Recherche - Archive ouverte HAL Accéder directement au contenu

Filtrer vos résultats

22 résultats
Image document

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR (Extended Version)

Jannik Dreier , Lucca Hirschi , Sasa Radomirovic , Ralf Sasse
[Research Report] LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy; ETH Zurich, Switzerland; University of Dundee. 2018
Rapport hal-01780544v1
Image document

Symbolic Analysis of Identity-Based Protocols

David Basin , Lucca Hirschi , Ralf Sasse
Springer. Foundations of Security, Protocols, and Equational Reasoning, Springer (11565), pp.112-134, 2019, LNCS, ⟨10.1007/978-3-030-19052-1_9⟩
Chapitre d'ouvrage hal-02368842v1
Image document

Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol

Alexandre Debant , Lucca Hirschi
USENIX Security 2023, Aug 2023, Anaheim, United States
Communication dans un congrès hal-04323674v1
Image document

Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol

Alexandre Debant , Lucca Hirschi
2023
Pré-publication, Document de travail hal-03875463v3
Image document

Verification of Stateful Cryptographic Protocols with Exclusive OR

Jannik Dreier , Lucca Hirschi , Saša Radomirović , Ralf Sasse
Journal of Computer Security, 2020, 28 (1), pp.1--34. ⟨10.3233/JCS-191358⟩
Article dans une revue hal-02358878v1
Image document

New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols

Ravishankar Borgaonkar , Lucca Hirschi , Shinjo Park , Altaf Shaik
Proceedings on Privacy Enhancing Technologies, 2019, 2019 (3), pp.108-127. ⟨10.2478/popets-2019-0039⟩
Article dans une revue hal-02368896v1
Image document

Symbolic Abstractions for Quantum Protocol Verification

Lucca Hirschi
2020
Pré-publication, Document de travail hal-02391308v1

Fixing the Achilles Heel of E-Voting: The Bulletin Board

Lucca Hirschi , Lara Schmid , David Basin
CSF 2021 - 34th IEEE Computer Security Foundations Symposium, Jun 2021, Dubrovnik/Virtual, Croatia. pp.1-17, ⟨10.1109/CSF51468.2021.00016⟩
Communication dans un congrès hal-03488741v1
Image document

Security Issues in the 5G Standard and How Formal Methods Come to the Rescue

Lucca Hirschi , Ralf Sasse , Jannik Dreier
ERCIM News, 2019
Article dans une revue hal-02268822v1
Image document

Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions

Lucca Hirschi , Cas Cremers
EuroS&P 2019 - 4th IEEE European Symposium on Security and Privacy, Jun 2019, Stockholm, Sweden. pp.635-650, ⟨10.1109/EuroSP.2019.00052⟩
Communication dans un congrès hal-02368857v1

A Reduced Semantics for Deciding Trace Equivalence

Stéphanie Delaune , David Baelde , Lucca Hirschi
Logical Methods in Computer Science, 2017, 13 (2), pp.1-48. ⟨10.23638/LMCS-13(2:8)2017⟩
Article dans une revue hal-01906639v1
Image document

A Formal Analysis of 5G Authentication

David Basin , Jannik Dreier , Lucca Hirschi , Saša Radomirovic , Ralf Sasse , et al.
ACM CCS 2018 - 25th ACM Conference on Computer and Communications Security, Oct 2018, Toronto, Canada. ⟨10.1145/3243734.3243846⟩
Communication dans un congrès hal-01898050v1
Image document

Towards Completeness via Proof Search in the Linear Time mu-Calculus

Amina Doumane , David Baelde , Lucca Hirschi , Alexis Saurin
2016
Pré-publication, Document de travail hal-01275289v1
Image document

A method for unbounded verification of privacy-type properties

Lucca Hirschi , David Baelde , Stéphanie Delaune
Journal of Computer Security, 2019, 27 (3), pp.277-342. ⟨10.3233/JCS-171070⟩
Article dans une revue hal-02368832v1
Image document

Porridge, an OCaml library implementing POR techniques for checking trace equivalence of security protocols

David Baelde , Stéphanie Delaune , Lucca Hirschi
Logiciel hal-01821474v2
Image document

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

Jannik Dreier , Lucca Hirschi , Sasa Radomirovic , Ralf Sasse
CSF'2018 - 31st IEEE Computer Security Foundations Symposium, Jul 2018, Oxford, United Kingdom. ⟨10.1109/CSF.2018.00033⟩
Communication dans un congrès hal-01780603v1
Image document

DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing

Max Ammann , Lucca Hirschi , Steve Kremer
45th IEEE Symposium on Security and Privacy, 2024, San Francisco (CA, USA), United States
Communication dans un congrès hal-04318710v2

POR for Security Protocol Equivalences - Beyond Action-Determinism

Stéphanie Delaune , David Baelde , Lucca Hirschi
Computer Security - 23rd European Symposium on Research in Computer Security, 2018, Barcelone, Spain
Communication dans un congrès hal-01906651v1
Image document

A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols

Guillaume Girol , Lucca Hirschi , Ralf Sasse , Dennis Jackson , Cas Cremers , et al.
USENIX 2020 - 29th Usenix Security Symposium, Aug 2020, Virtual, United States
Communication dans un congrès hal-03103869v1
Image document

Le traçage anonyme, dangereux oxymore

Xavier Bonnetain , Anne Canteaut , Véronique Cortier , Pierrick Gaudry , Lucca Hirschi , et al.
Le droit face au coronavirus, LexisNexis, pp.468--480, 2021, 9782711036394
Chapitre d'ouvrage hal-02997228v1

A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols

Stéphanie Delaune , Lucca Hirschi
Journal of Logical and Algebraic Methods in Programming, 2017, 87, pp.127 - 144. ⟨10.1016/j.jlamp.2016.10.005⟩
Article dans une revue hal-01906634v1
Image document

POR for Security Protocol Equivalences: Beyond Action-Determinism

David Baelde , Stéphanie Delaune , Lucca Hirschi
ESORICS, pp.385-405, 2018, ⟨10.1007/978-3-319-99073-6_19⟩
Chapitre d'ouvrage hal-02390219v1