Pironti, A., D. Pozza, and R. Sisto,
"Automated Formal Methods for Security Protocol Engineering",
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies: IGI Global, pp. 138–166, 2011.
Abstract
Download: cssigi11.pdf (369.13 KB)
|
Bhargavan, K., A. Delignat-Lavaud, and A. Pironti,
"Verified Contributive Channel Bindings for Compound Authentication",
ISOC Network and Distributed System Security Symposium (NDSS 15), 2015.
Abstract
Download: ndss15.pdf (540.3 KB)
|
Beurdouche, B., K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, A. Pironti, P. - Y. Strub, and J. K. Zinzindohoue,
"A Messy State of the Union: Taming the Composite State Machines of TLS",
IEEE Symposium on Security & Privacy 2015 (S&P 15), 2015.
Abstract
Download: sp15.pdf (600.15 KB)
|
Beurdouche, B., A. Delignat-Lavaud, N. Kobeissi, A. Pironti, and K. Bhargavan,
"FLEXTLS: A Tool for Testing TLS Implementations",
USENIX Workshop on Offensive Technologies (WOOT 15), 2015.
Abstract
Download: woot15.pdf (500.25 KB)
|
Bhargavan, K., C. Fournet, M. Kohlweiss, A. Pironti, P. - Y. Strub, and S. Zanella Béguelin,
"Proving the TLS Handshake Secure (as it is)",
CRYPTO 14, pp. 235–255, 2014.
Abstract
Download: crypto14.pdf (783.93 KB)
|
Bhargavan, K., A. Delignat-Lavaud, C. Fournet, A. Pironti, and P. - Y. Strub,
"Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS",
IEEE Symposium on Security & Privacy (S&P 14), pp. 98–113, 2014.
Abstract
Download: sp14.pdf (703.27 KB)
|
Smyth, B., and A. Pironti,
"Truncating TLS Connections to Violate Beliefs in Web Applications",
USENIX Workshop on Offensive Technologies (WOOT 13), 2013.
Abstract
Download: woot13.pdf (124.48 KB)
|
Bhargavan, K., C. Fournet, M. Kohlweiss, A. Pironti, and P. - Y. Strub,
"Implementing TLS with Verified Cryptographic Security",
IEEE Symposium on Security & Privacy (Oakland 13), pp. 445–459, 2013.
Abstract
Download: oakland13.pdf (417.74 KB)
|
Bettassa Copet, P., A. Pironti, D. Pozza, R. Sisto, and P. Vivoli,
"Visual Model-Driven Design, Verification and Implementation of Security Protocols",
IEEE International Symposium on High Assurance Systems Engineering (HASE 12): IEEE Computer Security, pp. 62–65, 2012.
Abstract
Download: hase12.pdf (3.19 MB)
|
Avalle, M., A. Pironti, R. Sisto, and D. Pozza,
"The {JavaSPI} Framework for Security Protocol Implementation",
Availability, Reliability and Security (ARES 11): IEEE Computer Society, pp. 746–751, 2011.
Abstract
Download: secse11.pdf (544.1 KB)
|
Pironti, A., and J. Jürjens,
"Formally-Based Black-Box Monitoring of Security Protocols",
International Symposium on Engineering Secure Software and Systems (ESSoS 10): IEEE Computer Society, pp. 79–95, 2010.
Abstract
Download: essos10.pdf (305.82 KB)
|
Pironti, A., and R. Sisto,
"Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models",
Availability, Reliability and Security (ARES 08): IEEE Computer Society, pp. 72–79, 2008.
Abstract
Download: ares08.pdf (219.21 KB)
|
Pironti, A., and R. Sisto,
"Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models",
International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 08): IEEE Computer Society, pp. 31–38, 2008.
Abstract
Download: depcos08.pdf (171.83 KB)
|
Pironti, A., and R. Sisto,
"Formally Sound Refinement of {S}pi {C}alculus Protocol Specifications into {J}ava Code",
IEEE High Assurance Systems Engineering Symposium (HASE 08): IEEE Computer Society, pp. 241–250, 2008.
Abstract
Download: hase08.pdf (230.16 KB)
|
Pironti, A., and R. Sisto,
"An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation",
IEEE Symposium on Computers and Communications (ISCC 07): IEEE Computer Society, pp. 839–844, 2007.
Abstract
Download: iscc07.pdf (127.59 KB)
|
Pironti, A., and R. Sisto,
"Safe Abstractions of Data Encodings in Formal Security Protocol Models",
Formal Aspects of Computing, pp. 1-43, 2012.
Abstract
Download: faoc12.pdf (648.58 KB)
|
Pironti, A., D. Pozza, and R. Sisto,
"Formally-Based Semi-Automatic Implementation of an Open Security Protocol",
Journal of Systems and Software, vol. 85, issue 4: Elsevier, pp. 835–849, 2012.
Abstract
Download: jss11.pdf (472.29 KB)
|
Avalle, M., A. Pironti, and R. Sisto,
"Formal verification of security protocol implementations: a survey",
Formal Aspects of Computing, pp. 1-25, 2012.
Abstract
Download: cf11.pdf (409.27 KB)
|
Cheminod, M., A. Pironti, and R. Sisto,
"Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access",
IEEE Transactions on Industrial Informatics, vol. 7, issue 1, pp. 30–40, 2011.
Abstract
Download: tii10.pdf (1.98 MB)
|
Avalle, M., A. Pironti, D. Pozza, and R. Sisto,
"{JavaSPI}: A Framework for Security Protocol Implementation",
International Journal of Secure Software Engineering, vol. 2, issue 4: IGI Global, pp. 34–48, 2011.
Abstract
Download: ijsse11.pdf (1.26 MB)
|
Pironti, A., and R. Sisto,
"Provably Correct {J}ava Implementations of {S}pi {C}alculus Security Protocols Specifications",
Computers & Security, vol. 29, issue 3: Elsevier, pp. 302–314, 2010.
Abstract
Download: cose10.pdf (194.69 KB)
|
Bhargavan, K., A. Delignat-Lavaud, A. Pironti, A. Langley, and M. Ray,
Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension,
, RFC 7627, 2015.
Abstract
|
Barnes, R., M. Thomson, A. Pironti, and A. Langley,
Deprecating Secure Sockets Layer Version 3.0,
, RFC 7568, 2015.
Abstract
|
Pironti, A.,
Monitoring message size to break privacy,
, W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT), 2014.
Abstract
Download: strint14.pdf (127.58 KB)
|
Smyth, B., and A. Pironti,
Truncating TLS Connections to Violate Beliefs in Web Applications,
, Black Hat USA, 2013.
Abstract
|
Pironti, A.,
Sound Automatic Implementation Generation and Monitoring of Security Protocol Implementations from Verified Formal Specifications,
: Politecnico di Torino (Italy), 2010.
Download: Pironti_Dissertation.pdf (1.31 MB)
|
Pironti, A., P. - Y. Strub, and K. Bhargavan,
Identifying Website Users by TLS Traffic Analysis: New Attacks and Effective Countermeasures, Revision 1,
, no. 8067: INRIA Paris Rocquencourt, 2012.
Abstract
Download: tls-identification.pdf (1.09 MB)
|
Pironti, A., and R. Sisto,
Correctness-Preserving Translation from Spi Calculus to Java, Revision 3,
: Politecnico di Torino (Italy), 2009.
Abstract
Download: translation.pdf (300.66 KB)
|
Pironti, A., and J. Jürjens,
Black-Box Monitoring of Security Protocols, Revision 1,
: Politecnico di Torino (Italy), Microsoft Research Cambridge (UK) and Open University (UK), 2009.
Abstract
Download: monitoring1.pdf (340.82 KB)
|
Pironti, A., and R. Sisto,
Reasoning About Some Security Protocol Implementation Details, Revision 4,
: Politecnico di Torino (Italy), 2008.
Abstract
Download: encodings.pdf (388.28 KB)
|