Alfredo Pironti
Alfredo Pironti
INRIA, France
Verified email at - Homepage
Cited by
Cited by
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
Communications of the ACM 60 (2), 99-107, 2017
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub
2014 IEEE Symposium on Security and Privacy, 98-113, 2014
Implementing TLS with verified cryptographic security
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub
2013 IEEE Symposium on Security and Privacy, 445-459, 2013
Proving the TLS handshake secure (as it is)
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ...
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
Formal verification of security protocol implementations: a survey
M Avalle, A Pironti, R Sisto
Formal Aspects of Computing 26, 99-123, 2014
Deprecating secure sockets layer version 3.0
R Barnes, M Thomson, A Pironti, A Langley
Formal vulnerability analysis of a security system for remote fieldbus access
M Cheminod, A Pironti, R Sisto
IEEE Transactions on Industrial Informatics 7 (1), 30-40, 2011
Truncating {TLS} Connections to Violate Beliefs in Web Applications
B Smyth, A Pironti
7th {USENIX} Workshop on Offensive Technologies ({WOOT} 13), 2013
The Java SPI framework for security protocol implementation
M Avalle, A Pironti, R Sisto, D Pozza
2011 Sixth International Conference on Availability, Reliability and …, 2011
{FLEXTLS}: A Tool for Testing {TLS} Implementations
B Beurdouche, A Delignat-Lavaud, N Kobeissi, A Pironti, K Bhargavan
9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15), 2015
Provably correct Java implementations of Spi Calculus security protocols specifications
A Pironti, R Sisto
Computers & Security 29 (3), 302-314, 2010
An experiment in interoperable cryptographic protocol implementation using automatic code generation
A Pironti, R Sisto
2007 12th IEEE Symposium on Computers and Communications, 839-844, 2007
Transport Layer Security (TLS) session hash and extended master secret extension
K Bhargavan, A Delignat-Lavaud, A Pironti, A Langley, M Ray
Verified Contributive Channel Bindings for Compound Authentication.
K Bhargavan, A Delignat-Lavaud, A Pironti
NDSS, 2015
Identifying website users by TLS traffic analysis: New attacks and effective countermeasures
A Pironti, PY Strub, K Bhargavan
INRIA, 2012
Formally based semi-automatic implementation of an open security protocol
A Pironti, D Pozza, R Sisto
Journal of Systems and Software 85 (4), 835-849, 2012
Formally-based black-box monitoring of security protocols
A Pironti, J Jürjens
Engineering Secure Software and Systems: Second International Symposium …, 2010
Soundness conditions for message encoding abstractions in formal security protocol models
A Pironti, R Sisto
2008 Third International Conference on Availability, Reliability and …, 2008
Automated formal methods for security protocol engineering
A Pironti, D Pozza, R Sisto
Cyber Security Standards, Practices and Industrial Applications: Systems and …, 2012
Sound automatic implementation generation and monitoring of security protocol implementations from verified formal specifications
A Pironti
Politecnico di Torino, Torino, Italy, 2010
The system can't perform the operation now. Try again later.
Articles 1–20