Major publications by the team in recent years
  • 1M. Baudet, V. Cortier, S. Kremer.

    Computationally Sound Implementations of Equational Theories against Passive Adversaries, in: Information and Computation, April 2009, vol. 207, no 4, pp. 496-520. [ DOI : 10.1016/j.ic.2008.12.005 ]

  • 2M. Bortolozzo, M. Centenaro, R. Focardi, G. Steel.

    Attacking and Fixing PKCS#11 Security Tokens, in: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10), Chicago, Illinois, USA, ACM Press, October 2010, pp. 260-269. [ DOI : 10.1145/1866307.1866337 ]

  • 3V. Cheval, H. Comon-Lundh, S. Delaune.

    Trace Equivalence Decision: Negative Tests and Non-determinism, in: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11), Chicago, Illinois, USA, ACM Press, October 2011, To appear.

  • 4H. Comon-Lundh, V. Cortier.

    Tree Automata with One Memory, Set Constraints and Cryptographic Protocols, in: Theoretical Computer Science, February 2005, vol. 331, no 1, pp. 143-214. [ DOI : 10.1016/j.tcs.2004.09.036 ]

  • 5H. Comon-Lundh, V. Cortier.

    Computational soundness of observational equivalence, in: Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08), Alexandria, Virginia, USA, ACM Press, October 2008, pp. 109-118.

  • 6S. Delaune, S. Kremer, M. D. Ryan.

    Verifying Privacy-type Properties of Electronic Voting Protocols, in: Journal of Computer Security, July 2009, vol. 17, no 4, pp. 435-487.

  • 7S. Delaune, S. Kremer, G. Steel.

    Formal Analysis of PKCS#11 and Proprietary Extensions, in: Journal of Computer Security, 2009, To appear.

  • 8J. Goubault-Larrecq.

    On Noetherian Spaces, in: Proceedings of the 22nd Annual IEEE Symposium on Logic in Computer Science (LICS'07), Wrocław, Poland, IEEE Computer Society Press, July 2007, pp. 453-462. [ DOI : 10.1109/LICS.2007.34 ]

  • 9J. Goubault-Larrecq, F. Parrennes.

    Cryptographic Protocol Analysis on Real C Code, in: Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), Paris, France, R. Cousot (editor), Lecture Notes in Computer Science, Springer, January 2005, vol. 3385, pp. 363-379. [ DOI : 10.1007/b105073 ]

  • 10J. Olivain, J. Goubault-Larrecq.

    The Orchids Intrusion Detection Tool, in: Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05), Edinburgh, Scotland, UK, K. Etessami, S. Rajamani (editors), Lecture Notes in Computer Science, Springer, July 2005, vol. 3576, pp. 286-290. [ DOI : 10.1007/11513988_28 ]

Publications of the year

Articles in International Peer-Reviewed Journals

  • 11M. Arnaud, V. Cortier, S. Delaune.

    Modeling and Verifying Ad Hoc Routing Protocols, in: Information and Computation, 2013, To appear.

  • 12M. Baudet, V. Cortier, S. Delaune.

    YAPA: A generic tool for computing intruder knowledge, in: ACM Transactions on Computational Logic, 2013, vol. 14, no 1. [ DOI : 10.1145/2422085.2422089 ]

  • 13V. Cheval, V. Cortier, S. Delaune.

    Deciding equivalence-based properties using constraint solving, in: Theoretical Computer Science, 2013, vol. 492, pp. 1-39. [ DOI : 10.1016/j.tcs.2013.04.016 ]


International Conferences with Proceedings

  • 14R. Chrétien, V. Cortier, S. Delaune.

    From security protocols to pushdown automata, in: ICALP'2013 - 40th International Colloquium on Automata, Languages and Programming - 2013, Riga, Lithuania, F. V. Fomin, R. Freivalds, M. Kwiatkowska, D. Peleg (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 7966, pp. 137-149. [ DOI : 10.1007/978-3-642-39212-2_15 ]

  • 15H. Comon-Lundh, V. Cortier, G. Scerri.

    Tractable inference systems: an extension with a deducibility predicate, in: CADE'24 - 24th International Conference on Automated Deduction - 2013, Lake Placid, United States, M. P. Bonacina (editor), Lecture Notes in Computer Science, Springer, 2013, vol. 7898, pp. 91-108. [ DOI : 10.1007/978-3-642-38574-2_6 ]


Internal Reports