Members
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1W. Belkhir, Y. Chevalier, M. Rusinowitch.
    Parametrized automata simulation and application to service composition, in: J. Symb. Comput., 2015, vol. 69, pp. 40–60.
  • 2D. Bernhard, V. Cortier, D. Galindo, O. Pereira, B. Warinschi.
    A comprehensive analysis of game-based ballot privacy definitions, in: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P'15), IEEE Computer Society Press, May 2015, pp. 499–516.
  • 3R. Chadha, S. Ciobaca, S. Kremer.
    Automated Verification of Equivalence Properties of Cryptographic Protocols, in: Programming Languages and Systems - 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings, H. Seidl (editor), Lecture Notes in Computer Science, Springer, 2012, vol. 7211, pp. 108–127.
  • 4P. Chocron, P. Fontaine, C. Ringeissen.
    A Polite Non-Disjoint Combination Method: Theories with Bridging Functions Revisited, in: Proceedings of the 25th International Conference on Automated Deduction (CADE-25), Lecture Notes in Computer Science, Springer, August 2015, vol. 9195, pp. 419-433.
    https://hal.inria.fr/hal-01157898
  • 5R. Chretien, V. Cortier, S. Delaune.
    Typing messages for free in security protocols: the case of equivalence properties, in: Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), Rome, Italy, Lecture Notes in Computer Science, Springer, September 2014, vol. 8704, pp. 372-386.
  • 6S. Kremer, R. Künnemann.
    Automated Analysis of Security Protocols with Global State, in: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, IEEE Computer Society, 2014, pp. 163–178.
  • 7H. H. Nguyen, A. Imine, M. Rusinowitch.
    Anonymizing Social Graphs via Uncertainty Semantics, in: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (ASIA CCS'15), 2015, ACM, 2015, pp. 495–506.
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 10T. Abbes, A. Bouhoula, M. Rusinowitch.
    Detection of firewall configuration errors with updatable tree, in: International Journal of Information Security, June 2016, vol. 15, no 3, pp. 301-317. [ DOI : 10.1007/s10207-015-0290-0 ]
    https://hal.inria.fr/hal-01320646
  • 11T. Avanesov, Y. Chevalier, M. Rusinowitch, M. Turuani.
    Intruder deducibility constraints with negation. Decidability and application to secured service compositions, in: Journal of Symbolic Computation, 2017, vol. 80, pp. 4 - 26. [ DOI : 10.1016/j.jsc.2016.07.008 ]
    https://hal.inria.fr/hal-01405851
  • 12T. Avanesov, Y. Chevalier, M. Rusinowitch, M. Turuani.
    Satisfiability of General Intruder Constraints with and without a Set Constructor, in: Journal of Symbolic Computation, 2017, vol. 80, pp. 27-61. [ DOI : 10.1016/j.jsc.2016.07.009 ]
    https://hal.inria.fr/hal-01405842
  • 13X. Bultel, J. Dreier, P. Lafourcade, M. More.
    How to Explain Modern Security Concepts to your Children, in: Cryptologia, November 2016.
    https://hal.archives-ouvertes.fr/hal-01397035
  • 14R. Chadha, V. Cheval, Ş. C. Ciobâcǎ, S. Kremer.
    Automated verification of equivalence properties of cryptographic protocols, in: ACM Transactions on Computational Logic, 2016, vol. 17, no 4. [ DOI : 10.1145/2926715 ]
    https://hal.inria.fr/hal-01306561
  • 15S. Kremer, R. Künnemann.
    Automated Analysis of Security Protocols with Global State, in: Journal of Computer Security, 2016, vol. 24, no 5. [ DOI : 10.3233/JCS-160556 ]
    https://hal.inria.fr/hal-01351388
  • 16H. Nguyen, A. Imine, M. Rusinowitch.
    Network Structure Release under Differential Privacy, in: Transactions on Data Privacy, December 2016, vol. 9, no 3, 26 p.
    https://hal.inria.fr/hal-01424911
  • 17J. Yu, V. Cheval, M. Ryan.
    DTKI: A New Formalized PKI with Verifiable Trusted Parties, in: The Computer Journal, 2016, vol. 59, pp. 1695-1713. [ DOI : 10.1093/comjnl/bxw039 ]
    https://hal.archives-ouvertes.fr/hal-01403899

International Conferences with Proceedings

  • 18Y. Abid, A. Imine, A. Napoli, C. Raïssi, M. Rusinowitch.
    Online link disclosure strategies for social networks, in: The 11th International Conference on Risks and Security of Internet and Systems, Roscoff, France, The 11th International Conference on Risks and Security of Internet and Systems, September 2016.
    https://hal.inria.fr/hal-01402062
  • 19M. Arapinis, V. Cortier, S. Kremer.
    When are three voters enough for privacy properties?, in: 21st European Symposium on Research in Computer Security, Heraklion, Crete, Greece, 21st European Symposium on Research in Computer Security, Springer, 2016.
    https://hal.inria.fr/hal-01351398
  • 20M. Backes, J. Dreier, S. Kremer, R. Künnemann.
    A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange, in: 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Paris, France, Proceedings of the 2nd IEEE European Symposium on Security and Privacy, Springer, 2017.
    https://hal.inria.fr/hal-01396282
  • 21R. Berthon, C. Ringeissen.
    Satisfiability Modulo Free Data Structures Combined with Bridging Functions, in: 14th International Workshop on Satisfiability Modulo Theories, affiliated with IJCAR 2016, Coimbra, Portugal, T. King, R. Piskac (editors), CEUR Workshop Proceedings, CEUR-WS.org, July 2016, no 1617, pp. 71–80.
    https://hal.inria.fr/hal-01389228
  • 22X. Bultel, J. Dreier, J.-G. Dumas, P. Lafourcade.
    Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen, in: FUN with algorithms 2016, La Maddalena, Italy, E. Demaine, F. Grandoni (editors), FUN with algorithms 2016, June 2016.
    https://hal.archives-ouvertes.fr/hal-01326059
  • 23P. Chaidos, V. Cortier, G. Fuchsbauer, D. Galindo.
    BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme, in: 23rd ACM Conference on Computer and Communications Security (CCS'16), Vienna, Austria, October 2016. [ DOI : 10.1145/2976749.2978337 ]
    https://hal.inria.fr/hal-01377917
  • 25V. Cortier, A. Filipiak, S. Gharout, J. Traoré.
    Designing and proving an EMV-compliant payment protocol for mobile devices, in: 2nd IEEE European Symposium on Security and Privacy (EuroSP'17), Paris, France, April 2017.
    https://hal.inria.fr/hal-01408584
  • 26V. Cortier, D. Galindo, R. Kuesters, J. Mueller, T. Truderung.
    SoK: Verifiability Notions for E-Voting Protocols, in: 36th IEEE Symposium on Security and Privacy (S&P'16), San Jose, United States, May 2016.
    https://hal.inria.fr/hal-01280445
  • 27C. Jacomme, S. Kremer, G. Scerri.
    Symbolic Models for Isolated Execution Environments, in: 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Paris, France, Proceedings of the 2nd IEEE European Symposium on Security and Privacy, Springer, 2017.
    https://hal.inria.fr/hal-01396291
  • 28S. Kremer, P. Rønne.
    To Du or not to Du: A Security Analysis of Du-Vote, in: IEEE European Symposium on Security and Privacy 2016, Saarbrucken, Germany, Proceedings of the IEEE European Symposium on Security and Privacy 2016, IEEE Computer Society, March 2016.
    https://hal.inria.fr/hal-01238894
  • 29H. H. Nguyen, A. Imine, M. Rusinowitch.
    Detecting Communities under Differential Privacy, in: Workshop on Privacy in the Electronic Society - WPES 206, Vienna, Austria, October 2016, pp. 83 - 93.
    https://hal.inria.fr/hal-01393266

Conferences without Proceedings

  • 30M. Turuani, T. Voegtlin, M. Rusinowitch.
    Automated Verification of Electrum Wallet, in: 3rd Workshop on Bitcoin and Blockchain Research, Christ Church, Barbados, February 2016.
    https://hal.inria.fr/hal-01256397

Books or Proceedings Editing

  • 31R. Verma, M. Rusinowitch (editors)
    International Workshop on Security And Privacy Analytics, IWSPA '16: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, ACM, New Orleans, United States, 2016.
    https://hal.inria.fr/hal-01408625
References in notes
  • 32M. Arapinis, V. Cortier, S. Kremer, M. Ryan.
    Practical Everlasting Privacy, in: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, D. Basin, J. Mitchell (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 7796, pp. 21–40.
  • 33M. Arapinis, L. Mancini, E. Ritter, M. Ryan, N. Golde, K. Redon, R. Borgaonkar.
    New privacy issues in mobile telephony: fix and verification, in: Proc. 19th ACM Conference on Computer and Communications Security (CCS'12), ACM Press, 2012, pp. 205-216.
  • 34B. Blanchet.
    An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: Proc. 14th Computer Security Foundations Workshop (CSFW'01), IEEE Comp. Soc. Press, 2001, pp. 82–96.
  • 35M. Bortolozzo, M. Centenaro, R. Focardi, G. Steel.
    Attacking and Fixing PKCS#11 Security Tokens, in: Proc. 17th ACM Conference on Computer and Communications Security (CCS'10), ACM Press, 2010, pp. 260-269.
  • 36C. Chevalier, S. Delaune, S. Kremer, M. Ryan.
    Composition of Password-based Protocols, in: Formal Methods in System Design, 2013, vol. 43, pp. 369-413.
  • 37Y. Chevalier, L. Vigneron.
    Strategy for Verifying Security Protocols with Unbounded Message Size, in: Journal of Automated Software Engineering, April 2004, vol. 11, no 2, pp. 141-166.
  • 38H. Comon-Lundh, S. Delaune.
    The finite variant property: How to get rid of some algebraic properties, in: Proc. of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), LNCS, Springer, 2005, vol. 3467, pp. 294-307.
  • 39V. Cortier, S. Delaune.
    Safely Composing Security Protocols, in: Formal Methods in System Design, February 2009, vol. 34, no 1, pp. 1-36.
  • 40S. Delaune, S. Kremer, M. Ryan.
    Verifying Privacy-type Properties of Electronic Voting Protocols, in: Journal of Computer Security, July 2009, vol. 17, no 4, pp. 435-487.
  • 41S. Delaune, S. Kremer, G. Steel.
    Formal Analysis of PKCS#11 and Proprietary Extensions, in: Journal of Computer Security, November 2010, vol. 18, no 6, pp. 1211-1245.
  • 42S. Erbatur, D. Kapur, A. M. Marshall, C. Meadows, P. Narendran, C. Ringeissen.
    On Asymmetric Unification and the Combination Problem in Disjoint Theories, in: Proc. 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), LNCS, Springer, 2014, pp. 274-288.
  • 43S. Escobar, C. Meadows, J. Meseguer.
    Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, in: Foundations of Security Analysis and Design V, LNCS, Springer, 2009, vol. 5705, pp. 1-50.
  • 44D. Gollmann.
    What do we mean by entity authentication?, in: Proc. Symposium on Security and Privacy (SP'96), IEEE Comp. Soc. Press, 1996, pp. 46–54.
  • 45G. Grewal, M. Ryan, L. Chen, M. Clarkson.
    Du-Vote: Remote Voting with Untrusted Computers, in: Proc. 28th IEEE Computer Security Foundations Symposium (CSF'11), IEEE Computer Society Press, 2015.
  • 46J. Herzog.
    Applying protocol analysis to security device interfaces, in: IEEE Security & Privacy Magazine, July-Aug 2006, vol. 4, no 4, pp. 84–87.
  • 47B. Schmidt, S. Meier, C. Cremers, D. Basin.
    The TAMARIN Prover for the Symbolic Analysis of Security Protocols, in: Proc. 25th International Conference on Computer Aided Verification (CAV'13), LNCS, Springer, 2013, vol. 8044, pp. 696-701.
  • 48V. Sofronie-Stokkermans.
    Locality Results for Certain Extensions of Theories with Bridging Functions, in: Automated Deduction - CADE-22, 22nd International Conference on Automated Deduction, Montreal, Canada, August 2-7, 2009. Proceedings, R. A. Schmidt (editor), Lecture Notes in Computer Science, Springer, 2009, vol. 5663, pp. 67–83.