, The Tamarin Manual, pp.2018-2023, 2018.

3. , 3G Security: Formal Analysis of the 3G Authentication Protocol. TS 33, vol.902, 2001.

3. , Security architecture and procedures for 5G system, TS 33, vol.501, 2018.

M. Arapinis, L. Mancini, E. Ritter, M. Ryan, and N. Golde, New privacy issues in mobile telephony: fix and verification, Proceedings of the 2012 ACM conference on Computer and communications security, pp.205-216, 2012.

D. Basin, C. Cremers, and S. Meier, Provably repairing the ISO/IEC 9798 standard for entity authentication, Journal of Computer Security, vol.21, pp.817-846, 2013.

D. Basin, C. Cremers, K. Miyazaki, S. Radomirovi?, and D. Watanabe, Improving the security of cryptographic protocol standards, IEEE Security & Privacy, vol.13, pp.24-31, 2015.

D. Basin, J. Dreier, L. Hirschi, S. Radomirovi?, R. Sasse et al., A Formal Analysis of 5G Authentication, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01898050

D. Basin, J. Dreier, L. Hirschi, S. Radomirovi?, R. Sasse et al., Tamarin models, proofs and instructions for reproducibility, pp.2018-2026, 2018.

D. Basin, J. Dreier, and R. Sasse, Automated symbolic proofs of observational equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01337409

K. Bhargavan, B. Blanchet, and N. Kobeissi, Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, 2017 IEEE Symposium on Security and Privacy (SP), pp.483-502, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575920

B. Blanchet, Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, Foundations and Trends in Privacy and Security, vol.1, pp.1-135, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423760

R. Borgaonkar, L. Hirshi, S. Park, A. Shaik, A. Martin et al., New Adventures in Spying 3G & 4G Users: Locate, Track, 2017.

C. Boyd and W. Mao, On a limitation of BAN logic, Workshop on the Theory and Application of of Cryptographic Techniques, pp.240-247, 1993.

V. Cheval, S. Kremer, and I. Rakotonirina, DEEPSEC: Deciding Equivalence Properties in Security Protocols-Theory and Practice, Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P'18), pp.529-546, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01698177

K. Cohn-gordon, C. Cremers, and L. Garratt, On post-compromise security, Computer Security Foundations Symposium (CSF), 2016 IEEE 29th, pp.164-178, 2016.

C. Cremers, M. Horvat, J. Hoyland, S. Scott, and T. Van-der-merwe, A Comprehensive Symbolic Analysis of TLS 1.3, ACM CCS 2017: Proceedings of the 24th ACM Conference on Computer and Communications Security, pp.1773-1788, 2017.

C. Cremers, M. Horvat, J. Hoyland, S. Scott, and T. Van-der-merwe, A Comprehensive Symbolic Analysis of TLS 1.3, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1773-1788, 2017.

C. Cremers, M. Horvat, S. Scott, and T. Van-der-merwe, Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication, IEEE Symposium on Security and Privacy, 2016.

M. Dehnel, -. , and C. Cremers, Authentication vulnerability in the most recent 5G AKA drafts, 2018.

D. Dolev and A. C. Yao, On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, pp.198-208, 1981.

J. Dreier, L. Hirschi, S. Radomirovi?, and R. Sasse, Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR, 31st IEEE Computer Security Foundations Symposium, CSF 2018, pp.359-373, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01780603

C. Pierre-alain-fouque, B. Onete, and . Richard, Achieving better privacy for the 3GPP AKA protocol, Proceedings on Privacy Enhancing Technologies, vol.4, pp.255-275, 2016.

N. Golde, K. Redon, and J. Seifert, Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks, 22Nd USENIX Conference on Security. USENIX Association, 2013.

. Gsma, Global Mobile Trends, pp.2018-2023, 2017.

O. Syed-rafiul-hussain, S. Chowdhury, E. Mehnaz, and . Bertino, LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE, Network and Distributed Systems Security (NDSS) Symposium, 2018.

N. Kobeissi, K. Bhargavan, and B. Blanchet, Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach, IEEE European Symposium on Security and Privacy, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01575923

R. Künnemann and G. Steel, YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM, pp.257-272, 2013.

G. Lowe, A Hierarchy of Authentication Specifications, 10th Computer Security Foundations Workshop, 1997.

S. Meier, Advancing automated security protocol verification, Ph.D. Dissertation. ETH Zurich, 2013.

S. Meier, B. Schmidt, J. F. Cas, D. Cremers, and . Basin, The TAMARIN Prover for the Symbolic Analysis of Security Protocols, CAV, vol.8044, pp.696-701, 2013.

R. Piers-o'hanlon, L. Borgaonkar, and . Hirschi, Mobile subscriber WiFi Privacy, 2017 IEEE Security and Privacy Workshops, pp.169-178, 2017.

D. Rupprecht, A. Dabrowski, T. Holz, E. Weippl, and C. Pöpper, On Security Research towards Future Mobile Network Generations, IEEE Communications Surveys & Tutorials, 2018.

B. Schmidt and S. Meier, Automated analysis of Diffie-Hellman protocols and advanced security properties, Computer Security Foundations Symposium (CSF). IEEE, pp.78-94, 2012.

B. Schmidt, R. Sasse, C. Cremers, and D. Basin, Automated Verification of Group Key Agreement Protocols, Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP '14), pp.179-194, 2014.

A. Shaik, J. Seifert, R. Borgaonkar, N. Asokan, and V. Niemi, Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems, 23nd Annual Network and Distributed System Security Symposium, 2016.

F. Van-den-broek, R. Verdult, and J. De-ruiter, Defeating IMSI Catchers, Proceedings of the 2015 ACM Conference on Computer and Communications Security-CCS '15, 2015.