Alfredo Pironti
Alfredo Pironti
INRIA, France
Verified email at inria.fr - Homepage
TitleCited byYear
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
2015 IEEE Symposium on Security and Privacy, 535-552, 2015
2282015
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub
2014 IEEE Symposium on Security and Privacy, 98-113, 2014
1932014
Implementing TLS with verified cryptographic security
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub
2013 IEEE Symposium on Security and Privacy, 445-459, 2013
1702013
Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH
K Bhargavan, G Leurent
822016
Proving the TLS handshake secure (as it is)
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ...
Annual Cryptology Conference, 235-255, 2014
802014
Formal vulnerability analysis of a security system for remote fieldbus access
M Cheminod, A Pironti, R Sisto
IEEE Transactions on Industrial Informatics 7 (1), 30-40, 2011
522011
Formal verification of security protocol implementations: a survey
M Avalle, A Pironti, R Sisto
Formal Aspects of Computing 26 (1), 99-123, 2014
502014
Truncating {TLS} Connections to Violate Beliefs in Web Applications
B Smyth, A Pironti
Presented as part of the 7th {USENIX} Workshop on Offensive Technologies, 2013
362013
The Java SPI framework for security protocol implementation
M Avalle, A Pironti, R Sisto, D Pozza
2011 Sixth International Conference on Availability, Reliability and …, 2011
352011
Deprecating secure sockets layer version 3.0
R Barnes, M Thomson, A Pironti, A Langley
IETF RFC 7568, 2015
252015
Provably correct Java implementations of Spi Calculus security protocols specifications
A Pironti, R Sisto
Computers & Security 29 (3), 302-314, 2010
252010
Transport Layer Security (TLS) session hash and extended master secret extension
M Ray, A Pironti, A Langley, K Bhargavan, A Delignat-Lavaud
Transport, 2015
242015
{FLEXTLS}: A Tool for Testing {TLS} Implementations
B Beurdouche, A Delignat-Lavaud, N Kobeissi, A Pironti, K Bhargavan
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
242015
An experiment in interoperable cryptographic protocol implementation using automatic code generation
A Pironti, R Sisto
2007 12th IEEE Symposium on Computers and Communications, 839-844, 2007
242007
Verified Contributive Channel Bindings for Compound Authentication.
K Bhargavan, A Delignat-Lavaud, A Pironti
NDSS, 2015
192015
Formally based semi-automatic implementation of an open security protocol
A Pironti, D Pozza, R Sisto
Journal of Systems and Software 85 (4), 835-849, 2012
162012
From Computationally-Proved Protocol Specifications to Implementations and Application to SSH.
D Cadé, B Blanchet
JoWUA 4 (1), 4-31, 2013
152013
Identifying website users by TLS traffic analysis: New attacks and effective countermeasures
A Pironti, PY Strub, K Bhargavan
INRIA, 2012
92012
Formally-based black-box monitoring of security protocols
A Pironti, J Jürjens
International Symposium on Engineering Secure Software and Systems, 79-95, 2010
92010
Soundness conditions for message encoding abstractions in formal security protocol models
A Pironti, R Sisto
2008 Third International Conference on Availability, Reliability and …, 2008
92008
The system can't perform the operation now. Try again later.
Articles 1–20