Inria
/
Raweb 2010
Presentation of the Project secsi
Logo Inria
secsi
Security of information systems
2010 Research Team Activity Report
Saclay - Île-de-France
Field :
Algorithmics, Programming, Software and Architecture
Theme : Programs, Verification and Proofs
Presentation of the Project-Team
- Activity Report in
PDF
or
XML
or
ePub
(
test
) format
Members
Overall Objectives
Overall Objectives
Highlights
Scientific Foundations
What is computer security? Do we need some?
Logic as a tool for assessing computer security
Enriching the Dolev-Yao model with algebraic theories
Linking cryptographic and formal approaches
Indistinguishability proofs
Application to new security protocols
Models mixing probabilistic and non-deterministic choice
Application Domains
Introduction
Cryptographic Protocols
Static Analysis
Software
Software Packages and Prototypes
The H1 Tool Suite: h1, pl2tptp, auto2pl, pldet, plpurge, pl2gastex, tptpmorph, linauto, h1trace, h1logstrip, h1mc, h1mon, h1getlog
ORCHIDS modules
The RuleGen tool
The Tookan tool
The KISS tool
The Subvariant tool
The ADECS tool
New Results
Indistinguishability proofs
Composition
Computational Soundness
Mobile ad-hoc networks
Properties of electronic voting protocols
Formal Analysis of Security APIs
Intrusion Detection with Orchids
Mixing probabilities and non-determinism
Credibilistic Abstract Interpretation of Numerical Programs
A stab at the Jung-Tix problem
Noetherian spaces in verification
Other Grants and Activities
National Initiatives
International Initiatives
Dissemination
Animation of the scientific community
Teaching
Supervision, Advisorship
Participation to PhD or habilitation juries
Participation to conference program committees or journal editorial boards
Participation to symposia, seminars, invitations
Bibliography
Major publications
Publications of the year
References in notes