A messy state of the union: Taming the composite state machines of TLS B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... 2015 IEEE Symposium on Security and Privacy, 535-552, 2015 | 338 | 2015 |
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub 2014 IEEE Symposium on Security and Privacy, 98-113, 2014 | 249 | 2014 |
Implementing TLS with verified cryptographic security K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub 2013 IEEE Symposium on Security and Privacy, 445-459, 2013 | 227 | 2013 |
Proving the TLS handshake secure (as it is) K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ... Annual Cryptology Conference, 235-255, 2014 | 103 | 2014 |
Formal verification of security protocol implementations: a survey M Avalle, A Pironti, R Sisto Formal Aspects of Computing 26 (1), 99-123, 2014 | 73 | 2014 |
Deprecating secure sockets layer version 3.0 R Barnes, M Thomson, A Pironti, A Langley | 61 | 2015 |
Formal vulnerability analysis of a security system for remote fieldbus access M Cheminod, A Pironti, R Sisto IEEE Transactions on Industrial Informatics 7 (1), 30-40, 2011 | 59 | 2011 |
Truncating {TLS} Connections to Violate Beliefs in Web Applications B Smyth, A Pironti 7th USENIX Workshop on Offensive Technologies (WOOT 13), 2013 | 41 | 2013 |
The Java SPI framework for security protocol implementation M Avalle, A Pironti, R Sisto, D Pozza 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 39 | 2011 |
{FLEXTLS}: A Tool for Testing {TLS} Implementations B Beurdouche, A Delignat-Lavaud, N Kobeissi, A Pironti, K Bhargavan 9th USENIX Workshop on Offensive Technologies (WOOT 15), 2015 | 34 | 2015 |
Provably correct Java implementations of Spi Calculus security protocols specifications A Pironti, R Sisto Computers & Security 29 (3), 302-314, 2010 | 31 | 2010 |
An experiment in interoperable cryptographic protocol implementation using automatic code generation A Pironti, R Sisto 2007 12th IEEE Symposium on Computers and Communications, 839-844, 2007 | 26 | 2007 |
Transport Layer Security (TLS) session hash and extended master secret extension K Bhargavan, A Delignat-Lavaud, A Pironti, A Langley, M Ray | 25 | 2015 |
Verified Contributive Channel Bindings for Compound Authentication. K Bhargavan, A Delignat-Lavaud, A Pironti NDSS, 2015 | 24 | 2015 |
Identifying website users by TLS traffic analysis: New attacks and effective countermeasures A Pironti, PY Strub, K Bhargavan INRIA, 2012 | 17 | 2012 |
Formally based semi-automatic implementation of an open security protocol A Pironti, D Pozza, R Sisto Journal of Systems and Software 85 (4), 835-849, 2012 | 17 | 2012 |
Formally-based black-box monitoring of security protocols A Pironti, J Jürjens International Symposium on Engineering Secure Software and Systems, 79-95, 2010 | 11 | 2010 |
Soundness conditions for message encoding abstractions in formal security protocol models A Pironti, R Sisto 2008 Third International Conference on Availability, Reliability and …, 2008 | 10 | 2008 |
Automated formal methods for security protocol engineering A Pironti, D Pozza, R Sisto Cyber Security Standards, Practices and Industrial Applications: Systems and …, 2012 | 7 | 2012 |
Sound automatic implementation generation and monitoring of security protocol implementations from verified formal specifications A Pironti Politecnico di Torino, Torino, Italy, 2010 | 7 | 2010 |