EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1M. Abadi, B. Blanchet, C. Fournet.

    The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, in: Journal of the ACM (JACM), October 2017, vol. 65, no 1, pp. 1 - 103. [ DOI : 10.1145/3127586 ]

    https://hal.inria.fr/hal-01636616
  • 2C. Abate, A. Azevedo de Amorim, R. Blanco, A. N. Evans, G. Fachini, C. Hriţcu, T. Laurent, B. C. Pierce, M. Stronati, A. Tolmach.

    When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise, in: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, ACM, October 2018, pp. 1351–1368, https://arxiv.org/abs/1802.00588. [ DOI : 10.1145/3243734.3243745 ]

    https://hal.archives-ouvertes.fr/hal-01949202
  • 3K. Bhargavan, B. Blanchet, N. Kobeissi.

    Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, in: 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 483 - 502. [ DOI : 10.1109/SP.2017.26 ]

    https://hal.inria.fr/hal-01575920
  • 4K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Pironti, P.-Y. Strub.

    Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, in: IEEE Symposium on Security and Privacy (Oakland), 2014, pp. 98–113.

    https://hal.inria.fr/hal-01102259
  • 5B. Blanchet.

    Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, in: Foundations and Trends in Privacy and Security, October 2016, vol. 1, no 1–2, pp. 1–135.

    https://hal.inria.fr/hal-01423760
  • 6M. Isaakidis, H. Halpin, G. Danezis.

    UnlimitID: Privacy-Preserving Federated Identity Management Using Algebraic MACs, in: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, New York, NY, USA, WPES '16, ACM, 2016, pp. 139–142. [ DOI : 10.1145/2994620.2994637 ]

    https://hal.inria.fr/hal-01426847
  • 7N. Kobeissi, K. Bhargavan, B. Blanchet.

    Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: 2nd IEEE European Symposium on Security and Privacy, Paris, France, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]

    https://hal.inria.fr/hal-01575923
  • 8N. Swamy, C. Hriţcu, C. Keller, A. Rastogi, A. Delignat-Lavaud, S. Forest, K. Bhargavan, C. Fournet, P.-Y. Strub, M. Kohlweiss, J. K. Zinzindohoué, S. Zanella-Béguelin.

    Dependent Types and Multi-Monadic Effects in F*, in: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), ACM, January 2016, pp. 256-270.

    https://hal.inria.fr/hal-01265793
  • 9J. K. Zinzindohoué, K. Bhargavan, J. Protzenko, B. Beurdouche.

    HACL*: A Verified Modern Cryptographic Library, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 1789–1806.

    https://hal.inria.fr/hal-01588421
Publications of the year

Doctoral Dissertations and Habilitation Theses

Articles in International Peer-Reviewed Journals

International Conferences with Proceedings

  • 18R. Blanco, D. Miller, A. Momigliano.

    Property-Based Testing via Proof Reconstruction, in: PPDP 2019 - 21st International Symposium on Principles and Practice of Programming Languages, Porto, Portugal, ACM Press, October 2019, pp. 1-13. [ DOI : 10.1145/3354166.3354170 ]

    https://hal.inria.fr/hal-02368931
  • 19R. Cruz, É. Tanter.

    Polymorphic Relaxed Noninterference, in: SecDev 2019 : IEEE Secure Development Conference, McLean, VA, United States, IEEE, 2019, pp. 101-113. [ DOI : 10.1109/SecDev.2019.00021 ]

    https://hal.archives-ouvertes.fr/hal-02399576
  • 20T. Díaz, F. Olmedo, É. Tanter.

    A Mechanized Formalization of GraphQL, in: CPP 2020 - 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, New Orleans, United States, January 2020. [ DOI : 10.1145/3372885.3373822 ]

    https://hal.archives-ouvertes.fr/hal-02422532
  • 21N. Kobeissi, G. Nicolas, K. Bhargavan.

    Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols, in: EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, June 2019.

    https://hal.inria.fr/hal-01948964
  • 22B. Lipp, B. Blanchet, K. Bhargavan.

    A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol, in: 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, IEEE Computer Society, June 2019, pp. 231-246.

    https://hal.inria.fr/hal-02396640
  • 23G. Martínez, D. Ahman, V. Dumitrescu, N. Giannarakis, C. Hawblitzel, C. Hriţcu, M. Narasimhamurthy, Z. Paraskevopoulou, C. Pit-Claudel, J. Protzenko, T. Ramananandro, A. Rastogi, N. Swamy.

    Meta-F*: Proof automation with SMT, Tactics, and Metaprograms, in: ESOP'19 - European Symposium on Programming, Prague, Czech Republic, April 2019, https://arxiv.org/abs/1803.06547.

    https://hal.archives-ouvertes.fr/hal-01995376
  • 24J. Protzenko, B. Beurdouche, D. Merigoux, K. Bhargavan.

    Formally Verified Cryptographic Web Applications in WebAssembly, in: SP 2019 - 40th IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2019, pp. 1256-1274. [ DOI : 10.1109/SP.2019.00064 ]

    https://hal.inria.fr/hal-02294935

National Conferences with Proceedings

  • 25D. Merigoux, R. Monat, C. Gaie.

    Étude formelle de l'implémentation du code des impôts, in: 31ème Journées Francophones des Langages Applicatifs, Gruissan, France, January 2020.

    https://hal.inria.fr/hal-02320347

Internal Reports

  • 26K. Bhargavan, B. Beurdouche, P. Naldurg.

    Formal Models and Verified Protocols for Group Messaging: Attacks and Proofs for IETF MLS, Inria Paris, December 2019.

    https://hal.inria.fr/hal-02425229
  • 27B. Lipp, B. Blanchet, K. Bhargavan.

    A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol, Inria Paris, April 2019, no RR-9269, 49 p.

    https://hal.inria.fr/hal-02100345

Other Publications

References in notes
  • 30M. Abadi, B. Blanchet.

    Analyzing Security Protocols with Secrecy Types and Logic Programs, in: Journal of the ACM, January 2005, vol. 52, no 1, pp. 102–146.

    http://prosecco.gforge.inria.fr/personal/bblanche/publications/AbadiBlanchetJACM7037.pdf
  • 31M. Abadi, B. Blanchet, C. Fournet.

    Just Fast Keying in the Pi Calculus, in: ACM Transactions on Information and System Security (TISSEC), July 2007, vol. 10, no 3, pp. 1–59.

    http://prosecco.gforge.inria.fr/personal/bblanche/publications/AbadiBlanchetFournetTISSEC07.pdf
  • 32C. Abate, R. Blanco, D. Garg, C. Hriţcu, M. Patrignani, J. Thibault.

    Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation, in: 32nd IEEE Computer Security Foundations Symposium (CSF), IEEE, June 2019, pp. 256-271. [ DOI : 10.1109/CSF.2019.00025 ]

    https://arxiv.org/abs/1807.04603
  • 33C. Abate, A. Azevedo de Amorim, R. Blanco, A. N. Evans, G. Fachini, C. Hriţcu, T. Laurent, B. C. Pierce, M. Stronati, A. Tolmach.

    When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise, in: 25th ACM Conference on Computer and Communications Security (CCS), ACM, October 2018, pp. 1351–1368.

    https://arxiv.org/abs/1802.00588
  • 34D. Ahman, C. Hriţcu, K. Maillard, G. Martínez, G. Plotkin, J. Protzenko, A. Rastogi, N. Swamy.

    Dijkstra Monads for Free, in: 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), ACM, January 2017, pp. 515-529. [ DOI : 10.1145/3009837.3009878 ]

    https://www.fstar-lang.org/papers/dm4free/
  • 35A. Azevedo de Amorim, M. Dénès, N. Giannarakis, C. Hritcu, B. C. Pierce, A. Spector-Zabusky, A. Tolmach.

    Micro-Policies: Formally Verified, Tag-Based Security Monitors, in: 36th IEEE Symposium on Security and Privacy (Oakland S&P), IEEE Computer Society, May 2015, pp. 813–830. [ DOI : 10.1109/SP.2015.55 ]

    http://prosecco.gforge.inria.fr/personal/hritcu/publications/micro-policies.pdf
  • 36K. Bhargavan, B. Blanchet, N. Kobeissi.

    Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, in: 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 483 - 502. [ DOI : 10.1109/SP.2017.26 ]

    https://hal.inria.fr/hal-01575920
  • 37K. Bhargavan, B. Bond, A. Delignat-Lavaud, C. Fournet, C. Hawblitzel, C. Hriţcu, S. Ishtiaq, M. Kohlweiss, R. Leino, J. Lorch, K. Maillard, J. Pan, B. Parno, J. Protzenko, T. Ramananandro, A. Rane, A. Rastogi, N. Swamy, L. Thompson, P. Wang, S. Zanella-Béguelin, J. K. Zinzindohoué.

    Everest: Towards a Verified, Drop-in Replacement of HTTPS, in: 2nd Summit on Advances in Programming Languages (SNAPL), May 2017.

    http://drops.dagstuhl.de/opus/volltexte/2017/7119/pdf/LIPIcs-SNAPL-2017-1.pdf
  • 38K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, J. Pan, J. Protzenko, A. Rastogi, N. Swamy, S. Zanella-Béguelin, J. K. Zinzindohoué.

    Implementing and Proving the TLS 1.3 Record Layer, in: IEEE Symposium on Security and Privacy (Oakland), 2017.
  • 39K. Bhargavan, C. Fournet, R. Corin, E. Zalinescu.

    Verified Cryptographic Implementations for TLS, in: ACM Transactions Inf. Syst. Secur., March 2012, vol. 15, no 1, pp. 3:1–3:32.

    http://doi.acm.org/10.1145/2133375.2133378
  • 40K. Bhargavan, C. Fournet, A. D. Gordon, N. Swamy.

    Verified implementations of the information card federated identity-management protocol, in: ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008, pp. 123-135.
  • 41B. Blanchet, M. Abadi, C. Fournet.

    Automated Verification of Selected Equivalences for Security Protocols, in: Journal of Logic and Algebraic Programming, February–March 2008, vol. 75, no 1, pp. 3–51.

    http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetAbadiFournetJLAP07.pdf
  • 42B. Blanchet.

    An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW'01), 2001, pp. 82–96.
  • 43B. Blanchet.

    Automatic Verification of Correspondences for Security Protocols, in: Journal of Computer Security, July 2009, vol. 17, no 4, pp. 363–434.

    http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetJCS08.pdf
  • 44B. Blanchet, A. Podelski.

    Verification of Cryptographic Protocols: Tagging Enforces Termination, in: Theoretical Computer Science, March 2005, vol. 333, no 1-2, pp. 67–90, Special issue FoSSaCS'03..

    http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetPodelskiTCS04.html
  • 45D. Cadé, B. Blanchet.

    Proved Generation of Implementations from Computationally Secure Protocol Specifications, in: Journal of Computer Security, 2015, vol. 23, no 3, pp. 331–402.
  • 46J. Clulow.

    On the Security of PKCS#11, in: CHES, 2003, pp. 411-425.
  • 47S. Delaune, S. Kremer, G. Steel.

    Formal Analysis of PKCS#11 and Proprietary Extensions, in: Journal of Computer Security, November 2010, vol. 18, no 6, pp. 1211-1245. [ DOI : 10.3233/JCS-2009-0394 ]

    http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-jcs09.pdf
  • 48A. Delignat-Lavaud, K. Bhargavan, S. Maffeis.

    Language-Based Defenses Against Untrusted Browser Origins, in: Proceedings of the 22th USENIX Security Symposium, 2013.

    http://prosecco.inria.fr/personal/karthik/pubs/language-based-defenses-against-untrusted-origins-sec13.pdf
  • 49D. Dolev, A. Yao.

    On the security of public key protocols, in: IEEE Transactions on Information Theory, 1983, vol. IT–29, no 2, pp. 198–208.
  • 50C. Fournet, M. Kohlweiss, P.-Y. Strub.

    Modular Code-Based Cryptographic Verification, in: ACM Conference on Computer and Communications Security, 2011.
  • 51N. Kobeissi, K. Bhargavan, B. Blanchet.

    Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: 2nd IEEE European Symposium on Security and Privacy, Paris, France, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]

    https://hal.inria.fr/hal-01575923
  • 52K. Maillard, D. Ahman, R. Atkey, G. Martínez, C. Hriţcu, E. Rivas, É. Tanter.

    Dijkstra Monads for All, in: PACMPL, 2019, vol. 3, no ICFP, pp. 104:1–104:29. [ DOI : 10.1145/3341708 ]

    https://arxiv.org/abs/1903.01237
  • 53R. Needham, M. Schroeder.

    Using encryption for authentication in large networks of computers, in: Communications of the ACM, 1978, vol. 21, no 12, pp. 993–999.
  • 54J. Protzenko, J. K. Zinzindohoué, A. Rastogi, T. Ramananandro, P. Wang, S. Zanella-Béguelin, A. Delignat-Lavaud, C. Hriţcu, K. Bhargavan, C. Fournet, N. Swamy.

    Verified Low-Level Programming Embedded in F*, in: PACMPL, September 2017, vol. 1, no ICFP, pp. 17:1–17:29. [ DOI : 10.1145/3110261 ]

    http://arxiv.org/abs/1703.00053
  • 55T. Ramananandro, A. Delignat-Lavaud, C. Fournet, N. Swamy, T. Chajed, N. Kobeissi, J. Protzenko.

    EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats, in: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, N. Heninger, P. Traynor (editors), USENIX Association, 2019, pp. 1465–1482.

    https://www.usenix.org/conference/usenixsecurity19/presentation/delignat-lavaud
  • 56N. Swamy, C. Fournet, A. Rastogi, K. Bhargavan, J. Chen, P.-Y. Strub, G. M. Bierman.

    Gradual typing embedded securely in JavaScript, in: 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2014, pp. 425-438.

    http://prosecco.inria.fr/personal/karthik/pubs/tsstar-popl14.pdf
  • 57N. Swamy, C. Hriţcu, C. Keller, A. Rastogi, A. Delignat-Lavaud, S. Forest, K. Bhargavan, C. Fournet, P.-Y. Strub, M. Kohlweiss, J. K. Zinzindohoué, S. Zanella-Béguelin.

    Dependent Types and Multi-Monadic Effects in F*, in: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), ACM, January 2016, pp. 256-270.

    https://www.fstar-lang.org/papers/mumon/
  • 58J. K. Zinzindohoué, K. Bhargavan, J. Protzenko, B. Beurdouche.

    HACL*: A Verified Modern Cryptographic Library, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 1789–1806.

    http://doi.acm.org/10.1145/3133956.3134043