"Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses"
Claude Castelluccia, ... -- NDSS 2002
"A Decision Procedure for the Verification of Security Protocols with Explicit Destructors"
Florent Jacquemard, ... -- CCS 2004
"Deriving an Information Flow Checker and Certifying Compiler for Java"
Gilles Barthe, Tamara Rezk, ... -- Oakland 2006
"Multi-Use Unidirectional Proxy Re-Signatures"
Damien Vergnau, ... -- CCS 2008
"Code Injection Attacks on Harvard-Architecture Devices"
Aurelien Francillon, Claude Castelluccia, ... -- CCS 2008
"Cryptographically Verified Implementations for TLS"
Ricardo Corin, Eugen Zalinescu, ... -- CCS 2008
"Formally Certifying the Security of Digital Signature Schemes"
Santiago Zanella-Beguelin, Benjamin Gregoire, ... -- Oakland 2009
"On the difficulty of software-based attestation of embedded devices"
Claude Castelluccia, Aurelien Francillon, Daniele Perito, ... -- CCS 2009
"Proximity-based access control for implantable medical devices"
Claude Castelluccia, ... -- CCS 2009
"A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms"
Gurvan Le Guernic, Tamara Rezk, ... -- CCS 2009
"Attacking and fixing PKCS#11 security tokens"
Graham Steel, ... -- CCS 2010
"The Failure of Noise-Based Non-Continuous Audio Captchas"
Daniele Perito, ... -- Oakland 2011
"Modular Code-Based Cryptographic Verification"
Pierre-Yves Strub, ... -- CCS 2011
"Information-Flow Types for Homomorphic Encryptions"
Jeremy Planul, Tamara Rezk, ... -- CCS 2011
"You are what you like! Information leakage through users Interests"
Abdelberi Chaabane, Gergely Acs, Mohamed Ali Kaafar, ... -- NDSS 2012
"Adaptive Password-Strength Meters from Markov Models"
Claude Castelluccia, Daniele Perito, ... -- NDSS 2012
"SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust"
Daniele Perito, ... -- NDSS 2012
"Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices"
Graham Steel, ... -- CCS 2012
"Differentially Private Sequential Data Publication via Variable-Length N-Grams"
Gergely Acs, Claude Castelluccia, ... -- CCS 2012
"Implementing TLS with Verified Cryptographic Security"
Karthikeyan Bhargavan, Alfredo Pironti, ... -- Oakland 2013
"Fully Automated Analysis of Padding-Based Encryption in the Computational Model"
Benjamin Gregoire, ... -- CCS 2013
"Automatic Verification of Protocols with Lists of Unbounded Length"
Bruno Blanchet, Miriam Paiola, ... -- CCS 2013
"Computationally Complete Symbolic Attacker and Key Exchange"
Gergei Bana, ... -- CCS 2013
"Geo-Indistinguishability: Differential Privacy for Location-Based Systems"
Nicolas E. Bordenabe, Catuscia Palamidessi, ... -- CCS 2013
"ZQL: A Compiler for Privacy-Preserving Data Processing"
Zhengqin Luo, ... -- Usenix 2013
"Language-based Defenses Against Untrusted Browser Origins"
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, ... -- Usenix 2013
"Selling off User Privacy at Auction"
Lukasz Olejnik, Minh-Dung Tran, Claude Castelluccia, ... -- NDSS 2014
"Web PKI: Closing the Gap between Guidelines and Practices"
Antoine Delignat-Lavaud, ... -- NDSS 2014
"Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS"
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti, ... -- Oakland 2014
"Automated Analysis of Security Protocols with Global State"
Steve Kremer, ... -- Oakland 2014
"A Computationally Complete Symbolic Attacker for Equivalence Properties"
Gergei Bana, ... -- CCS 2014
"System-level non-interference for constant-time cryptography"
David Pichardie, ... -- CCS 2014
"Synthesis of Fault Attacks on Cryptographic Implementations"
Benjamin Gregoire, Jean-Christophe Zapalowicz, ... -- CCS 2014
"Optimal Geo-Indistinguishable Mechanisms for Location Privacy"
Nicolas E. Bordenabe, Catuscia Palamidessi, ... -- CCS 2014
"Characterization of Real-Life PRNGs under Partial State Corruption"
Mario Cornejo, ... -- CCS 2014
"Verified Contributive Channel Bindings for Compound Authentication"
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti, ... -- NDSS 2015
"A Messy State of the Union: Taming the Composite State Machines of TLS"
Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti, Jean Karim Zinzindohoue, ... -- Oakland 2015
"Micro-Policies: A Framework for Verified, Hardware-Assisted Security Monitors"
Maxime Denes, Nick Giannarakis, Catalin Hritcu, ... -- Oakland 2015
"Automated Proofs of Pairing-Based Cryptography"
Benjamin Gregoire, ... -- CCS 2015
"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice"
Karthikeyan Bhargavan, Pierrick Gaudry, Emmanuel Thome, Paul Zimmermann, ... -- CCS 2015
"Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH"
Karthikeyan Bhargavan, Gaetan Leurent, ... -- NDSS 2016
"Beauty and the Beast: Diverting modern web browsers to build unique browser fingerprints"
Pierre Laperdrix, Benoit Baudry, Walter Rudametkin, ... -- Oakland 2016
"Downgrade Resilience in Key-Exchange Protocols"
Karthikeyan Bhargavan, ... -- Oakland 2016
"SoK: Verifiability Notions for E-Voting Protocols"
Veronique Cortier, ... -- Oakland 2016
"Advanced Probabilistic Couplings for Differential Privacy"
Benjamin Gregoire, ... -- CCS 2016
"On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN"
Karthikeyan Bhargavan, Gaetan Leurent, ... -- CCS 2016
"Strong non-interference and type-directed masking"
Benjamin Gregoire, Rebecca Zucchini, ... -- CCS 2016
"Towards Implicit Visual Memory-Based Authentication"
Claude Castelluccia, ... -- NDSS 2017
"Implementing and Proving the TLS 1.3 Record Layer"
Karthikeyan Bhargavan, Jianyang Pan, Jean Karim Zinzindohoue, ... -- Oakland 2017
"Membership Inference Attacks against Machine Learning Models"
Marco Stronati, ... -- Oakland 2017
"Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate"
Karthikeyan Bhargavan, Bruno Blanchet, Nadim Kobeissi, ... -- Oakland 2017
"A Fast and Verified Software Stack for Secure Function Evaluation"
Benjamin Gregoire, ... -- CCS 2017
"Efficient Public Trace-and-Revoke from Standard Assumptions"
Damien Stehle, ... -- CCS 2017
"HACL*: A Verified Modern Cryptographic Library"
Zinzindohoue Jean-Karim, Bhargavan Karthikeyan, Beurdouche Benjamin, ... -- CCS 2017
"Jasmin: High-Assurance and High-Speed Cryptography"
Benjamin Gregoire, ... -- CCS 2017
"Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations."
Oana Goga, Patrick Loiseau, ... -- NDSS 2018
"A Formal Treatment of Accountable Proxying over TLS"
Karthikeyan Bhargavan, ... -- Oakland 2018
"DEEPSEC: Deciding Equivalence Properties in Security Protocols -- Theory and Practice"
Vincent Cheval, Steve Kremer, Itsaka Rakotonirina, ... -- Oakland 2018
"FP-STALKER: Tracking Browser Fingerprint Evolutions Along Time"
Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy, ... -- Oakland 2018
"Impossibility of Precise and Sound Termination-Sensitive Security Enforcements"
Minh Ngo, Tamara Rezk, ... -- Oakland 2018
"When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise"
Carmine Abate, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Theo Laurent, Marco Stronati, ... -- CCS 2018
"Symbolic Proofs for Lattice-Based Cryptography"
Benjamin Gregoire, ... -- CCS 2018
"Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies"
Antoine Vastel, Walter Rudametkin, Romain Rouvoy, ... -- Usenix 2018
"F-BLEAU: Fast Black-box Leakage Estimation"
Catuscia Palamidessi, ... -- Oakland 2019
"Formally Verified Cryptographic Web Applications in WebAssembly"
Benjamin Beurdouche, Denis Merigoux, Karthikeyan Bhargavan, ... -- Oakland 2019
"A Machine-Checked Proof of Security for AWS Key Management Service"
Benjamin Gregoire, ... -- CCS 2019
"Exploiting Symmetries when Proving Equivalence Properties for Security Protocols"
Vincent Cheval, Steve Kremer, Itsaka Rakotonirina, ... -- CCS 2019
"Machine-Checked Proofs for Cryptographic Standards"
Cecile Baritel-Ruet, Benjamin Gregoire, Vincent Laporte, ... -- CCS 2019
"WI is not Enough: Zero-Knowledge Contingent (Service) Payments Revisited"
Georg Fuchsbauer, ... -- CCS 2019
"EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats"
Nadim Kobeissi, ... -- Usenix 2019
"Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level"
Tamara Rezk, ... -- Oakland 2020
"Do Cookie Banners Respect My Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework"
Celestin Matte, Nataliia Bielova, Cristiana Santos, ... -- Oakland 2020
"EverCrypt: A Fast, Verified, Cross-Platform Crytographic Provider"
Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Natalia Kulatova, ... -- Oakland 2020
"The Last Mile: High-Assurance and High-Speed Cryptographic Implementations"
Benjamin Gregoire, Vincent Laporte, ... -- Oakland 2020
"HACL×N: Verified Generic SIMD Crypto (for all your favourite platforms)"
Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Natalia Kulatova, ... -- CCS 2020
"Estimating g-Leakage via Machine Learning"
Marco Romanelli, Catuscia Palamidessi, ... -- CCS 2020
"SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust"
Gaetan Leurent, ... -- Usenix 2020
"A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols"
Lucca Hirschi, ... -- Usenix 2020
"Hunting the Haunter — Efficient Relational Symbolic Execution for Spectre with HauntedRelSE"
Tamara Rezk, ... -- NDSS 2021
"A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer"
Joseph Lallemand, Itsaka Rakotonirina, ... -- Oakland 2021
"An Interactive Prover for Protocol Verification in the Computational Model"
Adrien Koutsos, Charlie Jacomme, ... -- Oakland 2021
"High-Assurance Cryptography in the Spectre Era"
Benjamin Gregoire, Adrien Koutsos, Tamara Rezk, ... -- Oakland 2021
"SoK: Computer-Aided Cryptography"
Karthikeyan Bhargavan, Bruno Blanchet, ... -- Oakland 2021
"Mechanized Proofs of Adversarial Complexity and Application to Universal Composability"
Benjamin Gregoire, Adrien Koutsos, ... -- CCS 2021
"Structured Leakage and Applications to Cryptographic Constant-Time and Cost"
Benjamin Gregoire, Swarn Priya, ... -- CCS 2021
"EasyPQC: Verifying Post-Quantum Cryptography"
Benjamin Gregoire, ... -- CCS 2021
"An In-Depth Symbolic Security Analysis of the ACME Standard"
Karthikeyan Bhargavan, ... -- CCS 2021
"LZR: Identifying Unexpected Internet Services"
Renata Teixeira, ... -- Usenix 2021
"Model Stealing Attacks Against Inductive Graph Neural Networks"
Yufei Han, ... -- Oakland 2022
"Noise: A Library of Verified High-Performance Secure Channel Protocol Implementations"
Son Ho, Karthikeyan Bhargavan, ... -- Oakland 2022
"ProVerif with Lemmas, Induction, Fast Subsumption, and Much More"
Bruno Blanchet, Vincent Cheval, ... -- Oakland 2022
"A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello"
Karthikeyan Bhargavan, Vincent Cheval, ... -- CCS 2022
"CERBERUS: Exploring Federated Prediction of Security Events"
Yufei Han, ... -- CCS 2022
"Enforcing Fine-grained Constant-time Policies"
Benjamin Gregoire, Vincent Laporte, Swarn Priya, ... -- CCS 2022
"Finding MNEMON: Reviving Memories of Node Embeddings"
Yufei Han, ... -- CCS 2022
"Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability"
Alexandre Debant, Mathieu Turuani, ... -- CCS 2022
"Tidy: Symbolic Verification of Timed Cryptographic Protocols"
Ugo Dal Lago, ... -- CCS 2022
"SAPIC+: protocol verifiers of the world, unite!"
Vincent Cheval, Steve Kremer, ... -- Usenix 2022