Bibliography
Major publications by the team in recent years
-
1W. Belkhir, Y. Chevalier, M. Rusinowitch.
Parametrized automata simulation and application to service composition, in: J. Symb. Comput., 2015, vol. 69, pp. 40–60. -
2D. Bernhard, V. Cortier, D. Galindo, O. Pereira, B. Warinschi.
A comprehensive analysis of game-based ballot privacy definitions, in: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P'15), IEEE Computer Society Press, May 2015, pp. 499–516. -
3R. Chadha, S. Ciobaca, S. Kremer.
Automated Verification of Equivalence Properties of Cryptographic Protocols, in: Programming Languages and Systems - 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings, H. Seidl (editor), Lecture Notes in Computer Science, Springer, 2012, vol. 7211, pp. 108–127. -
4P. Chocron, P. Fontaine, C. Ringeissen.
A Polite Non-Disjoint Combination Method: Theories with Bridging Functions Revisited, in: Proceedings of the 25th International Conference on Automated Deduction (CADE-25), Lecture Notes in Computer Science, Springer, August 2015, vol. 9195, pp. 419-433.
https://hal.inria.fr/hal-01157898 -
5R. Chretien, V. Cortier, S. Delaune.
Typing messages for free in security protocols: the case of equivalence properties, in: Proceedings of the 25th International Conference on Concurrency Theory (CONCUR'14), Rome, Italy, Lecture Notes in Computer Science, Springer, September 2014, vol. 8704, pp. 372-386. -
6S. Kremer, R. Künnemann.
Automated Analysis of Security Protocols with Global State, in: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, IEEE Computer Society, 2014, pp. 163–178. -
7H. H. Nguyen, A. Imine, M. Rusinowitch.
Anonymizing Social Graphs via Uncertainty Semantics, in: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (ASIA CCS'15), 2015, ACM, 2015, pp. 495–506.
Doctoral Dissertations and Habilitation Theses
-
8R. Chretien.
Automated analysis of equivalence properties for cryptographic protocols, Université Paris-Saclay, January 2016.
https://tel.archives-ouvertes.fr/tel-01277205 -
9H.-H. Nguyen.
Social Graph Anonymization, Universite de Lorraine, November 2016.
https://hal.inria.fr/tel-01403474
Articles in International Peer-Reviewed Journals
-
10T. Abbes, A. Bouhoula, M. Rusinowitch.
Detection of firewall configuration errors with updatable tree, in: International Journal of Information Security, June 2016, vol. 15, no 3, pp. 301-317. [ DOI : 10.1007/s10207-015-0290-0 ]
https://hal.inria.fr/hal-01320646 -
11T. Avanesov, Y. Chevalier, M. Rusinowitch, M. Turuani.
Intruder deducibility constraints with negation. Decidability and application to secured service compositions, in: Journal of Symbolic Computation, 2017, vol. 80, pp. 4 - 26. [ DOI : 10.1016/j.jsc.2016.07.008 ]
https://hal.inria.fr/hal-01405851 -
12T. Avanesov, Y. Chevalier, M. Rusinowitch, M. Turuani.
Satisfiability of General Intruder Constraints with and without a Set Constructor, in: Journal of Symbolic Computation, 2017, vol. 80, pp. 27-61. [ DOI : 10.1016/j.jsc.2016.07.009 ]
https://hal.inria.fr/hal-01405842 -
13X. Bultel, J. Dreier, P. Lafourcade, M. More.
How to Explain Modern Security Concepts to your Children, in: Cryptologia, November 2016.
https://hal.archives-ouvertes.fr/hal-01397035 -
14R. Chadha, V. Cheval, Ş. C. Ciobâcǎ, S. Kremer.
Automated verification of equivalence properties of cryptographic protocols, in: ACM Transactions on Computational Logic, 2016, vol. 17, no 4. [ DOI : 10.1145/2926715 ]
https://hal.inria.fr/hal-01306561 -
15S. Kremer, R. Künnemann.
Automated Analysis of Security Protocols with Global State, in: Journal of Computer Security, 2016, vol. 24, no 5. [ DOI : 10.3233/JCS-160556 ]
https://hal.inria.fr/hal-01351388 -
16H. Nguyen, A. Imine, M. Rusinowitch.
Network Structure Release under Differential Privacy, in: Transactions on Data Privacy, December 2016, vol. 9, no 3, 26 p.
https://hal.inria.fr/hal-01424911 -
17J. Yu, V. Cheval, M. Ryan.
DTKI: A New Formalized PKI with Verifiable Trusted Parties, in: The Computer Journal, 2016, vol. 59, pp. 1695-1713. [ DOI : 10.1093/comjnl/bxw039 ]
https://hal.archives-ouvertes.fr/hal-01403899
International Conferences with Proceedings
-
18Y. Abid, A. Imine, A. Napoli, C. Raïssi, M. Rusinowitch.
Online link disclosure strategies for social networks, in: The 11th International Conference on Risks and Security of Internet and Systems, Roscoff, France, The 11th International Conference on Risks and Security of Internet and Systems, September 2016.
https://hal.inria.fr/hal-01402062 -
19M. Arapinis, V. Cortier, S. Kremer.
When are three voters enough for privacy properties?, in: 21st European Symposium on Research in Computer Security, Heraklion, Crete, Greece, 21st European Symposium on Research in Computer Security, Springer, 2016.
https://hal.inria.fr/hal-01351398 -
20M. Backes, J. Dreier, S. Kremer, R. Künnemann.
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange, in: 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Paris, France, Proceedings of the 2nd IEEE European Symposium on Security and Privacy, Springer, 2017.
https://hal.inria.fr/hal-01396282 -
21R. Berthon, C. Ringeissen.
Satisfiability Modulo Free Data Structures Combined with Bridging Functions, in: 14th International Workshop on Satisfiability Modulo Theories, affiliated with IJCAR 2016, Coimbra, Portugal, T. King, R. Piskac (editors), CEUR Workshop Proceedings, CEUR-WS.org, July 2016, no 1617, pp. 71–80.
https://hal.inria.fr/hal-01389228 -
22X. Bultel, J. Dreier, J.-G. Dumas, P. Lafourcade.
Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen, in: FUN with algorithms 2016, La Maddalena, Italy, E. Demaine, F. Grandoni (editors), FUN with algorithms 2016, June 2016.
https://hal.archives-ouvertes.fr/hal-01326059 -
23P. Chaidos, V. Cortier, G. Fuchsbauer, D. Galindo.
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme, in: 23rd ACM Conference on Computer and Communications Security (CCS'16), Vienna, Austria, October 2016. [ DOI : 10.1145/2976749.2978337 ]
https://hal.inria.fr/hal-01377917 -
25V. Cortier, A. Filipiak, S. Gharout, J. Traoré.
Designing and proving an EMV-compliant payment protocol for mobile devices, in: 2nd IEEE European Symposium on Security and Privacy (EuroSP'17), Paris, France, April 2017.
https://hal.inria.fr/hal-01408584 -
26V. Cortier, D. Galindo, R. Kuesters, J. Mueller, T. Truderung.
SoK: Verifiability Notions for E-Voting Protocols, in: 36th IEEE Symposium on Security and Privacy (S&P'16), San Jose, United States, May 2016.
https://hal.inria.fr/hal-01280445 -
27C. Jacomme, S. Kremer, G. Scerri.
Symbolic Models for Isolated Execution Environments, in: 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17), Paris, France, Proceedings of the 2nd IEEE European Symposium on Security and Privacy, Springer, 2017.
https://hal.inria.fr/hal-01396291 -
28S. Kremer, P. Rønne.
To Du or not to Du: A Security Analysis of Du-Vote, in: IEEE European Symposium on Security and Privacy 2016, Saarbrucken, Germany, Proceedings of the IEEE European Symposium on Security and Privacy 2016, IEEE Computer Society, March 2016.
https://hal.inria.fr/hal-01238894 -
29H. H. Nguyen, A. Imine, M. Rusinowitch.
Detecting Communities under Differential Privacy, in: Workshop on Privacy in the Electronic Society - WPES 206, Vienna, Austria, October 2016, pp. 83 - 93.
https://hal.inria.fr/hal-01393266
Conferences without Proceedings
-
30M. Turuani, T. Voegtlin, M. Rusinowitch.
Automated Verification of Electrum Wallet, in: 3rd Workshop on Bitcoin and Blockchain Research, Christ Church, Barbados, February 2016.
https://hal.inria.fr/hal-01256397
Books or Proceedings Editing
-
31R. Verma, M. Rusinowitch (editors)
International Workshop on Security And Privacy Analytics, IWSPA '16: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, ACM, New Orleans, United States, 2016.
https://hal.inria.fr/hal-01408625
-
32M. Arapinis, V. Cortier, S. Kremer, M. Ryan.
Practical Everlasting Privacy, in: Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, D. Basin, J. Mitchell (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 7796, pp. 21–40. -
33M. Arapinis, L. Mancini, E. Ritter, M. Ryan, N. Golde, K. Redon, R. Borgaonkar.
New privacy issues in mobile telephony: fix and verification, in: Proc. 19th ACM Conference on Computer and Communications Security (CCS'12), ACM Press, 2012, pp. 205-216. -
34B. Blanchet.
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: Proc. 14th Computer Security Foundations Workshop (CSFW'01), IEEE Comp. Soc. Press, 2001, pp. 82–96. -
35M. Bortolozzo, M. Centenaro, R. Focardi, G. Steel.
Attacking and Fixing PKCS#11 Security Tokens, in: Proc. 17th ACM Conference on Computer and Communications Security (CCS'10), ACM Press, 2010, pp. 260-269. -
36C. Chevalier, S. Delaune, S. Kremer, M. Ryan.
Composition of Password-based Protocols, in: Formal Methods in System Design, 2013, vol. 43, pp. 369-413. -
37Y. Chevalier, L. Vigneron.
Strategy for Verifying Security Protocols with Unbounded Message Size, in: Journal of Automated Software Engineering, April 2004, vol. 11, no 2, pp. 141-166. -
38H. Comon-Lundh, S. Delaune.
The finite variant property: How to get rid of some algebraic properties, in: Proc. of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), LNCS, Springer, 2005, vol. 3467, pp. 294-307. -
39V. Cortier, S. Delaune.
Safely Composing Security Protocols, in: Formal Methods in System Design, February 2009, vol. 34, no 1, pp. 1-36. -
40S. Delaune, S. Kremer, M. Ryan.
Verifying Privacy-type Properties of Electronic Voting Protocols, in: Journal of Computer Security, July 2009, vol. 17, no 4, pp. 435-487. -
41S. Delaune, S. Kremer, G. Steel.
Formal Analysis of PKCS#11 and Proprietary Extensions, in: Journal of Computer Security, November 2010, vol. 18, no 6, pp. 1211-1245. -
42S. Erbatur, D. Kapur, A. M. Marshall, C. Meadows, P. Narendran, C. Ringeissen.
On Asymmetric Unification and the Combination Problem in Disjoint Theories, in: Proc. 17th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'14), LNCS, Springer, 2014, pp. 274-288. -
43S. Escobar, C. Meadows, J. Meseguer.
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, in: Foundations of Security Analysis and Design V, LNCS, Springer, 2009, vol. 5705, pp. 1-50. -
44D. Gollmann.
What do we mean by entity authentication?, in: Proc. Symposium on Security and Privacy (SP'96), IEEE Comp. Soc. Press, 1996, pp. 46–54. -
45G. Grewal, M. Ryan, L. Chen, M. Clarkson.
Du-Vote: Remote Voting with Untrusted Computers, in: Proc. 28th IEEE Computer Security Foundations Symposium (CSF'11), IEEE Computer Society Press, 2015. -
46J. Herzog.
Applying protocol analysis to security device interfaces, in: IEEE Security & Privacy Magazine, July-Aug 2006, vol. 4, no 4, pp. 84–87. -
47B. Schmidt, S. Meier, C. Cremers, D. Basin.
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, in: Proc. 25th International Conference on Computer Aided Verification (CAV'13), LNCS, Springer, 2013, vol. 8044, pp. 696-701. -
48V. Sofronie-Stokkermans.
Locality Results for Certain Extensions of Theories with Bridging Functions, in: Automated Deduction - CADE-22, 22nd International Conference on Automated Deduction, Montreal, Canada, August 2-7, 2009. Proceedings, R. A. Schmidt (editor), Lecture Notes in Computer Science, Springer, 2009, vol. 5663, pp. 67–83.