Foundations of Hardware-Based Attested Computation and Application to SGX, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp.245-260, 2016. ,
DOI : 10.1109/EuroSP.2016.28
URL : https://hal.archives-ouvertes.fr/hal-01417137
On the security of public key protocols, Proc. 22nd Symp. on Foundations of Computer Science (FOCS'81) ,
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication, Journal of Computer Security, vol.21, issue.6, pp.817-846, 2013. ,
DOI : 10.1007/978-3-642-28641-4_8
Attacking and fixing PKCS#11 security tokens, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.260-269, 2010. ,
DOI : 10.1145/1866307.1866337
Automated analysis of security protocols with global state, Journal of Computer Security, vol.18, issue.6, pp.1211-1245, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01351388
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012. ,
DOI : 10.1109/CSF.2012.25
Secure Software Licensing: Models, Constructions, and Proofs, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.78-94, 2016. ,
DOI : 10.1109/CSF.2016.10
URL : https://research-information.bris.ac.uk/ws/files/77942068/Bogdan_Warinschi_Secure_Software_Licensing_Models_Constructions_and_Proofs.pdf
Using innovative instructions to create trustworthy software solutions VC3: trustworthy data analytics in the cloud using SGX, Proc. 2nd Workshop on Hardware and Architectural Support for Security and Privacy Proc. 36th IEEE Symposium on Security and Privacy (S&P'15, pp.11-38, 2013. ,
A design and verification methodology for secure isolated regions, Proc. 37th ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI'16) ,
DOI : 10.1145/2908080.2908113
URL : http://people.eecs.berkeley.edu/~sseshia/pubdir/pldi16.pdf
Fully abstract trace semantics for low-level isolation mechanisms, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1562-1569, 2014. ,
DOI : 10.1145/2554850.2554865
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems, 2015 IEEE Symposium on Security and Privacy, pp.640-656, 2015. ,
DOI : 10.1109/SP.2015.45
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Proc. 20th International Conference on Computer Aided Verification (CAV'08), pp.414-418, 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Lecture Notes in Computer Science, vol.20, issue.1-2, pp.1-50, 2009. ,
DOI : 10.1007/s10990-007-9000-6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3197
Statverif: Verification of stateful processes, Proc. 24th IEEE Computer Security Foundations Symposium (CSF'11, pp.33-47, 2011. ,
A Formal Analysis of Authentication in the TPM, Lecture Notes in Computer Science, vol.17, issue.4, pp.111-125, 2010. ,
DOI : 10.1007/978-3-540-74835-9_29
Formal Analysis of Enhanced Authorization in the TPM 2.0, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.273-284, 2015. ,
DOI : 10.1145/2714576.2714610
Primitives for authentication in process algebras, Theoretical Computer Science, vol.283, issue.2, pp.271-304, 2002. ,
DOI : 10.1016/S0304-3975(01)00136-0
A Typed Process Calculus for Fine-Grained Resource Access Control in Distributed Computation, Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS'01), ser. Lecture Notes in Computer Science, pp.64-81, 2001. ,
DOI : 10.1007/3-540-45500-0_3
Symbolic models for isolated execution environments, Cryptology ePrint Archive, vol.070, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01396291
Composing Security Protocols: From Confidentiality to Privacy, Proc. 4th International Conference on Principles of Security and Trust (POST'15), pp.324-343, 2015. ,
DOI : 10.1007/978-3-662-46666-7_17
URL : http://arxiv.org/abs/1407.5444