Alfredo Pironti

According to our database1, Alfredo Pironti authored at least 23 papers between 2007 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Formally sound implementations of security protocols with JavaSPI.
Formal Aspects Comput., 2018

2017
A messy state of the union: taming the composite state machines of TLS.
Commun. ACM, 2017

2015
Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension.
RFC, September, 2015

Deprecating Secure Sockets Layer Version 3.0.
RFC, June, 2015

FLEXTLS: A Tool for Testing TLS Implementations.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Verified Contributive Channel Bindings for Compound Authentication.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Proving the TLS Handshake Secure (as it is).
IACR Cryptol. ePrint Arch., 2014

Safe abstractions of data encodings in formal security protocol models.
Formal Aspects Comput., 2014

Formal verification of security protocol implementations: a survey.
Formal Aspects Comput., 2014

Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2013
Truncating TLS Connections to Violate Beliefs in Web Applications.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

Implementing TLS with Verified Cryptographic Security.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Formally based semi-automatic implementation of an open security protocol.
J. Syst. Softw., 2012

Visual Model-Driven Design, Verification and Implementation of Security Protocols.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

2011
Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access.
IEEE Trans. Ind. Informatics, 2011

JavaSPI: A Framework for Security Protocol Implementation.
Int. J. Secur. Softw. Eng., 2011

The Java SPI Framework for Security Protocol Implementation.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Provably correct Java implementations of Spi Calculus security protocols specifications.
Comput. Secur., 2010

Formally-Based Black-Box Monitoring of Security Protocols.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2008
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models.
Proceedings of the The Third International Conference on Availability, 2008

2007
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007


  Loading...