Alfredo Pironti

Affiliations:
  • INRIA, France
  • Politecnico Di Torino, Italy (PhD 2010)


According to our database1, Alfredo Pironti authored at least 15 papers between 2007 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
FLEXTLS: A Tool for Testing TLS Implementations.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

A Messy State of the Union: Taming the Composite State Machines of TLS.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Verified Contributive Channel Bindings for Compound Authentication.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Proving the TLS Handshake Secure (As It Is).
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Truncating TLS Connections to Violate Beliefs in Web Applications.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

Implementing TLS with Verified Cryptographic Security.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Visual Model-Driven Design, Verification and Implementation of Security Protocols.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
The Java SPI Framework for Security Protocol Implementation.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Sound automatic implementation generation and monitoring of security protocol implementations from verified formal specifications.
PhD thesis, 2010

Formally-Based Black-Box Monitoring of Security Protocols.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2008
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models.
Proceedings of the The Third International Conference on Availability, 2008

2007
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007


  Loading...