Antoine Delignat-Lavaud

According to our database1, Antoine Delignat-Lavaud authored at least 38 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Why Should I Trust Your Code?
Commun. ACM, January, 2024

2023
Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
ACM Queue, 2023

Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability.
Proc. VLDB Endow., 2023

ASN1*: Provably Correct, Non-malleable Parsing for ASN.1 DER.
Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2023

2022
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement.
CoRR, 2022

IA-CCF: Individual Accountability for Permissioned Ledgers.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

2021
Toward Confidential Cloud Computing: Extending hardware-enforced cryptographic protection to data while in use.
ACM Queue, 2021

Key-schedule Security for the TLS 1.3 Standard.
IACR Cryptol. ePrint Arch., 2021

PAC: Practical Accountability for CCF.
CoRR, 2021

Toward confidential cloud computing.
Commun. ACM, 2021

2020
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.
IACR Cryptol. ePrint Arch., 2020


2019
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider.
IACR Cryptol. ePrint Arch., 2019

EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
State-Separating Proofs: A Reduction Methodology for Real-World Protocols.
IACR Cryptol. ePrint Arch., 2018

A Formal Treatment of Accountable Proxying Over TLS.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

State Separation for Code-Based Game-Playing Proofs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Verified low-level programming embedded in F.
Proc. ACM Program. Lang., 2017

Verified Low-Level Programming Embedded in F<sup>*</sup>.
CoRR, 2017

A messy state of the union: taming the composite state machines of TLS.
Commun. ACM, 2017


Formal Modeling and Verification for Domain Validation and ACME.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
On the security of authentication protocols on the web. (La sécurité des protocoles d'authentification sur leWeb).
PhD thesis, 2016

Implementing and Proving the TLS 1.3 Record Layer.
IACR Cryptol. ePrint Arch., 2016

Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Dependent types and multi-monadic effects in F.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Formal Verification of Smart Contracts: Short Paper.
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016

2015
Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension.
RFC, September, 2015

Network-based Origin Confusion Attacks against HTTPS Virtual Hosting.
Proceedings of the 24th International Conference on World Wide Web, 2015

FLEXTLS: A Tool for Testing TLS Implementations.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Verified Contributive Channel Bindings for Compound Authentication.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Discovering concrete attacks on website authorization by formal analysis.
J. Comput. Secur., 2014

Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Web PKI: Closing the Gap between Guidelines and Practices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Language-based Defenses Against Untrusted Browser Origins.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Defensive JavaScript - Building and Verifying Secure Web Components.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

2012
Web-based Attacks on Host-Proof Encrypted Storage.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012


  Loading...