Bibliography
Major publications by the team in recent years
-
1M. Abadi, B. Blanchet, C. Fournet.
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, in: Journal of the ACM (JACM), October 2017, vol. 65, no 1, pp. 1 - 103. [ DOI : 10.1145/3127586 ]
https://hal.inria.fr/hal-01636616 -
2C. Abate, A. Azevedo de Amorim, R. Blanco, A. N. Evans, G. Fachini, C. Hriţcu, T. Laurent, B. C. Pierce, M. Stronati, A. Tolmach.
When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise, in: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, ACM, October 2018, pp. 1351–1368, https://arxiv.org/abs/1802.00588. [ DOI : 10.1145/3243734.3243745 ]
https://hal.archives-ouvertes.fr/hal-01949202 -
3K. Bhargavan, B. Blanchet, N. Kobeissi.
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, in: 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 483 - 502. [ DOI : 10.1109/SP.2017.26 ]
https://hal.inria.fr/hal-01575920 -
4K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Pironti, P.-Y. Strub.
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, in: IEEE Symposium on Security and Privacy (Oakland), 2014, pp. 98–113.
https://hal.inria.fr/hal-01102259 -
5B. Blanchet.
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, in: Foundations and Trends in Privacy and Security, October 2016, vol. 1, no 1–2, pp. 1–135.
https://hal.inria.fr/hal-01423760 -
6M. Isaakidis, H. Halpin, G. Danezis.
UnlimitID: Privacy-Preserving Federated Identity Management Using Algebraic MACs, in: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, New York, NY, USA, WPES '16, ACM, 2016, pp. 139–142. [ DOI : 10.1145/2994620.2994637 ]
https://hal.inria.fr/hal-01426847 -
7N. Kobeissi, K. Bhargavan, B. Blanchet.
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: 2nd IEEE European Symposium on Security and Privacy, Paris, France, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]
https://hal.inria.fr/hal-01575923 -
8N. Swamy, C. Hriţcu, C. Keller, A. Rastogi, A. Delignat-Lavaud, S. Forest, K. Bhargavan, C. Fournet, P.-Y. Strub, M. Kohlweiss, J. K. Zinzindohoué, S. Zanella-Béguelin.
Dependent Types and Multi-Monadic Effects in F*, in: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), ACM, January 2016, pp. 256-270.
https://hal.inria.fr/hal-01265793 -
9J. K. Zinzindohoué, K. Bhargavan, J. Protzenko, B. Beurdouche.
HACL*: A Verified Modern Cryptographic Library, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 1789–1806.
https://hal.inria.fr/hal-01588421
Doctoral Dissertations and Habilitation Theses
-
10C. Hriţcu.
The Quest for Formally Secure Compartmentalizing Compilation, ENS Paris ; PSL Research University, January 2019, Habilitation à diriger des recherches.
https://tel.archives-ouvertes.fr/tel-01995823 -
11K. Maillard.
Principles of Program Verification for Arbitrary Monadic Effects, ENS Paris - Ecole Normale Supérieure de Paris, November 2019.
https://hal.archives-ouvertes.fr/tel-02416788
Articles in International Peer-Reviewed Journals
-
12J. Eremondi, É. Tanter, R. Garcia.
Approximate normalization for gradual dependent types, in: Proceedings of the ACM on Programming Languages, July 2019, vol. 3, no ICFP, pp. 1-30. [ DOI : 10.1145/3341692 ]
https://hal.archives-ouvertes.fr/hal-02399594 -
13K. Maillard, D. Ahman, R. Atkey, G. Martínez, C. Hriţcu, E. Rivas, É. Tanter.
Dijkstra monads for all, in: Proceedings of the ACM on Programming Languages, July 2019, vol. 3, no ICFP, pp. 1-29, https://arxiv.org/abs/1903.01237. [ DOI : 10.1145/3341708 ]
https://hal.archives-ouvertes.fr/hal-02398919 -
14K. Maillard, C. Hriţcu, E. Rivas, A. Van Muylder.
The Next 700 Relational Program Logics, in: Proceedings of the ACM on Programming Languages, 2019, vol. 4, no POPL, https://arxiv.org/abs/1907.05244, forthcoming.
https://hal.archives-ouvertes.fr/hal-02398927 -
15P.-M. Pédrot, N. Tabareau, H. J. Fehrmann, É. Tanter.
A Reasonably Exceptional Type Theory, in: Proceedings of the ACM on Programming Languages, August 2019, vol. 3, pp. 1-29. [ DOI : 10.1145/3341712 ]
https://hal.inria.fr/hal-02189128
International Conferences with Proceedings
-
18R. Blanco, D. Miller, A. Momigliano.
Property-Based Testing via Proof Reconstruction, in: PPDP 2019 - 21st International Symposium on Principles and Practice of Programming Languages, Porto, Portugal, ACM Press, October 2019, pp. 1-13. [ DOI : 10.1145/3354166.3354170 ]
https://hal.inria.fr/hal-02368931 -
19R. Cruz, É. Tanter.
Polymorphic Relaxed Noninterference, in: SecDev 2019 : IEEE Secure Development Conference, McLean, VA, United States, IEEE, 2019, pp. 101-113. [ DOI : 10.1109/SecDev.2019.00021 ]
https://hal.archives-ouvertes.fr/hal-02399576 -
20T. Díaz, F. Olmedo, É. Tanter.
A Mechanized Formalization of GraphQL, in: CPP 2020 - 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, New Orleans, United States, January 2020. [ DOI : 10.1145/3372885.3373822 ]
https://hal.archives-ouvertes.fr/hal-02422532 -
21N. Kobeissi, G. Nicolas, K. Bhargavan.
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols, in: EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, June 2019.
https://hal.inria.fr/hal-01948964 -
22B. Lipp, B. Blanchet, K. Bhargavan.
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol, in: 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, IEEE Computer Society, June 2019, pp. 231-246.
https://hal.inria.fr/hal-02396640 -
23G. Martínez, D. Ahman, V. Dumitrescu, N. Giannarakis, C. Hawblitzel, C. Hriţcu, M. Narasimhamurthy, Z. Paraskevopoulou, C. Pit-Claudel, J. Protzenko, T. Ramananandro, A. Rastogi, N. Swamy.
Meta-F*: Proof automation with SMT, Tactics, and Metaprograms, in: ESOP'19 - European Symposium on Programming, Prague, Czech Republic, April 2019, https://arxiv.org/abs/1803.06547.
https://hal.archives-ouvertes.fr/hal-01995376 -
24J. Protzenko, B. Beurdouche, D. Merigoux, K. Bhargavan.
Formally Verified Cryptographic Web Applications in WebAssembly, in: SP 2019 - 40th IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2019, pp. 1256-1274. [ DOI : 10.1109/SP.2019.00064 ]
https://hal.inria.fr/hal-02294935
National Conferences with Proceedings
-
25D. Merigoux, R. Monat, C. Gaie.
Étude formelle de l'implémentation du code des impôts, in: 31ème Journées Francophones des Langages Applicatifs, Gruissan, France, January 2020.
https://hal.inria.fr/hal-02320347
Internal Reports
-
26K. Bhargavan, B. Beurdouche, P. Naldurg.
Formal Models and Verified Protocols for Group Messaging: Attacks and Proofs for IETF MLS, Inria Paris, December 2019.
https://hal.inria.fr/hal-02425229 -
27B. Lipp, B. Blanchet, K. Bhargavan.
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol, Inria Paris, April 2019, no RR-9269, 49 p.
https://hal.inria.fr/hal-02100345
Other Publications
-
28B. Beurdouche.
MLS Architecture: analysis of the security, privacy and functional requirements, January 2020, working paper or preprint.
https://hal.inria.fr/hal-02439526 -
29E. Rivas, M. Jaskelioff.
Monads with merging, June 2019, working paper or preprint.
https://hal.inria.fr/hal-02150199
-
30M. Abadi, B. Blanchet.
Analyzing Security Protocols with Secrecy Types and Logic Programs, in: Journal of the ACM, January 2005, vol. 52, no 1, pp. 102–146.
http://prosecco.gforge.inria.fr/personal/bblanche/publications/AbadiBlanchetJACM7037.pdf -
31M. Abadi, B. Blanchet, C. Fournet.
Just Fast Keying in the Pi Calculus, in: ACM Transactions on Information and System Security (TISSEC), July 2007, vol. 10, no 3, pp. 1–59.
http://prosecco.gforge.inria.fr/personal/bblanche/publications/AbadiBlanchetFournetTISSEC07.pdf -
32C. Abate, R. Blanco, D. Garg, C. Hriţcu, M. Patrignani, J. Thibault.
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation, in: 32nd IEEE Computer Security Foundations Symposium (CSF), IEEE, June 2019, pp. 256-271. [ DOI : 10.1109/CSF.2019.00025 ]
https://arxiv.org/abs/1807.04603 -
33C. Abate, A. Azevedo de Amorim, R. Blanco, A. N. Evans, G. Fachini, C. Hriţcu, T. Laurent, B. C. Pierce, M. Stronati, A. Tolmach.
When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise, in: 25th ACM Conference on Computer and Communications Security (CCS), ACM, October 2018, pp. 1351–1368.
https://arxiv.org/abs/1802.00588 -
34D. Ahman, C. Hriţcu, K. Maillard, G. Martínez, G. Plotkin, J. Protzenko, A. Rastogi, N. Swamy.
Dijkstra Monads for Free, in: 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), ACM, January 2017, pp. 515-529. [ DOI : 10.1145/3009837.3009878 ]
https://www.fstar-lang.org/papers/dm4free/ -
35A. Azevedo de Amorim, M. Dénès, N. Giannarakis, C. Hritcu, B. C. Pierce, A. Spector-Zabusky, A. Tolmach.
Micro-Policies: Formally Verified, Tag-Based Security Monitors, in: 36th IEEE Symposium on Security and Privacy (Oakland S&P), IEEE Computer Society, May 2015, pp. 813–830. [ DOI : 10.1109/SP.2015.55 ]
http://prosecco.gforge.inria.fr/personal/hritcu/publications/micro-policies.pdf -
36K. Bhargavan, B. Blanchet, N. Kobeissi.
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, in: 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 483 - 502. [ DOI : 10.1109/SP.2017.26 ]
https://hal.inria.fr/hal-01575920 -
37K. Bhargavan, B. Bond, A. Delignat-Lavaud, C. Fournet, C. Hawblitzel, C. Hriţcu, S. Ishtiaq, M. Kohlweiss, R. Leino, J. Lorch, K. Maillard, J. Pan, B. Parno, J. Protzenko, T. Ramananandro, A. Rane, A. Rastogi, N. Swamy, L. Thompson, P. Wang, S. Zanella-Béguelin, J. K. Zinzindohoué.
Everest: Towards a Verified, Drop-in Replacement of HTTPS, in: 2nd Summit on Advances in Programming Languages (SNAPL), May 2017.
http://drops.dagstuhl.de/opus/volltexte/2017/7119/pdf/LIPIcs-SNAPL-2017-1.pdf -
38K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, J. Pan, J. Protzenko, A. Rastogi, N. Swamy, S. Zanella-Béguelin, J. K. Zinzindohoué.
Implementing and Proving the TLS 1.3 Record Layer, in: IEEE Symposium on Security and Privacy (Oakland), 2017. -
39K. Bhargavan, C. Fournet, R. Corin, E. Zalinescu.
Verified Cryptographic Implementations for TLS, in: ACM Transactions Inf. Syst. Secur., March 2012, vol. 15, no 1, pp. 3:1–3:32.
http://doi.acm.org/10.1145/2133375.2133378 -
40K. Bhargavan, C. Fournet, A. D. Gordon, N. Swamy.
Verified implementations of the information card federated identity-management protocol, in: ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008, pp. 123-135. -
41B. Blanchet, M. Abadi, C. Fournet.
Automated Verification of Selected Equivalences for Security Protocols, in: Journal of Logic and Algebraic Programming, February–March 2008, vol. 75, no 1, pp. 3–51.
http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetAbadiFournetJLAP07.pdf -
42B. Blanchet.
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW'01), 2001, pp. 82–96. -
43B. Blanchet.
Automatic Verification of Correspondences for Security Protocols, in: Journal of Computer Security, July 2009, vol. 17, no 4, pp. 363–434.
http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetJCS08.pdf -
44B. Blanchet, A. Podelski.
Verification of Cryptographic Protocols: Tagging Enforces Termination, in: Theoretical Computer Science, March 2005, vol. 333, no 1-2, pp. 67–90, Special issue FoSSaCS'03..
http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetPodelskiTCS04.html -
45D. Cadé, B. Blanchet.
Proved Generation of Implementations from Computationally Secure Protocol Specifications, in: Journal of Computer Security, 2015, vol. 23, no 3, pp. 331–402. -
46J. Clulow.
On the Security of PKCS#11, in: CHES, 2003, pp. 411-425. -
47S. Delaune, S. Kremer, G. Steel.
Formal Analysis of PKCS#11 and Proprietary Extensions, in: Journal of Computer Security, November 2010, vol. 18, no 6, pp. 1211-1245. [ DOI : 10.3233/JCS-2009-0394 ]
http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-jcs09.pdf -
48A. Delignat-Lavaud, K. Bhargavan, S. Maffeis.
Language-Based Defenses Against Untrusted Browser Origins, in: Proceedings of the 22th USENIX Security Symposium, 2013.
http://prosecco.inria.fr/personal/karthik/pubs/language-based-defenses-against-untrusted-origins-sec13.pdf -
49D. Dolev, A. Yao.
On the security of public key protocols, in: IEEE Transactions on Information Theory, 1983, vol. IT–29, no 2, pp. 198–208. -
50C. Fournet, M. Kohlweiss, P.-Y. Strub.
Modular Code-Based Cryptographic Verification, in: ACM Conference on Computer and Communications Security, 2011. -
51N. Kobeissi, K. Bhargavan, B. Blanchet.
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: 2nd IEEE European Symposium on Security and Privacy, Paris, France, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]
https://hal.inria.fr/hal-01575923 -
52K. Maillard, D. Ahman, R. Atkey, G. Martínez, C. Hriţcu, E. Rivas, É. Tanter.
Dijkstra Monads for All, in: PACMPL, 2019, vol. 3, no ICFP, pp. 104:1–104:29. [ DOI : 10.1145/3341708 ]
https://arxiv.org/abs/1903.01237 -
53R. Needham, M. Schroeder.
Using encryption for authentication in large networks of computers, in: Communications of the ACM, 1978, vol. 21, no 12, pp. 993–999. -
54J. Protzenko, J. K. Zinzindohoué, A. Rastogi, T. Ramananandro, P. Wang, S. Zanella-Béguelin, A. Delignat-Lavaud, C. Hriţcu, K. Bhargavan, C. Fournet, N. Swamy.
Verified Low-Level Programming Embedded in F*, in: PACMPL, September 2017, vol. 1, no ICFP, pp. 17:1–17:29. [ DOI : 10.1145/3110261 ]
http://arxiv.org/abs/1703.00053 -
55T. Ramananandro, A. Delignat-Lavaud, C. Fournet, N. Swamy, T. Chajed, N. Kobeissi, J. Protzenko.
EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats, in: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, N. Heninger, P. Traynor (editors), USENIX Association, 2019, pp. 1465–1482.
https://www.usenix.org/conference/usenixsecurity19/presentation/delignat-lavaud -
56N. Swamy, C. Fournet, A. Rastogi, K. Bhargavan, J. Chen, P.-Y. Strub, G. M. Bierman.
Gradual typing embedded securely in JavaScript, in: 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2014, pp. 425-438.
http://prosecco.inria.fr/personal/karthik/pubs/tsstar-popl14.pdf -
57N. Swamy, C. Hriţcu, C. Keller, A. Rastogi, A. Delignat-Lavaud, S. Forest, K. Bhargavan, C. Fournet, P.-Y. Strub, M. Kohlweiss, J. K. Zinzindohoué, S. Zanella-Béguelin.
Dependent Types and Multi-Monadic Effects in F*, in: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), ACM, January 2016, pp. 256-270.
https://www.fstar-lang.org/papers/mumon/ -
58J. K. Zinzindohoué, K. Bhargavan, J. Protzenko, B. Beurdouche.
HACL*: A Verified Modern Cryptographic Library, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 1789–1806.
http://doi.acm.org/10.1145/3133956.3134043