TITLE
|
AUTHORS |
A CompCert Backend with Symbolic Encryption |
Torrini Paolo, Boulme Sylvain |
A comprehensive security analysis of the Belenios protocol and more |
Debant Alexandre |
A Formalization of the Proof of Correctness of a Number-Theoretic Transform in the Context of the Hakyber Cryptographic Primitive |
Séré Antoine, Strub Pierre-Yves |
A General Framework for Supervisory Control of Opacity |
Souid Nour, Klai Kais |
Analyse de contre-mesures dans le cadre d'attaques multiples |
Boespflug Etienne |
Assessing bug replicability for more security-minded bug finding |
Girol Guillaume |
CV2EC: Getting the Best of Two Worlds |
Blanchet Bruno, Boutry Pierre, Doczkal Christian Doczkal, Grégoire Benjamin, Strub Pierre-Yves Strub |
Efficient Symbolic Algorithms for Software Verification Against Fault Attacks |
Ducousso Soline, Bardin Sébastien, Potet Marie-Laure |
End-to-end enforcement of fine-grained "cryptographic" constant-time policies |
Ammanaghatta Shivakumar Basavesh, Barthe Gilles, Grégoire Benjamin, Laporte Vincent, Priya Swarn |
Equational Proofs for Distributed Cryptographic Protocols |
Gancher Joshua, Sojakova Kristina, Fan Leo, Shi Elaine, Morrisett Greg |
Formal analysis of LAKE-EDHOC |
Racouchot Maïwenn, Klein Elise |
Formal analysis of security issues in dynamic virtual networks |
Le Scornet Pierre |
Formal Verification Challenges on High-Speed Cryptographic Implementations |
Quaresma Miguel, Oliveira Tiago |
Improving Static Analysis Precision by Minimal Program Refinement |
M Charles Babu, Bardin Sébastien, Lemerre Matthieu, Marion Jean-Yves |
Learning and Knowledge for Anomaly Detection |
Chevalier Yannick |
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability |
Koutsos Adrien, Gregoire Benjam, Barbosa Manuel, Strub Pierre-Yves, Barthe Gilles |
Model Checking of Vulnerabilities in SmartContracts: A Solidity-to-CPN Approach Extended Abstract |
Garfatta Ikram, Klai Kais, Graiet Mohamed, Gaaloul Walid |
Sound Static Analysis of Regular Expressions for Vulnerabilities to Denial of Service Attacks |
Parolini Francesco, Miné Antoine |
Stack smashing analysis by abstract interpretation of binary code |
Ballabriga Clément, Forget Julien, Person Guillaume |
Structured Leakage and Applications to Cryptographic Constant-Time and Cost |
Barthe Gilles, Grégoire Benjamin, Laporte Vincent, Priya Swarn |
Support for Detecting Integer Overflow Vulnerability |
Kissi Salim Yahia, Seladji Yassamine, Ameur-Boulifa Rabéa |
Systematic, automated discovery of security protocol attacks that exploit weaknesses in common hash functions |
Jacomme Charlie |
Type-Directed Program Transformation for Constant-Time Enforcement |
Besson Frédéric, Jensen Thomas, Raimondi Gautier |
Vérification des mécanismes de sécurité des navigateurs Web |
Farinier Benjamin, Veronese Lorenzo, Tempesta Mauro, Squarcina Marco, Maffei Matteo |
Verifying Low-Level, Concurrent Programs with Steel |
Fromherz Aymeric |
Verifying Redundant-Check Based Countermeasures: A Case Study |
Martin Thibault, Kosmatov Nikolai, Prevosto Virgile |