Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
M. Abadi, B. Blanchet, C. Fournet.
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication, in: Journal of the ACM (JACM), October 2017, vol. 65, no 1, pp. 1 - 103. [ DOI : 10.1145/3127586 ]
https://hal.inria.fr/hal-01636616
[2]
C. Abate, A. Azevedo de Amorim, R. Blanco, A. N. Evans, G. Fachini, C. Hriţcu, T. Laurent, B. C. Pierce, M. Stronati, A. Tolmach.
When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise, in: 25th ACM Conference on Computer and Communications Security (CCS), Toronto, Canada, ACM, October 2018, pp. 1351–1368, https://arxiv.org/abs/1802.00588. [ DOI : 10.1145/3243734.3243745 ]
https://hal.archives-ouvertes.fr/hal-01949202
[3]
K. Bhargavan, B. Blanchet, N. Kobeissi.
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, in: 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 483 - 502. [ DOI : 10.1109/SP.2017.26 ]
https://hal.inria.fr/hal-01575920
[4]
K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Pironti, P.-Y. Strub.
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS, in: IEEE Symposium on Security and Privacy (Oakland), 2014, pp. 98–113.
https://hal.inria.fr/hal-01102259
[5]
B. Blanchet.
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, in: Foundations and Trends in Privacy and Security, October 2016, vol. 1, no 1–2, pp. 1–135.
https://hal.inria.fr/hal-01423760
[6]
M. Isaakidis, H. Halpin, G. Danezis.
UnlimitID: Privacy-Preserving Federated Identity Management Using Algebraic MACs, in: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, New York, NY, USA, WPES '16, ACM, 2016, pp. 139–142. [ DOI : 10.1145/2994620.2994637 ]
https://hal.inria.fr/hal-01426847
[7]
N. Kobeissi, K. Bhargavan, B. Blanchet.
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: 2nd IEEE European Symposium on Security and Privacy, Paris, France, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]
https://hal.inria.fr/hal-01575923
[8]
N. Swamy, C. Hriţcu, C. Keller, A. Rastogi, A. Delignat-Lavaud, S. Forest, K. Bhargavan, C. Fournet, P.-Y. Strub, M. Kohlweiss, J. K. Zinzindohoué, S. Zanella-Béguelin.
Dependent Types and Multi-Monadic Effects in F*, in: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), ACM, January 2016, pp. 256-270.
https://hal.inria.fr/hal-01265793
[9]
J. K. Zinzindohoué, K. Bhargavan, J. Protzenko, B. Beurdouche.
HACL*: A Verified Modern Cryptographic Library, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 1789–1806.
https://hal.inria.fr/hal-01588421
Publications of the year

Doctoral Dissertations and Habilitation Theses

[10]
C. Hriţcu.
The Quest for Formally Secure Compartmentalizing Compilation, ENS Paris ; PSL Research University, January 2019, Habilitation à diriger des recherches.
https://tel.archives-ouvertes.fr/tel-01995823
[11]
K. Maillard.
Principles of Program Verification for Arbitrary Monadic Effects, ENS Paris - Ecole Normale Supérieure de Paris, November 2019.
https://hal.archives-ouvertes.fr/tel-02416788

Articles in International Peer-Reviewed Journals

[12]
J. Eremondi, É. Tanter, R. Garcia.
Approximate normalization for gradual dependent types, in: Proceedings of the ACM on Programming Languages, July 2019, vol. 3, no ICFP, pp. 1-30. [ DOI : 10.1145/3341692 ]
https://hal.archives-ouvertes.fr/hal-02399594
[13]
K. Maillard, D. Ahman, R. Atkey, G. Martínez, C. Hriţcu, E. Rivas, É. Tanter.
Dijkstra monads for all, in: Proceedings of the ACM on Programming Languages, July 2019, vol. 3, no ICFP, pp. 1-29, https://arxiv.org/abs/1903.01237. [ DOI : 10.1145/3341708 ]
https://hal.archives-ouvertes.fr/hal-02398919
[14]
K. Maillard, C. Hriţcu, E. Rivas, A. Van Muylder.
The Next 700 Relational Program Logics, in: Proceedings of the ACM on Programming Languages, 2019, vol. 4, no POPL, https://arxiv.org/abs/1907.05244, forthcoming.
https://hal.archives-ouvertes.fr/hal-02398927
[15]
P.-M. Pédrot, N. Tabareau, H. J. Fehrmann, É. Tanter.
A Reasonably Exceptional Type Theory, in: Proceedings of the ACM on Programming Languages, August 2019, vol. 3, pp. 1-29. [ DOI : 10.1145/3341712 ]
https://hal.inria.fr/hal-02189128
[16]
Best Paper
M. Toro, E. Labrada, É. Tanter.
Gradual Parametricity, Revisited, in: Proceedings of the ACM on Programming Languages, 2019, vol. 3, no POPL, https://arxiv.org/abs/1807.04596. [ DOI : 10.1145/3290330 ]
https://hal.archives-ouvertes.fr/hal-01960553

International Conferences with Proceedings

[17]
Best Paper
C. Abate, R. Blanco, D. Garg, C. Hriţcu, M. Patrignani, J. Thibault.
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation, in: CSF 2019 - 32nd IEEE Computer Security Foundations Symposium, Hoboken, United States, IEEE, June 2019, pp. 256-271, https://arxiv.org/abs/1807.04603. [ DOI : 10.1109/CSF.2019.00025 ]
https://hal.archives-ouvertes.fr/hal-02398915
[18]
R. Blanco, D. Miller, A. Momigliano.
Property-Based Testing via Proof Reconstruction, in: PPDP 2019 - 21st International Symposium on Principles and Practice of Programming Languages, Porto, Portugal, ACM Press, October 2019, pp. 1-13. [ DOI : 10.1145/3354166.3354170 ]
https://hal.inria.fr/hal-02368931
[19]
R. Cruz, É. Tanter.
Polymorphic Relaxed Noninterference, in: SecDev 2019 : IEEE Secure Development Conference, McLean, VA, United States, IEEE, 2019, pp. 101-113. [ DOI : 10.1109/SecDev.2019.00021 ]
https://hal.archives-ouvertes.fr/hal-02399576
[20]
T. Díaz, F. Olmedo, É. Tanter.
A Mechanized Formalization of GraphQL, in: CPP 2020 - 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, New Orleans, United States, January 2020. [ DOI : 10.1145/3372885.3373822 ]
https://hal.archives-ouvertes.fr/hal-02422532
[21]
N. Kobeissi, G. Nicolas, K. Bhargavan.
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols, in: EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, June 2019.
https://hal.inria.fr/hal-01948964
[22]
B. Lipp, B. Blanchet, K. Bhargavan.
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol, in: 4th IEEE European Symposium on Security and Privacy, Stockholm, Sweden, IEEE Computer Society, June 2019, pp. 231-246.
https://hal.inria.fr/hal-02396640
[23]
G. Martínez, D. Ahman, V. Dumitrescu, N. Giannarakis, C. Hawblitzel, C. Hriţcu, M. Narasimhamurthy, Z. Paraskevopoulou, C. Pit-Claudel, J. Protzenko, T. Ramananandro, A. Rastogi, N. Swamy.
Meta-F*: Proof automation with SMT, Tactics, and Metaprograms, in: ESOP'19 - European Symposium on Programming, Prague, Czech Republic, April 2019, https://arxiv.org/abs/1803.06547.
https://hal.archives-ouvertes.fr/hal-01995376
[24]
J. Protzenko, B. Beurdouche, D. Merigoux, K. Bhargavan.
Formally Verified Cryptographic Web Applications in WebAssembly, in: SP 2019 - 40th IEEE Symposium on Security and Privacy, San Francisco, United States, IEEE, May 2019, pp. 1256-1274. [ DOI : 10.1109/SP.2019.00064 ]
https://hal.inria.fr/hal-02294935

National Conferences with Proceedings

[25]
D. Merigoux, R. Monat, C. Gaie.
Étude formelle de l'implémentation du code des impôts, in: 31ème Journées Francophones des Langages Applicatifs, Gruissan, France, January 2020.
https://hal.inria.fr/hal-02320347

Internal Reports

[26]
K. Bhargavan, B. Beurdouche, P. Naldurg.
Formal Models and Verified Protocols for Group Messaging: Attacks and Proofs for IETF MLS, Inria Paris, December 2019.
https://hal.inria.fr/hal-02425229
[27]
B. Lipp, B. Blanchet, K. Bhargavan.
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol, Inria Paris, April 2019, no RR-9269, 49 p.
https://hal.inria.fr/hal-02100345

Other Publications

[28]
B. Beurdouche.
MLS Architecture: analysis of the security, privacy and functional requirements, January 2020, working paper or preprint.
https://hal.inria.fr/hal-02439526
[29]
E. Rivas, M. Jaskelioff.
Monads with merging, June 2019, working paper or preprint.
https://hal.inria.fr/hal-02150199
References in notes
[30]
M. Abadi, B. Blanchet.
Analyzing Security Protocols with Secrecy Types and Logic Programs, in: Journal of the ACM, January 2005, vol. 52, no 1, pp. 102–146.
http://prosecco.gforge.inria.fr/personal/bblanche/publications/AbadiBlanchetJACM7037.pdf
[31]
M. Abadi, B. Blanchet, C. Fournet.
Just Fast Keying in the Pi Calculus, in: ACM Transactions on Information and System Security (TISSEC), July 2007, vol. 10, no 3, pp. 1–59.
http://prosecco.gforge.inria.fr/personal/bblanche/publications/AbadiBlanchetFournetTISSEC07.pdf
[32]
C. Abate, R. Blanco, D. Garg, C. Hriţcu, M. Patrignani, J. Thibault.
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation, in: 32nd IEEE Computer Security Foundations Symposium (CSF), IEEE, June 2019, pp. 256-271. [ DOI : 10.1109/CSF.2019.00025 ]
https://arxiv.org/abs/1807.04603
[33]
C. Abate, A. Azevedo de Amorim, R. Blanco, A. N. Evans, G. Fachini, C. Hriţcu, T. Laurent, B. C. Pierce, M. Stronati, A. Tolmach.
When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise, in: 25th ACM Conference on Computer and Communications Security (CCS), ACM, October 2018, pp. 1351–1368.
https://arxiv.org/abs/1802.00588
[34]
D. Ahman, C. Hriţcu, K. Maillard, G. Martínez, G. Plotkin, J. Protzenko, A. Rastogi, N. Swamy.
Dijkstra Monads for Free, in: 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL), ACM, January 2017, pp. 515-529. [ DOI : 10.1145/3009837.3009878 ]
https://www.fstar-lang.org/papers/dm4free/
[35]
A. Azevedo de Amorim, M. Dénès, N. Giannarakis, C. Hritcu, B. C. Pierce, A. Spector-Zabusky, A. Tolmach.
Micro-Policies: Formally Verified, Tag-Based Security Monitors, in: 36th IEEE Symposium on Security and Privacy (Oakland S&P), IEEE Computer Society, May 2015, pp. 813–830. [ DOI : 10.1109/SP.2015.55 ]
http://prosecco.gforge.inria.fr/personal/hritcu/publications/micro-policies.pdf
[36]
K. Bhargavan, B. Blanchet, N. Kobeissi.
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, in: 38th IEEE Symposium on Security and Privacy, San Jose, United States, May 2017, pp. 483 - 502. [ DOI : 10.1109/SP.2017.26 ]
https://hal.inria.fr/hal-01575920
[37]
K. Bhargavan, B. Bond, A. Delignat-Lavaud, C. Fournet, C. Hawblitzel, C. Hriţcu, S. Ishtiaq, M. Kohlweiss, R. Leino, J. Lorch, K. Maillard, J. Pan, B. Parno, J. Protzenko, T. Ramananandro, A. Rane, A. Rastogi, N. Swamy, L. Thompson, P. Wang, S. Zanella-Béguelin, J. K. Zinzindohoué.
Everest: Towards a Verified, Drop-in Replacement of HTTPS, in: 2nd Summit on Advances in Programming Languages (SNAPL), May 2017.
http://drops.dagstuhl.de/opus/volltexte/2017/7119/pdf/LIPIcs-SNAPL-2017-1.pdf
[38]
K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, J. Pan, J. Protzenko, A. Rastogi, N. Swamy, S. Zanella-Béguelin, J. K. Zinzindohoué.
Implementing and Proving the TLS 1.3 Record Layer, in: IEEE Symposium on Security and Privacy (Oakland), 2017.
[39]
K. Bhargavan, C. Fournet, R. Corin, E. Zalinescu.
Verified Cryptographic Implementations for TLS, in: ACM Transactions Inf. Syst. Secur., March 2012, vol. 15, no 1, pp. 3:1–3:32.
http://doi.acm.org/10.1145/2133375.2133378
[40]
K. Bhargavan, C. Fournet, A. D. Gordon, N. Swamy.
Verified implementations of the information card federated identity-management protocol, in: ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008, pp. 123-135.
[41]
B. Blanchet, M. Abadi, C. Fournet.
Automated Verification of Selected Equivalences for Security Protocols, in: Journal of Logic and Algebraic Programming, February–March 2008, vol. 75, no 1, pp. 3–51.
http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetAbadiFournetJLAP07.pdf
[42]
B. Blanchet.
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW'01), 2001, pp. 82–96.
[43]
B. Blanchet.
Automatic Verification of Correspondences for Security Protocols, in: Journal of Computer Security, July 2009, vol. 17, no 4, pp. 363–434.
http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetJCS08.pdf
[44]
B. Blanchet, A. Podelski.
Verification of Cryptographic Protocols: Tagging Enforces Termination, in: Theoretical Computer Science, March 2005, vol. 333, no 1-2, pp. 67–90, Special issue FoSSaCS'03..
http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetPodelskiTCS04.html
[45]
D. Cadé, B. Blanchet.
Proved Generation of Implementations from Computationally Secure Protocol Specifications, in: Journal of Computer Security, 2015, vol. 23, no 3, pp. 331–402.
[46]
J. Clulow.
On the Security of PKCS#11, in: CHES, 2003, pp. 411-425.
[47]
S. Delaune, S. Kremer, G. Steel.
Formal Analysis of PKCS#11 and Proprietary Extensions, in: Journal of Computer Security, November 2010, vol. 18, no 6, pp. 1211-1245. [ DOI : 10.3233/JCS-2009-0394 ]
http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/DKS-jcs09.pdf
[48]
A. Delignat-Lavaud, K. Bhargavan, S. Maffeis.
Language-Based Defenses Against Untrusted Browser Origins, in: Proceedings of the 22th USENIX Security Symposium, 2013.
http://prosecco.inria.fr/personal/karthik/pubs/language-based-defenses-against-untrusted-origins-sec13.pdf
[49]
D. Dolev, A. Yao.
On the security of public key protocols, in: IEEE Transactions on Information Theory, 1983, vol. IT–29, no 2, pp. 198–208.
[50]
C. Fournet, M. Kohlweiss, P.-Y. Strub.
Modular Code-Based Cryptographic Verification, in: ACM Conference on Computer and Communications Security, 2011.
[51]
N. Kobeissi, K. Bhargavan, B. Blanchet.
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach, in: 2nd IEEE European Symposium on Security and Privacy, Paris, France, April 2017, pp. 435 - 450. [ DOI : 10.1109/EuroSP.2017.38 ]
https://hal.inria.fr/hal-01575923
[52]
K. Maillard, D. Ahman, R. Atkey, G. Martínez, C. Hriţcu, E. Rivas, É. Tanter.
Dijkstra Monads for All, in: PACMPL, 2019, vol. 3, no ICFP, pp. 104:1–104:29. [ DOI : 10.1145/3341708 ]
https://arxiv.org/abs/1903.01237
[53]
R. Needham, M. Schroeder.
Using encryption for authentication in large networks of computers, in: Communications of the ACM, 1978, vol. 21, no 12, pp. 993–999.
[54]
J. Protzenko, J. K. Zinzindohoué, A. Rastogi, T. Ramananandro, P. Wang, S. Zanella-Béguelin, A. Delignat-Lavaud, C. Hriţcu, K. Bhargavan, C. Fournet, N. Swamy.
Verified Low-Level Programming Embedded in F*, in: PACMPL, September 2017, vol. 1, no ICFP, pp. 17:1–17:29. [ DOI : 10.1145/3110261 ]
http://arxiv.org/abs/1703.00053
[55]
T. Ramananandro, A. Delignat-Lavaud, C. Fournet, N. Swamy, T. Chajed, N. Kobeissi, J. Protzenko.
EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats, in: 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, N. Heninger, P. Traynor (editors), USENIX Association, 2019, pp. 1465–1482.
https://www.usenix.org/conference/usenixsecurity19/presentation/delignat-lavaud
[56]
N. Swamy, C. Fournet, A. Rastogi, K. Bhargavan, J. Chen, P.-Y. Strub, G. M. Bierman.
Gradual typing embedded securely in JavaScript, in: 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), 2014, pp. 425-438.
http://prosecco.inria.fr/personal/karthik/pubs/tsstar-popl14.pdf
[57]
N. Swamy, C. Hriţcu, C. Keller, A. Rastogi, A. Delignat-Lavaud, S. Forest, K. Bhargavan, C. Fournet, P.-Y. Strub, M. Kohlweiss, J. K. Zinzindohoué, S. Zanella-Béguelin.
Dependent Types and Multi-Monadic Effects in F*, in: 43rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), ACM, January 2016, pp. 256-270.
https://www.fstar-lang.org/papers/mumon/
[58]
J. K. Zinzindohoué, K. Bhargavan, J. Protzenko, B. Beurdouche.
HACL*: A Verified Modern Cryptographic Library, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, 2017, pp. 1789–1806.
http://doi.acm.org/10.1145/3133956.3134043