Antoine Delignat-Lavaud
Antoine Delignat-Lavaud
Microsoft Research
Verified email at
TitleCited byYear
Formal verification of smart contracts: Short paper
K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ...
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis …, 2016
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
2015 IEEE Symposium on Security and Privacy, 535-552, 2015
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub
2014 IEEE Symposium on Security and Privacy, 98-113, 2014
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
ACM SIGPLAN Notices 51 (1), 256-270, 2016
Discovering concrete attacks on website authorization by formal analysis 1
C Bansal, K Bhargavan, A Delignat-Lavaud, S Maffeis
Journal of Computer Security 22 (4), 601-657, 2014
Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH
K Bhargavan, G Leurent
Verified low-level programming embedded in F
J Protzenko, JK Zinzindohoué, A Rastogi, T Ramananandro, P Wang, ...
Proceedings of the ACM on Programming Languages 1 (ICFP), 17, 2017
Implementing and proving the TLS 1.3 record layer
A Delignat-Lavaud, C Fournet, M Kohlweiss, J Protzenko, A Rastogi, ...
2017 IEEE Symposium on Security and Privacy (SP), 463-482, 2017
Keys to the cloud: formal analysis and concrete attacks on encrypted web storage
C Bansal, K Bhargavan, A Delignat-Lavaud, S Maffeis
International Conference on Principles of Security and Trust, 126-146, 2013
Language-based defenses against untrusted browser origins
K Bhargavan, A Delignat-Lavaud, S Maffeis
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
Everest: Towards a verified, drop-in replacement of HTTPS
K Bhargavan, B Bond, A Delignat-Lavaud, C Fournet, C Hawblitzel, ...
2nd Summit on Advances in Programming Languages (SNAPL 2017), 2017
Web-based Attacks on Host-Proof Encrypted Storage.
K Bhargavan, A Delignat-Lavaud
WOOT, 97-104, 2012
Web PKI: Closing the Gap between Guidelines and Practices.
A Delignat-Lavaud, M Abadi, A Birrell, I Mironov, T Wobber, Y Xie
NDSS, 2014
Cinderella: Turning shabby X. 509 certificates into elegant anonymous credentials with the magic of verifiable computation
A Delignat-Lavaud, C Fournet, M Kohlweiss, B Parno
2016 IEEE Symposium on Security and Privacy (SP), 235-254, 2016
Transport Layer Security (TLS) session hash and extended master secret extension
M Ray, A Pironti, A Langley, K Bhargavan, A Delignat-Lavaud
Transport, 2015
{FLEXTLS}: A Tool for Testing {TLS} Implementations
B Beurdouche, A Delignat-Lavaud, N Kobeissi, A Pironti, K Bhargavan
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
Verified Contributive Channel Bindings for Compound Authentication.
K Bhargavan, A Delignat-Lavaud, A Pironti
NDSS, 2015
Network-based origin confusion attacks against HTTPS virtual hosting
A Delignat-Lavaud, K Bhargavan
Proceedings of the 24th International Conference on World Wide Web, 227-237, 2015
Formal modeling and verification for domain validation and acme
K Bhargavan, A Delignat-Lavaud, N Kobeissi
International Conference on Financial Cryptography and Data Security, 561-578, 2017
Evercrypt: A fast, verified, cross-platform cryptographic provider
J Protzenko, B Parno, A Fromherz, C Hawblitzel, M Polubelova, ...
Cryptology ePrint Archive, Report 2019/757. https://eprint. iacr. org/2019/757, 2019
The system can't perform the operation now. Try again later.
Articles 1–20