DOI : 10.1145/3158110 ]
https://hal.archives-ouvertes.fr/hal-01672735 -
17O. Flückiger, G. Scherer, M.-H. Yee, A. Goel, A. Ahmed, J. Vitek.
Correctness of Speculative Optimizations with Dynamic Deoptimization, in: Proceedings of the ACM on Programming Languages, 2017, https://arxiv.org/abs/1711.03050, forthcoming. [ DOI : 10.1145/3158137 ]
https://hal.inria.fr/hal-01646765 -
18J. Protzenko, J. Zinzindohoué, A. Rastogi, T. Ramananandro, P. Wang, S. Zanella‐Béguelin, A. Delignat‐Lavaud, C. Hriţcu, K. Bhargavan, C. Fournet, N. Swamy.
Verified Low‐Level Programming Embedded in F*, in: Proceedings of the ACM on Programming Languages, September 2017, vol. 1, no ICFP, pp. 17:1–17:29, https://arxiv.org/abs/1703.00053. [ DOI : 10.1145/3110261 ]
https://hal.archives-ouvertes.fr/hal-01672706 -
19C. Troncoso, M. Isaakidis, G. Danezis, H. Halpin.
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments, in: Proceedings on Privacy Enhancing Technologies, October 2017, vol. 2017, no 4, pp. 307 - 329. [ DOI : 10.1515/popets-2017-0056 ]
https://hal.inria.fr/hal-01673295
Invited Conferences
-
20H. Halpin.
The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions, in: SPACE 2017 - Seventh International Conference on Security, Privacy, and Applied Cryptography Engineering, Goa, India, Lecture Notes in Computer Science, Springer, December 2017, vol. 10662, pp. 10-29. [ DOI : 10.1007/978-3-319-71501-8_2 ]
https://hal.inria.fr/hal-01673296 -
21G. Leurent, K. Bhargavan.
On the Practical (In-)Security of 64-bit Block Ciphers, in: ESC 2017 - Early Symmetric Crypto, Canach, Luxembourg, January 2017.
https://hal.inria.fr/hal-01105128
International Conferences with Proceedings
-
22D. Ahman, C. Hriţcu, K. Maillard, G. Martínez, G. Plotkin, J. Protzenko, A. Rastogi, N. Swamy.
Dijkstra Monads for Free, in: 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), Paris, France, ACM, 2017, pp. 515-529, https://arxiv.org/abs/1608.06499. [ DOI : 10.1145/3009837.3009878 ]
https://hal.archives-ouvertes.fr/hal-01424794 -
23D. Ahman, T. Uustalu.
Taking Updates Seriously, in: Proceedings of the 6th International Workshop on Bidirectional Transformations co‐located with The European Joint Conferences on Theory and Practice of Software - ETAPS 2017, Uppsala, Sweden, April 2017, pp. 59–73.
https://hal.archives-ouvertes.fr/hal-01672736 -
25K. Bhargavan, B. Bond, A. Delignat‐Lavaud, C. Fournet, C. Hawblitzel, C. Hritcu, S. Ishtiaq, M. Kohlweiss, R. Leino, J. Lorch, K. Maillard, J. Pain, B. Parno, J. Protzenko, T. Ramananandro, A. Rane, A. Rastogi, N. Swamy, L. Thompson, P. Wang, S. Zanella‐Béguelin, J. K. Zinzindohoué.
Everest: Towards a Verified, Drop‐in Replacement of HTTPS, in: 2nd Summit on Advances in Programming Languages (SNAPL), Asilomar, CA, United States, May 2017. [ DOI : 10.4230/LIPIcs.SNAPL.2017.1 ]
https://hal.archives-ouvertes.fr/hal-01672707 -
26K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, J. Pan, J. Protzenko, A. Rastogi, N. Swamy, S. Zanella-Béguelin, J. K. Zinzindohoué.
Implementing and Proving the TLS 1.3 Record Layer, in: SP 2017 - 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 463-482. [ DOI : 10.1109/SP.2017.58 ]
https://hal.inria.fr/hal-01674096 -
27B. Blanchet.
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols, in: 30th IEEE Computer Security Foundations Symposium, Santa Barbara, United States, August 2017, pp. 68-82. [ DOI : 10.1109/CSF.2017.7 ]
https://hal.inria.fr/hal-01575861 -
28K. Cairns, H. Halpin, G. Steel.
Security Analysis of the W3C Web Cryptography API, in: Proceedings of Security Standardisation Research (SSR), Gaithersberg, United States, Lecture Notes in Computer Science (LNCS), Springer, December 2017, vol. 10074, pp. 112 - 140. [ DOI : 10.1007/978-3-319-49100-4_5 ]
https://hal.inria.fr/hal-01426852 -
29N. Grimm, K. Maillard, C. Fournet, C. Hriţcu, M. Maffei, J. Protzenko, T. Ramananandro, A. Rastogi, N. Swamy, S. Zanella‐Béguelin.
A Monadic Framework for Relational Verification: Applied to Information Security, Program Equivalence, and Optimizations, in: 7th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP), Los Angeles, United States, ACM, January 2018, pp. 130–145, https://arxiv.org/abs/1703.00055. [ DOI : 10.1145/3167090 ]
https://hal.archives-ouvertes.fr/hal-01672703 -
30H. Halpin.
A Roadmap for High Assurance Cryptography, in: FPS 2017 - 10th International Symposium on Foundations & Practice of Security, Nancy, France, October 2017, pp. 1-9.
https://hal.inria.fr/hal-01673294 -
31H. Halpin.
NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging, in: ARES 2017 - 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, ACM, August 2017, pp. 1-10. [ DOI : 10.1145/3098954.3104056 ]
https://hal.inria.fr/hal-01673292 -
32H. Halpin.
Semantic Insecurity: Security and the Semantic Web, in: Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2017), Vienna, Austria, October 2017.
https://hal.inria.fr/hal-01673291 -
33N. Kobeissi, K. Bhargavan, B. Blanchet.
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: 2nd IEEE European Symposium on Security and Privacy, Paris, France, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]
https://hal.inria.fr/hal-01575923 -
34N. Kobeissi, K. Bhargavan, B. Blanchet.
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: EuroS&P 2017 - 2nd IEEE European Symposium on Security and Privacy, Paris, France, A. Sabelfeld, M. Smith (editors), IEEE, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]
https://hal.inria.fr/hal-01583009 -
35L. Lampropoulos, D. Gallois-Wong, C. Hriţcu, J. Hughes, B. C. Pierce, L.-Y. Xia.
Beginner's Luck: A Language for Random Generators, in: 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), Paris, France, ACM, 2017, pp. 114-129, https://arxiv.org/abs/1607.05443. [ DOI : 10.1145/3009837.3009868 ]
https://hal.archives-ouvertes.fr/hal-01424793 -
36J.-K. Zinzindohoué, K. Bhargavan, J. Protzenko, B. Beurdouche.
HACL * : A Verified Modern Cryptographic Library, in: ACM Conference on Computer and Communications Security (CCS), Dallas, United States, October 2017.
https://hal.inria.fr/hal-01588421
Internal Reports
-
37K. Bhargavan, B. Blanchet, N. Kobeissi.
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, Inria Paris, May 2017, no RR-9040, 51 p.
https://hal.inria.fr/hal-01528752 -
38B. Blanchet.
Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols, Inria Paris, May 2017, no RR-9072, 40 p.
https://hal.inria.fr/hal-01527671
Other Publications
-
39K. Bhargavan, I. Boureanu, C. Onete, P.-A. Fouque, B. Richard.
Content delivery over TLS: a cryptographic analysis of keyless SSL, IEEE, April 2017, pp. 600-615, EuroS&P 2017 - 2nd IEEE European Symposium on Security and Privacy. [ DOI : 10.1109/EuroSP.2017.52 ]
https://hal.inria.fr/hal-01673853 -
40H. Halpin, M. Piekarska.
Introduction to Security and Privacy on the Blockchain, April 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&P Workshops 2017).
https://hal.inria.fr/hal-01673293
- 41ARINC SPECIFICATION 823P1: DATALINK SECURITY, PART 1 â ACARS MESSAGE SECURITY, December 2007.
- 42ICAO Doc 9880: Manual on Detailed Technical Specifications for the Aeronautical Telecommunication Network (ATN) using ISO/OSI Standards and Protocols, Part IV B — Security Services, Third edition (Proposed Draft), May 2017.
-
43M. Abadi, B. Blanchet.
Analyzing Security Protocols with Secrecy Types and Logic Programs, in: Journal of the ACM, January 2005, vol. 52, no 1, pp. 102–146. -
44M. Abadi, B. Blanchet, C. Fournet.
Just Fast Keying in the Pi Calculus, in: ACM Transactions on Information and System Security (TISSEC), July 2007, vol. 10, no 3, pp. 1–59. -
45M. Abadi, C. Fournet.
Mobile Values, New Names, and Secure Communication, in: 28th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01), London, United Kingdom, ACM Press, January 2001, pp. 104–115. -
46J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, S. Maffeis.
Refinement types for secure implementations, in: ACM Trans. Program. Lang. Syst., 2011, vol. 33, no 2, 8 p. -
47K. Bhargavan, A. Delignat-Lavaud, S. Maffeis.
Language-Based Defenses Against Untrusted Browser Origins, in: Proceedings of the 22th USENIX Security Symposium, 2013. -
48K. Bhargavan, C. Fournet, R. Corin, E. Zalinescu.
Verified Cryptographic Implementations for TLS, in: ACM Transactions Inf. Syst. Secur., March 2012, vol. 15, no 1, 3:1 p. -
49K. Bhargavan, C. Fournet, A. D. Gordon.
Modular Verification of Security Protocol Code by Typing, in: ACM Symposium on Principles of Programming Languages (POPL'10), 2010, pp. 445–456. -
50K. Bhargavan, C. Fournet, A. D. Gordon, N. Swamy.
Verified Implementations of the Information Card Federated Identity-Management Protocol, in: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), ACM Press, 2008, pp. 123–135. -
51B. Blanchet, M. Abadi, C. Fournet.
Automated Verification of Selected Equivalences for Security Protocols, in: Journal of Logic and Algebraic Programming, February–March 2008, vol. 75, no 1, pp. 3–51. -
52B. Blanchet.
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW'01), 2001, pp. 82–96. -
53B. Blanchet.
Automatic Verification of Correspondences for Security Protocols, in: Journal of Computer Security, July 2009, vol. 17, no 4, pp. 363–434. -
54B. Blanchet, A. Podelski.
Verification of Cryptographic Protocols: Tagging Enforces Termination, in: Theoretical Computer Science, March 2005, vol. 333, no 1-2, pp. 67–90, Special issue FoSSaCS'03. -
55J. Clulow.
On the Security of PKCS#11, in: CHES, 2003, pp. 411-425. -
56S. Delaune, S. Kremer, G. Steel.
Formal Analysis of PKCS#11 and Proprietary Extensions, in: Journal of Computer Security, November 2010, vol. 18, no 6, pp. 1211-1245. -
57D. Dolev, A. Yao.
On the security of public key protocols, in: IEEE Transactions on Information Theory, 1983, vol. IT–29, no 2, pp. 198–208. -
58C. Fournet, M. Kohlweiss, P.-Y. Strub.
Modular Code-Based Cryptographic Verification, in: ACM Conference on Computer and Communications Security, 2011. -
59R. Needham, M. Schroeder.
Using encryption for authentication in large networks of computers, in: Communications of the ACM, 1978, vol. 21, no 12, pp. 993–999. -
60N. Swamy, J. Chen, C. Fournet, P.-Y. Strub, K. Bhargavan, J. Yang.
Secure distributed programming with value-dependent types, in: 16th ACM SIGPLAN international conference on Functional Programming, 2011, pp. 266-278. -
61N. Swamy, C. Fournet, A. Rastogi, K. Bhargavan, J. Chen, P.-Y. Strub, G. M. Bierman.
Gradual typing embedded securely in JavaScript, in: 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2014, pp. 425-438. -
62N. Swamy, C. Hriţcu, C. Keller, A. Rastogi, A. Delignat-Lavaud, S. Forest, K. Bhargavan, C. Fournet, P.-Y. Strub, M. Kohlweiss, J.-K. Zinzindohoue, S. Zanella-Béguelin.
Dependent Types and Multi-Monadic Effects in F*, in: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), Unknown, United States, ACM, 2016, pp. 256-270.
https://hal.archives-ouvertes.fr/hal-01265793