Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
  • 1W. Belkhir, Y. Chevalier, M. Rusinowitch.
    Parametrized automata simulation and application to service composition, in: J. Symb. Comput., 2015, vol. 69, pp. 40–60.
  • 2D. Bernhard, V. Cortier, D. Galindo, O. Pereira, B. Warinschi.
    A comprehensive analysis of game-based ballot privacy definitions, in: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P'15), IEEE Computer Society Press, May 2015, pp. 499–516.
  • 3R. Chadha, V. Cheval, S. Ciobâcǎ, S. Kremer.
    Automated verification of equivalence properties of cryptographic protocols, in: ACM Transactions on Computational Logic, 2016, vol. 17, no 4. [ DOI : 10.1145/2926715 ]
    https://hal.inria.fr/hal-01306561
  • 4P. Chocron, P. Fontaine, C. Ringeissen.
    A Polite Non-Disjoint Combination Method: Theories with Bridging Functions Revisited, in: Proceedings of the 25th International Conference on Automated Deduction (CADE-25), Lecture Notes in Computer Science, Springer, August 2015, vol. 9195, pp. 419-433.
    https://hal.inria.fr/hal-01157898
  • 5R. Chrétien, V. Cortier, S. Delaune.
    Typing messages for free in security protocols: the case of equivalence properties, in: Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), Rome, Italy, Lecture Notes in Computer Science, Springer, September 2014, vol. 8704, pp. 372-386.
  • 6S. Kremer, R. Künnemann.
    Automated Analysis of Security Protocols with Global State, in: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, IEEE Computer Society, 2014, pp. 163–178.
  • 7H. H. Nguyen, A. Imine, M. Rusinowitch.
    Anonymizing Social Graphs via Uncertainty Semantics, in: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (ASIA CCS'15), 2015, ACM, 2015, pp. 495–506.
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

  • 12J. Dreier, M. Puys, M.-L. Potet, P. Lafourcade, J.-L. Roch.
    Formally and Practically Verifying Flow Integrity Properties in Industrial Systems, in: Computers and Security, December 2018. [ DOI : 10.1016/j.cose.2018.09.018 ]
    https://hal.archives-ouvertes.fr/hal-01959766

International Conferences with Proceedings

  • 13D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse, V. Stettler.
    A Formal Analysis of 5G Authentication, in: ACM CCS 2018 - 25th ACM Conference on Computer and Communications Security, Toronto, Canada, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, ACM Press, October 2018, vol. 14. [ DOI : 10.1145/3243734.3243846 ]
    https://hal.archives-ouvertes.fr/hal-01898050
  • 14X. Bultel, J. Dreier, J.-G. Dumas, P. Lafourcade.
    A Cryptographer's Conspiracy Santa, in: FUN 2018 - 9th International Conference on Fun with Algorithms, La Maddalena, Italy, 9th International Conference on Fun with Algorithms, FUN 2018, June 13-15, 2018, La Maddalena, Italy, June 2018, pp. 13:1–13:13. [ DOI : 10.4230/LIPIcs.FUN.2018.13 ]
    https://hal.archives-ouvertes.fr/hal-01777997
  • 15X. Bultel, J. Dreier, J.-G. Dumas, P. Lafourcade, D. Miyahara, T. Mizuki, A. Nagao, T. Sasaki, K. Shinagawa, H. Sone.
    Physical Zero-Knowledge Proof for Makaro, in: SSS 2018 - 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Tokyo, Japan, Stabilization, Safety, and Security of Distributed Systems - 20th International Symposium, SSS 2018, Tokyo, Japan, November 4-7, 2018, Proceedings, November 2018.
    https://hal.archives-ouvertes.fr/hal-01898048
  • 16X. Bultel, J. Dreier, M. Giraud, M. Izaute, T. Kheyrkhah, P. Lafourcade, D. Lakhzoum, V. Marlin, L. Motá.
    Security Analysis and Psychological Study of Authentication Methods with PIN Codes, in: RCIS 2018 - IEEE 12th International Conference on Research Challenges in Information Science, Nantes, France, 12th International Conference on Research Challenges in Information Science, RCIS 2018, Nantes, France, May 29-31, 2018, May 2018, pp. 1–11.
    https://hal.archives-ouvertes.fr/hal-01777898
  • 17V. Cheval, V. Cortier, M. Turuani.
    A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif, in: CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Oxford, United Kingdom, July 2018.
    https://hal.inria.fr/hal-01900088
  • 19V. Cheval, S. Kremer, I. Rakotonirina.
    The DEEPSEC prover, in: CAV 2018 - 30th International Conference on Computer Aided Verification, Oxford, United Kingdom, July 2018.
    https://hal.inria.fr/hal-01763138
  • 20V. Cortier, A. Dallon, S. Delaune.
    Efficiently deciding equivalence for standard primitives and phases, in: ESORICS 2018 - 23rd European Symposium on Research in Computer Security, Barcelona, Spain, September 2018.
    https://hal.inria.fr/hal-01900083
  • 21V. Cortier, C. C. Dragan, F. Dupressoir, B. Warinschi.
    Machine-checked proofs for electronic voting: privacy and verifiability for Belenios, in: CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Oxford, United Kingdom, July 2018.
    https://hal.inria.fr/hal-01900081
  • 22V. Cortier, D. Galindo, M. Turuani.
    A formal analysis of the Neuchâtel e-voting protocol, in: EuroS&P 2018 - 3rd IEEE European Symposium on Security and Privacy, Londres, United Kingdom, April 2018.
    https://hal.inria.fr/hal-01647150
  • 23V. Cortier, N. Grimm, J. Lallemand, M. Maffei.
    Equivalence Properties by Typing in Cryptographic Branching Protocols, in: POST'18 - 7th International Conference on Principles of Security and Trust, Thessaloniki, Greece, April 2018.
    https://hal.inria.fr/hal-01900079
  • 24V. Cortier, J. Lallemand.
    Voting: You Can’t Have Privacy without Individual Verifiability, in: ACM CCS 2018 - 25th ACM Conference on Computer and Communications Security, Toronto, Canada, October 2018. [ DOI : 10.1145/3243734.3243762 ]
    https://hal.inria.fr/hal-01900086
  • 25S. J. De, A. Imine.
    Enabling Users to Balance Social Benefit and Privacy in Online Social Networks, in: PST 2018 - The Sixteen International Conference on Privacy, Security and Trust, Belfast, United Kingdom, IEEE, August 2018, pp. 1–10.
    https://hal.archives-ouvertes.fr/hal-01938881
  • 26S. J. De, A. Imine.
    On Consent in Online Social Networks: Privacy Impacts and Research Directions, in: CRISIS 2018 - The 13th International Conference on Risks and Security of Internet and Systems, Arcachon, France, October 2018, forthcoming.
    https://hal.archives-ouvertes.fr/hal-01938889
  • 27S. J. De, A. Imine.
    To Reveal or Not To Reveal: Balancing User-Centric Social Benefit and Privacy in Online Social Networks, in: SAC 2018 - The 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018, Pau, France, April 09-13, 2018, ACM, April 2018, pp. 1157–1164.
    https://hal.archives-ouvertes.fr/hal-01938876
  • 28S. J. De, D. Le Métayer.
    Privacy Risk Analysis to Enable Informed Privacy Settings, in: IWPE 2018 – 4th IEEE International Workshop on Privacy Engineering, London, United Kingdom, Proceedings of the 4th IEEE International Workshop on Privacy Engineering (IWPE 2018), April 2018, pp. 1-8.
    https://hal.archives-ouvertes.fr/hal-01939845
  • 29J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse.
    Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR, in: CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Oxford, United Kingdom, 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018, July 2018.
    https://hal.archives-ouvertes.fr/hal-01780603
  • 30C. Jacomme, S. Kremer.
    An extensive formal analysis of multi-factor authentication protocols, in: CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Oxford, United Kingdom, IEEE, July 2018. [ DOI : 10.1109/CSF.2018.00008 ]
    https://hal.inria.fr/hal-01922022

Conferences without Proceedings

  • 31Y. Abid, A. Imine, M. Rusinowitch.
    Online Testing of User Profile Resilience Against Inference Attacks in Social Networks, in: ADBIS 2018 - First International Workshop on Advances on Big Data Management, Analytics, Data Privacy and Security, BigDataMAPS 2018, Budapest, Hungary, September 2018.
    https://hal.archives-ouvertes.fr/hal-01939277
  • 32Y. Abid, A. Imine, M. Rusinowitch.
    Sensitive attribute prediction for social networks users, in: DARLI-AP 2018 - 2nd International workshop on Data Analytics solutions for Real-LIfe APplications, Vienne, Austria, March 2018.
    https://hal.archives-ouvertes.fr/hal-01939283
  • 33S. Erbatur, A. M. Marshall, C. Ringeissen.
    Knowledge Problems in Equational Extensions of Subterm Convergent Theories, in: UNIF 2018 - 32nd International Workshop on Unification, Oxford, United Kingdom, Mauricio Ayala-Rincon and Philippe Balbiani, July 2018, UNIF 2018 was affiliated with the Third International Conference on Formal Structures for Computation and Deduction FSCD 2018, part of the Federated Logic Conference FLoC 2018.
    https://hal.inria.fr/hal-01878567

Books or Proceedings Editing

  • 34A. Imine, J. M. Fernandez, J.-Y. Marion, L. Logrippo, J. Garcia-Alfaro (editors)
    Foundations and Practice of Security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, revised selected papers, FPS: International Symposium on Foundations and Practice of Security, Springer, Nancy, France, 2018, vol. 10723, 319 p. [ DOI : 10.1007/978-3-319-75650-9 ]
    https://hal.archives-ouvertes.fr/hal-01869014

Internal Reports

  • 35V. Cheval, V. Cortier, M. Turuani.
    A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif, Inria Nancy - Grand Est ; LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy, April 2018.
    https://hal.inria.fr/hal-01774803
  • 36V. Cheval, S. Kremer, I. Rakotonirina.
    DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice, Inria Nancy, May 2018.
    https://hal.inria.fr/hal-01698177
  • 37R. Chrétien, V. Cortier, A. Dallon, S. Delaune.
    Typing messages for free in security protocols, LSV, ENS Cachan, CNRS, Inria, Université Paris-Saclay, Cachan (France), March 2018, pp. 1-49.
    https://hal.archives-ouvertes.fr/hal-01741172
  • 38V. Cortier, N. Grimm, J. Lallemand, M. Maffei.
    Equivalence Properties by Typing in Cryptographic Branching Protocols, Université de Lorraine, CNRS, Inria, LORIA ; TU Wien, February 2018.
    https://hal.archives-ouvertes.fr/hal-01715957
  • 39V. Cortier, J. Lallemand.
    Voting: You Can't Have Privacy without Individual Verifiability, CNRS, Inria, LORIA, August 2018.
    https://hal.inria.fr/hal-01858034
  • 40S. J. De, A. Imine.
    On Consent in Online Social Networks: Privacy Impacts and Research Directions, Inria Nancy - Grand Est, July 2018, no RR-9197.
    https://hal.inria.fr/hal-01851759
  • 41J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse.
    Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR (Extended Version), LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy ; ETH Zurich, Switzerland ; University of Dundee, April 2018.
    https://hal.archives-ouvertes.fr/hal-01780544

Scientific Popularization

Other Publications

References in notes
  • 44M. Arapinis, L. Mancini, E. Ritter, M. Ryan, N. Golde, K. Redon, R. Borgaonkar.
    New privacy issues in mobile telephony: fix and verification, in: Proc. 19th ACM Conference on Computer and Communications Security (CCS'12), ACM Press, 2012, pp. 205-216.
  • 45G. Barthe, F. Dupressoir, B. Grégoire, C. Kunz, B. Schmidt, P. Strub.
    EasyCrypt: A Tutorial, in: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, A. Aldini, J. López, F. Martinelli (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 8604, pp. 146–166.
  • 46B. Blanchet.
    An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: Proc. 14th Computer Security Foundations Workshop (CSFW'01), IEEE Comp. Soc. Press, 2001, pp. 82–96.
  • 47B. Blanchet.
    Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, in: Foundations and Trends in Privacy and Security, 2016, vol. 1, no 1-2, pp. 1–135.
  • 48M. Bortolozzo, M. Centenaro, R. Focardi, G. Steel.
    Attacking and Fixing PKCS#11 Security Tokens, in: Proc. 17th ACM Conference on Computer and Communications Security (CCS'10), ACM Press, 2010, pp. 260-269.
  • 49C. Chevalier, S. Delaune, S. Kremer, M. Ryan.
    Composition of Password-based Protocols, in: Formal Methods in System Design, 2013, vol. 43, pp. 369-413.
  • 50H. Comon-Lundh, S. Delaune.
    The finite variant property: How to get rid of some algebraic properties, in: Proc. of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), LNCS, Springer, 2005, vol. 3467, pp. 294-307.
  • 51V. Cortier, S. Delaune.
    Safely Composing Security Protocols, in: Formal Methods in System Design, February 2009, vol. 34, no 1, pp. 1-36.
  • 52S. Delaune, S. Kremer, M. Ryan.
    Verifying Privacy-type Properties of Electronic Voting Protocols, in: Journal of Computer Security, July 2009, vol. 17, no 4, pp. 435-487.
  • 53S. Delaune, S. Kremer, G. Steel.
    Formal Analysis of PKCS#11 and Proprietary Extensions, in: Journal of Computer Security, November 2010, vol. 18, no 6, pp. 1211-1245.
  • 54S. Erbatur, D. Kapur, A. M. Marshall, C. Meadows, P. Narendran, C. Ringeissen.
    On Asymmetric Unification and the Combination Problem in Disjoint Theories, in: Proc. 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), LNCS, Springer, 2014, pp. 274-288.
  • 55S. Escobar, C. Meadows, J. Meseguer.
    Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, in: Foundations of Security Analysis and Design V, LNCS, Springer, 2009, vol. 5705, pp. 1-50.
  • 56D. Gollmann.
    What do we mean by entity authentication?, in: Proc. Symposium on Security and Privacy (SP'96), IEEE Comp. Soc. Press, 1996, pp. 46–54.
  • 57J. Herzog.
    Applying protocol analysis to security device interfaces, in: IEEE Security & Privacy Magazine, July-Aug 2006, vol. 4, no 4, pp. 84–87.
  • 58B. Schmidt, S. Meier, C. Cremers, D. Basin.
    The TAMARIN Prover for the Symbolic Analysis of Security Protocols, in: Proc. 25th International Conference on Computer Aided Verification (CAV'13), LNCS, Springer, 2013, vol. 8044, pp. 696-701.