ANR Project TECAP
TECAP: Protocol Analysis - Combining Existing Tools
ANR-17-CE39-0004-01
Journals
-
[CDDK222]Automatic generation of sources lemmas in TAMARIN: towards automatic proofs of security protocols. Journal of Computer Security , 2022. Bibtex
-
[JK21]An Extensive Formal Analysis of Multi-factor Authentication Protocols. {ACM} Trans. Priv. Secur. , 2021. Bibtex
-
[CDS21]A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties. J. Autom. Reason. , 2021. Bibtex
-
[K21]Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. ACM Trans. Comput. Log. , 2021. Bibtex
-
[CCDD20]
-
[BCK20]On the semantics of communications when verifying equivalence properties. J. Comput. Secur. , 2020. Bibtex
Conferences
-
[BCW22]A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client Hello. In Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS'22) ACM Press, 2022. Bibtex
-
[CCK22]Symbolic protocol verification with dice: process equivalences in the presence of probabilities. In Proceedings of the 35nd IEEE Computer Security Foundations Symposium (CSF'22) IEEE Computer Society, 2022. Bibtex
-
[CJKK22]Sapic+: protocol verifiers of the world, unite!. In Proceedings of the 27th 31th USENIX Security Symposium, USENIX Security 2022 (USENIX'22) USENIX Association, 2022. Bibtex
-
[DL22]One Vote Is Enough for Analysing Privacy. In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS'22) Lecture Notes in Computer Science, 2022. Bibtex
-
[CDD22]A small bound on the number of sessions for security protocols. In Proceedings of the 35nd IEEE Computer Security Foundations Symposium (CSF'22) IEEE Computer Society, 2022. Bibtex
-
[BDKM22]Cracking the Stateful Nut — Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant. In Proceedings of the 35nd IEEE Computer Security Foundations Symposium (CSF'22) IEEE Computer Society, 2022. Bibtex
-
[BCC22]ProVerif with Lemmas, Induction, Fast Subsumption, and Much More. In Proceedings of the 43nd IEEE Symposium on Security and Privacy (SP'22) IEEE Computer Society, 2022. Bibtex
-
[BDJKM21]An Interactive Prover for Protocol Verification in the Computational Model. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (SP'21) IEEE Computer Society, 2021. Bibtex
-
[BBBBC21]SoK: Computer-Aided Cryptography. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (SP'21) IEEE Computer Society, 2021. Bibtex
-
[BBHKS21]Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS'21) ACM, 2021. Bibtex
-
[ABHKL21]Analysing the HPKE Standard. In Proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'21) Springer, 2021. Bibtex
-
[BDM20]A Method for Proving Unlinkability of Stateful Protocols. In Proceedings of the 33nd IEEE Computer Security Foundations Symposium (CSF'20) IEEE Computer Society, 2020. Bibtex
-
[CJS20]Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS'20) ACM, 2020. Bibtex
-
[CKR20]The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols. In Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday Springer, 2020. Bibtex
-
[CDD20]Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols. In Proceedings of the 25th European Symposium on Research in Computer Security (ESORICS'20) Springer, 2020. Bibtex
-
[BGJKS19]Symbolic Methods in Computational Cryptography Proofs. In Proceedings of the 32nd IEEE Computer Security Foundations Symposium (CSF'19) IEEE Computer Society, 2019. Bibtex
-
[K19a]Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. In Proceedings of the 32nd IEEE Computer Security Foundations Symposium (CSF'19) IEEE Computer Society, 2019. Bibtex
-
[ABBB19]Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS'19) ACM, 2019. Bibtex
-
[CKR19]Exploiting Symmetries When Proving Equivalence Properties for Security Protocols. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS'19) ACM, 2019. Bibtex
-
[K19b]The 5G-AKA Authentication Protocol Privacy. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroSP'19) IEEE Computer Society, 2019. Bibtex
-
[LBB19]A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroSP'19) IEEE Computer Society, 2019. Bibtex
-
[BDH18]POR for Security Protocol Equivalences - Beyond Action-Determinism. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18) Springer, 2018. Bibtex
-
[CDD18]Efficiently Deciding Equivalence for Standard Primitives and Phases. In Proceedings of the 23rd European Symposium on Research in Computer Security (ESORICS'18) Springer, 2018. Bibtex
-
[D18]Analysing Privacy-Type Properties in Cryptographic Protocols (Invited Talk). In Proceedings of the 3rd International Conference on Formal Structures for Computation and Deduction (FSCD'18) Schloss Dagstuhl, 2018. Bibtex
-
[CCT18]A Little More Conversation, a Little Less Action, a Lot More Satisfaction: Global States in ProVerif. In Proceedings of the 31th IEEE Computer Security Foundations Symposium (CSF'18) IEEE Computer Society, 2018. Bibtex
-
[JK18]An Extensive Formal Analysis of Multi-factor Authentication Protocols. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18) IEEE Computer Society, 2018. Bibtex
-
[CKR18a]DEEPSEC: Deciding Equivalence Properties in Security Protocols - Theory and Practice. In Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P'18) IEEE Computer Society Press, 2018. Bibtex
-
[CKR18b]The DEEPSEC Prover. In Proceedings of the 30th International Conference on Computer Aided Verification (CAV'18) Springer, 2018. Bibtex
-
[B18]Composition Theorems for CryptoVerif and Application to TLS 1.3. In Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18) IEEE Computer Society, 2018. Bibtex
Workshop
-
[B22]The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm. In Proceedings of the 9th Workshop on Horn Clauses for Verification and Synthesis IEEE Computer Society, 2022. 2022. Bibtex