M. Barbosa, B. Portela, G. Scerri, and B. Warinschi, Foundations of Hardware-Based Attested Computation and Application to SGX, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp.245-260, 2016.
DOI : 10.1109/EuroSP.2016.28

URL : https://hal.archives-ouvertes.fr/hal-01417137

D. Dolev and A. Yao, On the security of public key protocols, Proc. 22nd Symp. on Foundations of Computer Science (FOCS'81)

D. A. Basin, C. Cremers, and S. Meier, Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication, Journal of Computer Security, vol.21, issue.6, pp.817-846, 2013.
DOI : 10.1007/978-3-642-28641-4_8

M. Bortolozzo, M. Centenaro, R. Focardi, and G. Steel, Attacking and fixing PKCS#11 security tokens, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.260-269, 2010.
DOI : 10.1145/1866307.1866337

S. Kremer and R. Künnemann, Automated analysis of security protocols with global state, Journal of Computer Security, vol.18, issue.6, pp.1211-1245, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01351388

B. Schmidt, S. Meier, C. Cremers, and D. Basin, Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties, 2012 IEEE 25th Computer Security Foundations Symposium, pp.78-94, 2012.
DOI : 10.1109/CSF.2012.25

S. Costea and B. Warinschi, Secure Software Licensing: Models, Constructions, and Proofs, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.78-94, 2016.
DOI : 10.1109/CSF.2016.10

URL : https://research-information.bris.ac.uk/ws/files/77942068/Bogdan_Warinschi_Secure_Software_Licensing_Models_Constructions_and_Proofs.pdf

M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, and J. Del-cuvillo, Using innovative instructions to create trustworthy software solutions VC3: trustworthy data analytics in the cloud using SGX, Proc. 2nd Workshop on Hardware and Architectural Support for Security and Privacy Proc. 36th IEEE Symposium on Security and Privacy (S&P'15, pp.11-38, 2013.

R. Sinha, M. Costa, A. Lal, N. P. Lopes, S. K. Rajamani et al., A design and verification methodology for secure isolated regions, Proc. 37th ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI'16)
DOI : 10.1145/2908080.2908113

URL : http://people.eecs.berkeley.edu/~sseshia/pubdir/pldi16.pdf

M. Patrignani and D. Clarke, Fully abstract trace semantics for low-level isolation mechanisms, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, pp.1562-1569, 2014.
DOI : 10.1145/2554850.2554865

Y. Xu, W. Cui, and M. Peinado, Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems, 2015 IEEE Symposium on Security and Privacy, pp.640-656, 2015.
DOI : 10.1109/SP.2015.45

C. J. Cremers, The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, Proc. 20th International Conference on Computer Aided Verification (CAV'08), pp.414-418, 2008.
DOI : 10.1007/978-3-540-70545-1_38

S. Escobar, C. Meadows, and J. Meseguer, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, Lecture Notes in Computer Science, vol.20, issue.1-2, pp.1-50, 2009.
DOI : 10.1007/s10990-007-9000-6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.3197

M. Arapinis, E. Ritter, and M. Ryan, Statverif: Verification of stateful processes, Proc. 24th IEEE Computer Security Foundations Symposium (CSF'11, pp.33-47, 2011.

S. Delaune, S. Kremer, M. D. Ryan, and G. Steel, A Formal Analysis of Authentication in the TPM, Lecture Notes in Computer Science, vol.17, issue.4, pp.111-125, 2010.
DOI : 10.1007/978-3-540-74835-9_29

J. Shao, Y. Qin, D. Feng, and W. Wang, Formal Analysis of Enhanced Authorization in the TPM 2.0, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.273-284, 2015.
DOI : 10.1145/2714576.2714610

C. Bodei, P. Degano, R. Focardi, and C. Priami, Primitives for authentication in process algebras, Theoretical Computer Science, vol.283, issue.2, pp.271-304, 2002.
DOI : 10.1016/S0304-3975(01)00136-0

D. Hoshina, E. Sumii, and A. Yonezawa, A Typed Process Calculus for Fine-Grained Resource Access Control in Distributed Computation, Proc. 4th International Symposium on Theoretical Aspects of Computer Software (TACS'01), ser. Lecture Notes in Computer Science, pp.64-81, 2001.
DOI : 10.1007/3-540-45500-0_3

C. Jacomme, S. Kremer, and G. Scerri, Symbolic models for isolated execution environments, Cryptology ePrint Archive, vol.070, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01396291

M. Arapinis, V. Cheval, and S. Delaune, Composing Security Protocols: From Confidentiality to Privacy, Proc. 4th International Conference on Principles of Security and Trust (POST'15), pp.324-343, 2015.
DOI : 10.1007/978-3-662-46666-7_17

URL : http://arxiv.org/abs/1407.5444