Personnel
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1M. Abadi, B. Blanchet, C. Fournet.
    The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, in: Journal of the ACM (JACM), October 2017, vol. 65, no 1, pp. 1 - 103. [ DOI : 10.1145/3127586 ]
    https://hal.inria.fr/hal-01636616
  • 2D. Ahman, C. Hriţcu, K. Maillard, G. Martínez, G. Plotkin, J. Protzenko, A. Rastogi, N. Swamy.
    Dijkstra Monads for Free, in: 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), Paris, France, ACM, 2017, pp. 515-529, https://arxiv.org/abs/1608.06499. [ DOI : 10.1145/3009837.3009878 ]
    https://hal.archives-ouvertes.fr/hal-01424794
  • 3R. Bardou, R. Focardi, Y. Kawamoto, L. Simionato, G. Steel, J.-K. Tsay.
    Efficient Padding Oracle Attacks on Cryptographic Hardware, in: CRYPTO, 2012, pp. 608–625.
  • 4K. Bhargavan, B. Blanchet, N. Kobeissi.
    Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, in: 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 483 - 502. [ DOI : 10.1109/SP.2017.26 ]
    https://hal.inria.fr/hal-01575920
  • 5K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Pironti, P.-Y. Strub.
    Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, in: IEEE Symposium on Security and Privacy (Oakland), 2014, pp. 98–113.
  • 6B. Blanchet.
    A Computationally Sound Mechanized Prover for Security Protocols, in: IEEE Transactions on Dependable and Secure Computing, 2008, vol. 5, no 4, pp. 193–207, Special issue IEEE Symposium on Security and Privacy 2006.
  • 7B. Blanchet.
    Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, in: Foundations and Trends in Privacy and Security, October 2016, vol. 1, no 1–2, pp. 1–135.
  • 8C. Hritcu, M. Greenberg, B. Karel, B. C. Pierce, G. Morrisett.
    All Your IFCException Are Belong to Us, in: IEEE Symposium on Security and Privacy (Oakland), 2013, pp. 3–17.
  • 9M. Isaakidis, H. Halpin, G. Danezis.
    UnlimitID: Privacy-Preserving Federated Identity Management Using Algebraic MACs, in: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, New York, NY, USA, WPES '16, ACM, 2016, pp. 139–142.
    http://doi.acm.org/10.1145/2994620.2994637
  • 10Y. Juglaret, C. Hritcu, A. Azevedo de Amorim, B. Eng, B. C. Pierce.
    Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation, in: 29th IEEE Symposium on Computer Security Foundations (CSF), IEEE Computer Society Press, July 2016, pp. 45–60. [ DOI : 10.1109/CSF.2016.11 ]
    http://arxiv.org/abs/1602.04503
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 12M. Abadi, B. Blanchet, C. Fournet.
    The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, in: Journal of the ACM (JACM), October 2017, vol. 65, no 1, pp. 1 - 103. [ DOI : 10.1145/3127586 ]
    https://hal.inria.fr/hal-01636616
  • 13D. Ahman.
    Handling Fibred Algebraic Effects, in: Proceedings of the ACM on Programming Languages, January 2018, vol. 2, no POPL. [ DOI : 10.1145/3158095 ]
    https://hal.archives-ouvertes.fr/hal-01672734
  • 14D. Ahman, C. Fournet, C. Hriţcu, K. Maillard, A. Rastogi, N. Swamy.
    Recalling a Witness: Foundations and Applications of Monotonic State, in: Proceedings of the ACM on Programming Languages, January 2018, vol. 2, no POPL, https://arxiv.org/abs/1707.02466. [ DOI : 10.1145/3158153 ]
    https://hal.archives-ouvertes.fr/hal-01672733
  • 15K. Bhargavan, B. Beurdouche, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, J. K. Zinzindohoue.
    A messy state of the union, in: Communications of the ACM, January 2017, vol. 60, no 2, pp. 99 - 107. [ DOI : 10.1145/3023357 ]
    https://hal.inria.fr/hal-01673714
  • 16W. J. Bowman, Y. Cong, N. Rioux, A. Ahmed.
    Type‐Preserving CPS Translation of Σ and Π Types is Not Not Possible, in: Proceedings of the ACM on Programming Languages, January 2018, vol. 2, no POPL. [ DOI : 10.1145/3158110 ]
    https://hal.archives-ouvertes.fr/hal-01672735
  • 17O. Flückiger, G. Scherer, M.-H. Yee, A. Goel, A. Ahmed, J. Vitek.
    Correctness of Speculative Optimizations with Dynamic Deoptimization, in: Proceedings of the ACM on Programming Languages, 2017, https://arxiv.org/abs/1711.03050, forthcoming. [ DOI : 10.1145/3158137 ]
    https://hal.inria.fr/hal-01646765
  • 18J. Protzenko, J. Zinzindohoué, A. Rastogi, T. Ramananandro, P. Wang, S. Zanella‐Béguelin, A. Delignat‐Lavaud, C. Hriţcu, K. Bhargavan, C. Fournet, N. Swamy.
    Verified Low‐Level Programming Embedded in F*, in: Proceedings of the ACM on Programming Languages, September 2017, vol. 1, no ICFP, pp. 17:1–17:29, https://arxiv.org/abs/1703.00053. [ DOI : 10.1145/3110261 ]
    https://hal.archives-ouvertes.fr/hal-01672706
  • 19C. Troncoso, M. Isaakidis, G. Danezis, H. Halpin.
    Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments, in: Proceedings on Privacy Enhancing Technologies, October 2017, vol. 2017, no 4, pp. 307 - 329. [ DOI : 10.1515/popets-2017-0056 ]
    https://hal.inria.fr/hal-01673295

Invited Conferences

  • 20H. Halpin.
    The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions, in: SPACE 2017 - Seventh International Conference on Security, Privacy, and Applied Cryptography Engineering, Goa, India, Lecture Notes in Computer Science, Springer, December 2017, vol. 10662, pp. 10-29. [ DOI : 10.1007/978-3-319-71501-8_2 ]
    https://hal.inria.fr/hal-01673296
  • 21G. Leurent, K. Bhargavan.
    On the Practical (In-)Security of 64-bit Block Ciphers, in: ESC 2017 - Early Symmetric Crypto, Canach, Luxembourg, January 2017.
    https://hal.inria.fr/hal-01105128

International Conferences with Proceedings

  • 22D. Ahman, C. Hriţcu, K. Maillard, G. Martínez, G. Plotkin, J. Protzenko, A. Rastogi, N. Swamy.
    Dijkstra Monads for Free, in: 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), Paris, France, ACM, 2017, pp. 515-529, https://arxiv.org/abs/1608.06499. [ DOI : 10.1145/3009837.3009878 ]
    https://hal.archives-ouvertes.fr/hal-01424794
  • 23D. Ahman, T. Uustalu.
    Taking Updates Seriously, in: Proceedings of the 6th International Workshop on Bidirectional Transformations co‐located with The European Joint Conferences on Theory and Practice of Software - ETAPS 2017, Uppsala, Sweden, April 2017, pp. 59–73.
    https://hal.archives-ouvertes.fr/hal-01672736
  • 25K. Bhargavan, B. Bond, A. Delignat‐Lavaud, C. Fournet, C. Hawblitzel, C. Hritcu, S. Ishtiaq, M. Kohlweiss, R. Leino, J. Lorch, K. Maillard, J. Pain, B. Parno, J. Protzenko, T. Ramananandro, A. Rane, A. Rastogi, N. Swamy, L. Thompson, P. Wang, S. Zanella‐Béguelin, J. K. Zinzindohoué.
    Everest: Towards a Verified, Drop‐in Replacement of HTTPS, in: 2nd Summit on Advances in Programming Languages (SNAPL), Asilomar, CA, United States, May 2017. [ DOI : 10.4230/LIPIcs.SNAPL.2017.1 ]
    https://hal.archives-ouvertes.fr/hal-01672707
  • 26K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, J. Pan, J. Protzenko, A. Rastogi, N. Swamy, S. Zanella-Béguelin, J. K. Zinzindohoué.
    Implementing and Proving the TLS 1.3 Record Layer, in: SP 2017 - 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 463-482. [ DOI : 10.1109/SP.2017.58 ]
    https://hal.inria.fr/hal-01674096
  • 27B. Blanchet.
    Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols, in: 30th IEEE Computer Security Foundations Symposium, Santa Barbara, United States, August 2017, pp. 68-82. [ DOI : 10.1109/CSF.2017.7 ]
    https://hal.inria.fr/hal-01575861
  • 28K. Cairns, H. Halpin, G. Steel.
    Security Analysis of the W3C Web Cryptography API, in: Proceedings of Security Standardisation Research (SSR), Gaithersberg, United States, Lecture Notes in Computer Science (LNCS), Springer, December 2017, vol. 10074, pp. 112 - 140. [ DOI : 10.1007/978-3-319-49100-4_5 ]
    https://hal.inria.fr/hal-01426852
  • 29N. Grimm, K. Maillard, C. Fournet, C. Hriţcu, M. Maffei, J. Protzenko, T. Ramananandro, A. Rastogi, N. Swamy, S. Zanella‐Béguelin.
    A Monadic Framework for Relational Verification: Applied to Information Security, Program Equivalence, and Optimizations, in: 7th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP), Los Angeles, United States, ACM, January 2018, pp. 130–145, https://arxiv.org/abs/1703.00055. [ DOI : 10.1145/3167090 ]
    https://hal.archives-ouvertes.fr/hal-01672703
  • 30H. Halpin.
    A Roadmap for High Assurance Cryptography, in: FPS 2017 - 10th International Symposium on Foundations & Practice of Security, Nancy, France, October 2017, pp. 1-9.
    https://hal.inria.fr/hal-01673294
  • 31H. Halpin.
    NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging, in: ARES 2017 - 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, ACM, August 2017, pp. 1-10. [ DOI : 10.1145/3098954.3104056 ]
    https://hal.inria.fr/hal-01673292
  • 32H. Halpin.
    Semantic Insecurity: Security and the Semantic Web, in: Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2017), Vienna, Austria, October 2017.
    https://hal.inria.fr/hal-01673291
  • 33N. Kobeissi, K. Bhargavan, B. Blanchet.
    Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: 2nd IEEE European Symposium on Security and Privacy, Paris, France, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]
    https://hal.inria.fr/hal-01575923
  • 34N. Kobeissi, K. Bhargavan, B. Blanchet.
    Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: EuroS&P 2017 - 2nd IEEE European Symposium on Security and Privacy, Paris, France, A. Sabelfeld, M. Smith (editors), IEEE, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]
    https://hal.inria.fr/hal-01583009
  • 35L. Lampropoulos, D. Gallois-Wong, C. Hriţcu, J. Hughes, B. C. Pierce, L.-Y. Xia.
    Beginner's Luck: A Language for Random Generators, in: 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), Paris, France, ACM, 2017, pp. 114-129, https://arxiv.org/abs/1607.05443. [ DOI : 10.1145/3009837.3009868 ]
    https://hal.archives-ouvertes.fr/hal-01424793
  • 36J.-K. Zinzindohoué, K. Bhargavan, J. Protzenko, B. Beurdouche.
    HACL * : A Verified Modern Cryptographic Library, in: ACM Conference on Computer and Communications Security (CCS), Dallas, United States, October 2017.
    https://hal.inria.fr/hal-01588421

Internal Reports

  • 37K. Bhargavan, B. Blanchet, N. Kobeissi.
    Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, Inria Paris, May 2017, no RR-9040, 51 p.
    https://hal.inria.fr/hal-01528752
  • 38B. Blanchet.
    Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols, Inria Paris, May 2017, no RR-9072, 40 p.
    https://hal.inria.fr/hal-01527671

Other Publications

  • 39K. Bhargavan, I. Boureanu, C. Onete, P.-A. Fouque, B. Richard.
    Content delivery over TLS: a cryptographic analysis of keyless SSL, IEEE, April 2017, pp. 600-615, EuroS&P 2017 - 2nd IEEE European Symposium on Security and Privacy. [ DOI : 10.1109/EuroSP.2017.52 ]
    https://hal.inria.fr/hal-01673853
  • 40H. Halpin, M. Piekarska.
    Introduction to Security and Privacy on the Blockchain, April 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&P Workshops 2017).
    https://hal.inria.fr/hal-01673293
References in notes
  • 41ARINC SPECIFICATION 823P1: DATALINK SECURITY, PART 1 – ACARS MESSAGE SECURITY, December 2007.
  • 42ICAO Doc 9880: Manual on Detailed Technical Specifications for the Aeronautical Telecommunication Network (ATN) using ISO/OSI Standards and Protocols, Part IV B — Security Services, Third edition (Proposed Draft), May 2017.
  • 43M. Abadi, B. Blanchet.
    Analyzing Security Protocols with Secrecy Types and Logic Programs, in: Journal of the ACM, January 2005, vol. 52, no 1, pp. 102–146.
  • 44M. Abadi, B. Blanchet, C. Fournet.
    Just Fast Keying in the Pi Calculus, in: ACM Transactions on Information and System Security (TISSEC), July 2007, vol. 10, no 3, pp. 1–59.
  • 45M. Abadi, C. Fournet.
    Mobile Values, New Names, and Secure Communication, in: 28th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01), London, United Kingdom, ACM Press, January 2001, pp. 104–115.
  • 46J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, S. Maffeis.
    Refinement types for secure implementations, in: ACM Trans. Program. Lang. Syst., 2011, vol. 33, no 2, 8 p.
  • 47K. Bhargavan, A. Delignat-Lavaud, S. Maffeis.
    Language-Based Defenses Against Untrusted Browser Origins, in: Proceedings of the 22th USENIX Security Symposium, 2013.
  • 48K. Bhargavan, C. Fournet, R. Corin, E. Zalinescu.
    Verified Cryptographic Implementations for TLS, in: ACM Transactions Inf. Syst. Secur., March 2012, vol. 15, no 1, 3:1 p.
  • 49K. Bhargavan, C. Fournet, A. D. Gordon.
    Modular Verification of Security Protocol Code by Typing, in: ACM Symposium on Principles of Programming Languages (POPL'10), 2010, pp. 445–456.
  • 50K. Bhargavan, C. Fournet, A. D. Gordon, N. Swamy.
    Verified Implementations of the Information Card Federated Identity-Management Protocol, in: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), ACM Press, 2008, pp. 123–135.
  • 51B. Blanchet, M. Abadi, C. Fournet.
    Automated Verification of Selected Equivalences for Security Protocols, in: Journal of Logic and Algebraic Programming, February–March 2008, vol. 75, no 1, pp. 3–51.
  • 52B. Blanchet.
    An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW'01), 2001, pp. 82–96.
  • 53B. Blanchet.
    Automatic Verification of Correspondences for Security Protocols, in: Journal of Computer Security, July 2009, vol. 17, no 4, pp. 363–434.
  • 54B. Blanchet, A. Podelski.
    Verification of Cryptographic Protocols: Tagging Enforces Termination, in: Theoretical Computer Science, March 2005, vol. 333, no 1-2, pp. 67–90, Special issue FoSSaCS'03.
  • 55J. Clulow.
    On the Security of PKCS#11, in: CHES, 2003, pp. 411-425.
  • 56S. Delaune, S. Kremer, G. Steel.
    Formal Analysis of PKCS#11 and Proprietary Extensions, in: Journal of Computer Security, November 2010, vol. 18, no 6, pp. 1211-1245.
  • 57D. Dolev, A. Yao.
    On the security of public key protocols, in: IEEE Transactions on Information Theory, 1983, vol. IT–29, no 2, pp. 198–208.
  • 58C. Fournet, M. Kohlweiss, P.-Y. Strub.
    Modular Code-Based Cryptographic Verification, in: ACM Conference on Computer and Communications Security, 2011.
  • 59R. Needham, M. Schroeder.
    Using encryption for authentication in large networks of computers, in: Communications of the ACM, 1978, vol. 21, no 12, pp. 993–999.
  • 60N. Swamy, J. Chen, C. Fournet, P.-Y. Strub, K. Bhargavan, J. Yang.
    Secure distributed programming with value-dependent types, in: 16th ACM SIGPLAN international conference on Functional Programming, 2011, pp. 266-278.
  • 61N. Swamy, C. Fournet, A. Rastogi, K. Bhargavan, J. Chen, P.-Y. Strub, G. M. Bierman.
    Gradual typing embedded securely in JavaScript, in: 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2014, pp. 425-438.
  • 62N. Swamy, C. Hriţcu, C. Keller, A. Rastogi, A. Delignat-Lavaud, S. Forest, K. Bhargavan, C. Fournet, P.-Y. Strub, M. Kohlweiss, J.-K. Zinzindohoue, S. Zanella-Béguelin.
    Dependent Types and Multi-Monadic Effects in F*, in: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), Unknown, United States, ACM, 2016, pp. 256-270.
    https://hal.archives-ouvertes.fr/hal-01265793