Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Vincent Cheval"'
Publikováno v:
Journal of Computer Security
Journal of Computer Security, IOS Press, In press, 28 (1), pp.71-127. ⟨10.3233/JCS-191366⟩
Journal of Computer Security, 2020, 28 (1), pp.71-127. ⟨10.3233/JCS-191366⟩
Journal of Computer Security, IOS Press, In press, 28 (1), pp.71-127. ⟨10.3233/JCS-191366⟩
Journal of Computer Security, 2020, 28 (1), pp.71-127. ⟨10.3233/JCS-191366⟩
International audience; Symbolic models for security protocol verification were pioneered by Dolev and Yao in their seminal work. Since then, although inspired by the same ideas, many variants of the original model were developed. In particular, a co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f5d4886917f60b0051e4747d28fbb714
https://hal.inria.fr/hal-02446910
https://hal.inria.fr/hal-02446910
Publikováno v:
Logic, Language, and Security. Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday
Logic, Language, and Security. Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, 2020, Philadelphia, United States
Logic, Language, and Security ISBN: 9783030620769
Logic, Language, and Security
Logic, Language, and Security. Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday, 2020, Philadelphia, United States
Logic, Language, and Security ISBN: 9783030620769
Logic, Language, and Security
International audience; Privacy-preserving security properties in cryptographic protocols are typically modelled by observational equivalences in process calculi such as the applied pi-calulus. We survey decidability and complexity results for the au
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c8d97e2a710c88b612f26b34b413c6e5
https://inria.hal.science/hal-02961617
https://inria.hal.science/hal-02961617
Publikováno v:
CCS'19-26th ACM Conference on Computer and Communications Security
CCS'19-26th ACM Conference on Computer and Communications Security, Nov 2019, London, United Kingdom
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
CCS
CCS'19-26th ACM Conference on Computer and Communications Security, Nov 2019, London, United Kingdom
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
CCS
International audience; Verification of privacy-type properties for cryptographic protocols in an active adversarial environment, modelled as a behavioural equivalence in concurrent-process calculi, exhibits a high computational complexity. While und
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::06300d8b541689173614e69ece2663da
https://hal.science/hal-02269043/document
https://hal.science/hal-02269043/document
A little more conversation, a little less action, a lot more satisfaction: Global states in ProVerif
Publikováno v:
CSF'2018-31st IEEE Computer Security Foundations Symposium
CSF'2018-31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom
[Research Report] Inria Nancy-Grand Est; LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2018
2018 IEEE 31st Computer Security Foundations Symposium (CSF)
CSF
CSF'2018-31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom
[Research Report] Inria Nancy-Grand Est; LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2018
2018 IEEE 31st Computer Security Foundations Symposium (CSF)
CSF
International audience; ProVerif is a popular tool for the fully automatic analysis of security protocols, offering very good support to detect flaws or prove security. One exception is the case of protocols with global states such as counters, table
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::93bf06cac78d380fd3095720d1f00823
https://inria.hal.science/hal-01900088/file/CSF18-GSVerif-long(3).pdf
https://inria.hal.science/hal-01900088/file/CSF18-GSVerif-long(3).pdf
Publikováno v:
39th IEEE Symposium on Security and Privacy
39th IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States
[Research Report] INRIA Nancy. 2018
2018 IEEE Symposium on Security and Privacy (SP)
IEEE Symposium on Security and Privacy
39th IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States
[Research Report] INRIA Nancy. 2018
2018 IEEE Symposium on Security and Privacy (SP)
IEEE Symposium on Security and Privacy
International audience; Automated verification has become an essential part in the security evaluation of cryptographic protocols. Recently, there has been a considerable effort to lift the theory and tool support that existed for reachability proper
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::799477cc94ebcf5c64f0129520f6f783
https://hal.inria.fr/hal-01763122
https://hal.inria.fr/hal-01763122
Publikováno v:
Computer Aided Verification ISBN: 9783319961415
CAV (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Aided Verification
CAV 2018-30th International Conference on Computer Aided Verification
CAV 2018-30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom
30th International Conference on Computer Aided Verification, Part II (CAV18)
30th International Conference on Computer Aided Verification, Part II (CAV'18)
CAV (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Aided Verification
CAV 2018-30th International Conference on Computer Aided Verification
CAV 2018-30th International Conference on Computer Aided Verification, Jul 2018, Oxford, United Kingdom
30th International Conference on Computer Aided Verification, Part II (CAV18)
30th International Conference on Computer Aided Verification, Part II (CAV'18)
International audience; In this paper we describe the DeepSec prover, a tool for security protocol analysis. It decides equivalence properties modelled as trace equivalence of two processes in a dialect of the applied pi calculus.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bb8383736aa315c52ad4401ae1b4d912
https://doi.org/10.1007/978-3-319-96142-2_4
https://doi.org/10.1007/978-3-319-96142-2_4
Publikováno v:
Information and Computation
Information and Computation, 2017, 255, pp.94-125. ⟨10.1016/j.ic.2017.05.004⟩
Information and Computation, Elsevier, 2017, 255, pp.94-125. ⟨10.1016/j.ic.2017.05.004⟩
Information and Computation, 2017, 255, pp.94-125. ⟨10.1016/j.ic.2017.05.004⟩
Information and Computation, Elsevier, 2017, 255, pp.94-125. ⟨10.1016/j.ic.2017.05.004⟩
We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability. Infin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1959b8dcc11b54878e5583e4d66896ec
https://inria.hal.science/hal-01584242
https://inria.hal.science/hal-01584242
Publikováno v:
CSF'17-30th IEEE Computer Security Foundations Symposium
CSF'17-30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.144-158, ⟨10.1109/CSF.2017.28⟩
CSF
Cheval, V, Cortier, V & Warinschi, B 2017, Secure composition of PKIs with public key protocols . in 2017 IEEE Computer Security Foundations Symposium . 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 144-158 . https://doi.org/10.1109/CSF.2017.28
2017 IEEE 30th Computer Security Foundations Symposium (CSF)
CSF'17-30th IEEE Computer Security Foundations Symposium, Aug 2017, Santa Barbara, United States. pp.144-158, ⟨10.1109/CSF.2017.28⟩
CSF
Cheval, V, Cortier, V & Warinschi, B 2017, Secure composition of PKIs with public key protocols . in 2017 IEEE Computer Security Foundations Symposium . 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 144-158 . https://doi.org/10.1109/CSF.2017.28
2017 IEEE 30th Computer Security Foundations Symposium (CSF)
International audience; We use symbolic formal models to study the composition of public key-based protocols with public key infras-tructures (PKIs). We put forth a minimal set of requirements which a PKI should satisfy and then identify several reas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::46f3e21d9157d0409f8decb508e8e275
https://hal.inria.fr/hal-01625766/file/CSF2017-PKI(1).pdf
https://hal.inria.fr/hal-01625766/file/CSF2017-PKI(1).pdf
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662544549
POST
6th International Conference on Principles of Security and Trust (POST)
6th International Conference on Principles of Security and Trust (POST), Apr 2017, Uppsala, Sweden
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Principles of Security and Trust
POST
6th International Conference on Principles of Security and Trust (POST)
6th International Conference on Principles of Security and Trust (POST), Apr 2017, Uppsala, Sweden
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Principles of Security and Trust
International audience; Symbolic models for security protocol verification, following the sem-inal ideas of Dolev and Yao, come in many flavors, even though they share the same ideas. A common assumption is that the attacker has complete control over
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::35a0132215a964dfaf7496e7a4b84080
https://doi.org/10.1007/978-3-662-54455-6_7
https://doi.org/10.1007/978-3-662-54455-6_7
Publikováno v:
The Computer Journal
The Computer Journal, Oxford University Press (UK), 2016, 59, pp.1695-1713. ⟨10.1093/comjnl/bxw039⟩
The Computer Journal, 2016, 59, pp.1695-1713. ⟨10.1093/comjnl/bxw039⟩
The Computer Journal, Oxford University Press (UK), 2016, 59, pp.1695-1713. ⟨10.1093/comjnl/bxw039⟩
The Computer Journal, 2016, 59, pp.1695-1713. ⟨10.1093/comjnl/bxw039⟩
International audience; The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1519341c106b886ce612024816073b2a
https://hal.archives-ouvertes.fr/hal-01403899
https://hal.archives-ouvertes.fr/hal-01403899