Cédric Fournet
Affiliations:- Microsoft Research
According to our database1,
Cédric Fournet
authored at least 115 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
ACM Queue, 2023
Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability.
Proc. VLDB Endow., 2023
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 2023 USENIX Annual Technical Conference, 2023
Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2023
2022
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022
2021
Toward Confidential Cloud Computing: Extending hardware-enforced cryptographic protection to data while in use.
ACM Queue, 2021
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
2018
Proc. ACM Program. Lang., 2018
J. ACM, 2018
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Commun. ACM, 2017
Proceedings of the 2nd Summit on Advances in Programming Languages, 2017
2016
IEEE Secur. Priv., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013
Proceedings of the PETShop'13, 2013
2012
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012
2011
Proceedings of the Foundations of Security Analysis and Design VI, 2011
Proceedings of the Programming Languages and Systems, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Logics and Languages for Reliability and Security, 2010
J. Comput. Secur., 2010
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010
Proceedings of the Programming Languages and Systems - 8th Asian Symposium, 2010
2009
Proceedings of the Computer Security, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the CONCUR 2009 - Concurrency Theory, 20th International Conference, 2009
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
ACM Trans. Program. Lang. Syst., 2008
J. Log. Algebraic Methods Program., 2008
Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2008
Proceedings of the Programming Languages and Systems, 2008
Verified implementations of the information card federated identity-management protocol.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
2006
Proceedings of the Web Services and Formal Methods, Third International Workshop, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Programming Languages and Systems, 4th Asian Symposium, 2006
2005
J. Log. Algebraic Methods Program., 2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
2004
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the Computer Aided Verification, 16th International Conference, 2004
2003
Proceedings of the Network and Distributed System Security Symposium, 2003
Proceedings of the Formal Methods for Components and Objects, 2003
2002
Proceedings of the Software Security -- Theories and Systems, 2002
Proceedings of the ECOOP 2002, 2002
Proceedings of the Advanced Functional Programming, 2002
2001
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001
2000
Proceedings of the Theoretical Computer Science, 2000
Proceedings of the Applied Semantics, International Summer School, 2000
1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1999
1998
Bisimulations in the join-calculus.
Proceedings of the Programming Concepts and Methods, 1998
1997
Proceedings of the Second Workshop on Higher-Order Operational Techniques in Semantics, 1997
Proceedings of the CONCUR '97: Concurrency Theory, 1997
1996
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996