-
1
-
-
17644411480
-
Mobile values, new names, and secure communication
-
M. Abadi and C. Fournet. Mobile values, new names, and secure communication. In ACM POPL, pages 104-115, 2001.
-
(2001)
ACM POPL
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Computer Aided Verification: 17th International Conference, CAV 2005. Proceedings
-
A. Armando, D. A. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cúellar, P. H. Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In CAV, volume 3576 of Lecture Notes in Computer Science, pages 281-285. Springer, 2005. (Pubitemid 41431740)
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Heam, P.C.8
Kouchnarenko, O.9
Mantovani, J.10
Modersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigano, L.16
Vigneron, L.17
-
5
-
-
74049100112
-
CoSP: A general framework for computational soundness proofs
-
November Preprint on IACR ePrint 2009/080
-
M. Backes, D. Hofheinz, and D. Unruh. CoSP: A general framework for computational soundness proofs. In ACM CCS 2009, pages 66-78, November 2009. Preprint on IACR ePrint 2009/080.
-
(2009)
ACM CCS 2009
, pp. 66-78
-
-
Backes, M.1
Hofheinz, D.2
Unruh, D.3
-
6
-
-
51749098783
-
Refinement types for secure implementations
-
IEEE Computer Society
-
J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis. Refinement types for secure implementations. In CSF'08: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium, pages 17-32. IEEE Computer Society, 2008.
-
(2008)
CSF'08: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
, pp. 17-32
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
7
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
DOI 10.1109/SP.2006.1, 1624008, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
B. Blanchet. A computationally sound mechanized prover for security protocols. In IEEE Symposium on Security and Privacy, pages 140-154. IEEE Computer Society, 2006. (Pubitemid 44753719)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 140-154
-
-
Blanchet, B.1
-
8
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
B. Blanchet. Automatic verification of correspondences for security protocols. Journal of Computer Security, 17(4):363-434, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
9
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
DOI 10.1016/j.jlap.2007.06.002, PII S1567832607000549
-
B. Blanchet, M. Abadi, and C. Fournet. Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming, 75(1):3-51, Feb.-Mar. 2008. (Pubitemid 351172997)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
10
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput., 13(4):850-864, 1984. (Pubitemid 15510668)
-
(1984)
SIAM Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum Manuel1
Micali Silvio2
-
12
-
-
85076893888
-
KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
San Diego, CA, Dec.
-
C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008), San Diego, CA, Dec. 2008.
-
(2008)
USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008)
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
13
-
-
70350543796
-
ASPIER: An automated framework for verifying security protocol implementations
-
S. Chaki and A. Datta. ASPIER: An automated framework for verifying security protocol implementations. In Computer Security Foundations Workshop, pages 172-185, 2009.
-
(2009)
Computer Security Foundations Workshop
, pp. 172-185
-
-
Chaki, S.1
Datta, A.2
-
15
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
Los Angeles, California ACM Press, New York, NY
-
P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 238-252, Los Angeles, California, 1977. ACM Press, New York, NY.
-
(1977)
Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
20
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
Verification, Model Checking, and Abstract Interpretation - 6th International Conference, VMCAI 2005
-
J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of Lecture Notes in Computer Science, pages 363-379. Springer, 2005. (Pubitemid 41231372)
-
(2005)
Lecture Notes in Computer Science
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
21
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7):385-394, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
23
-
-
79956084660
-
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
-
R. Küsters and T. Truderung. Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. Journal of Automated Reasoning, 46(3):325-352, 2011.
-
(2011)
Journal of Automated Reasoning
, vol.46
, Issue.3
, pp. 325-352
-
-
Küsters, R.1
Truderung, T.2
-
24
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
November
-
G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett., 56:131-133, November 1995.
-
(1995)
Inf. Process. Lett.
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
25
-
-
84959039613
-
CIL: Intermediate language and tools for analysis and transformation of C programs
-
CC '02 London, UK Springer-Verlag
-
G. C. Necula, S. McPeak, S. P. Rahul, and W. Weimer. CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs. In Proceedings of the 11th International Conference on Compiler Construction, CC '02, pages 213-228, London, UK, 2002. Springer-Verlag.
-
(2002)
Proceedings of the 11th International Conference on Compiler Construction
, pp. 213-228
-
-
Necula, G.C.1
Mcpeak, S.2
Rahul, S.P.3
Weimer, W.4
-
28
-
-
79952161645
-
Security programming with refinement types and mobile proofs
-
N. Swamy, J. Chen, C. Fournet, K. Bharagavan, and J. Yang. Security programming with refinement types and mobile proofs. Technical Report MSR-TR-2010-149, 2010.
-
(2010)
Technical Report MSR-TR-2010-149
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Bharagavan, K.4
Yang, J.5
|