, The Tamarin Manual, pp.2018-2023, 2018.
3G Security: Formal Analysis of the 3G Authentication Protocol. TS 33, vol.902, 2001. ,
Security architecture and procedures for 5G system, TS 33, vol.501, 2018. ,
New privacy issues in mobile telephony: fix and verification, Proceedings of the 2012 ACM conference on Computer and communications security, pp.205-216, 2012. ,
Provably repairing the ISO/IEC 9798 standard for entity authentication, Journal of Computer Security, vol.21, pp.817-846, 2013. ,
Improving the security of cryptographic protocol standards, IEEE Security & Privacy, vol.13, pp.24-31, 2015. ,
, A Formal Analysis of 5G Authentication, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01898050
Tamarin models, proofs and instructions for reproducibility, pp.2018-2026, 2018. ,
Automated symbolic proofs of observational equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01337409
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate, 2017 IEEE Symposium on Security and Privacy (SP), pp.483-502, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01575920
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, Foundations and Trends in Privacy and Security, vol.1, pp.1-135, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423760
, New Adventures in Spying 3G & 4G Users: Locate, Track, 2017.
On a limitation of BAN logic, Workshop on the Theory and Application of of Cryptographic Techniques, pp.240-247, 1993. ,
DEEPSEC: Deciding Equivalence Properties in Security Protocols-Theory and Practice, Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P'18), pp.529-546, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01698177
On post-compromise security, Computer Security Foundations Symposium (CSF), 2016 IEEE 29th, pp.164-178, 2016. ,
A Comprehensive Symbolic Analysis of TLS 1.3, ACM CCS 2017: Proceedings of the 24th ACM Conference on Computer and Communications Security, pp.1773-1788, 2017. ,
A Comprehensive Symbolic Analysis of TLS 1.3, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1773-1788, 2017. ,
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication, IEEE Symposium on Security and Privacy, 2016. ,
Authentication vulnerability in the most recent 5G AKA drafts, 2018. ,
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, pp.198-208, 1981. ,
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR, 31st IEEE Computer Security Foundations Symposium, CSF 2018, pp.359-373, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01780603
Achieving better privacy for the 3GPP AKA protocol, Proceedings on Privacy Enhancing Technologies, vol.4, pp.255-275, 2016. ,
Let Me Answer That for You: Exploiting Broadcast Information in Cellular Networks, 22Nd USENIX Conference on Security. USENIX Association, 2013. ,
Global Mobile Trends, pp.2018-2023, 2017. ,
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE, Network and Distributed Systems Security (NDSS) Symposium, 2018. ,
Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach, IEEE European Symposium on Security and Privacy, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01575923
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM, pp.257-272, 2013. ,
A Hierarchy of Authentication Specifications, 10th Computer Security Foundations Workshop, 1997. ,
Advancing automated security protocol verification, Ph.D. Dissertation. ETH Zurich, 2013. ,
The TAMARIN Prover for the Symbolic Analysis of Security Protocols, CAV, vol.8044, pp.696-701, 2013. ,
Mobile subscriber WiFi Privacy, 2017 IEEE Security and Privacy Workshops, pp.169-178, 2017. ,
On Security Research towards Future Mobile Network Generations, IEEE Communications Surveys & Tutorials, 2018. ,
Automated analysis of Diffie-Hellman protocols and advanced security properties, Computer Security Foundations Symposium (CSF). IEEE, pp.78-94, 2012. ,
Automated Verification of Group Key Agreement Protocols, Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP '14), pp.179-194, 2014. ,
Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems, 23nd Annual Network and Distributed System Security Symposium, 2016. ,
Defeating IMSI Catchers, Proceedings of the 2015 ACM Conference on Computer and Communications Security-CCS '15, 2015. ,