Cédric Fournet
Orcid: 0000-0001-6929-886XAffiliations:
- Microsoft Research
 
  According to our database1,
  Cédric Fournet
  authored at least 118 papers
  between 1996 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
 
On csauthors.net:
Bibliography
  2025
Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks.
    
  
    CoRR, July, 2025
    
  
  2024
    ACM Queue, 2024
    
  
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
    
  
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
    
  
  2023
Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
    
  
    ACM Queue, 2023
    
  
Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability.
    
  
    Proc. VLDB Endow., 2023
    
  
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions.
    
  
    Proceedings of the 32nd USENIX Security Symposium, 2023
    
  
    Proceedings of the 2023 USENIX Annual Technical Conference, 2023
    
  
    Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2023
    
  
  2022
    Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
    
  
  2021
Toward Confidential Cloud Computing: Extending hardware-enforced cryptographic protection to data while in use.
    
  
    ACM Queue, 2021
    
  
    Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
    
  
    Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021
    
  
  2020
    Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
    
  
  2019
    IACR Cryptol. ePrint Arch., 2019
    
  
    Proceedings of the 28th USENIX Security Symposium, 2019
    
  
  2018
    Proc. ACM Program. Lang., 2018
    
  
    J. ACM, 2018
    
  
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
    
  
    Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2018
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
    
  
  2017
    Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
    
  
    Proceedings of the 2nd Summit on Advances in Programming Languages, 2017
    
  
  2016
    IEEE Secur. Priv., 2016
    
  
    Proceedings of the 25th USENIX Security Symposium, 2016
    
  
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
    
  
    Proceedings of the IEEE Symposium on Security and Privacy, 2016
    
  
    Proceedings of the IEEE Symposium on Security and Privacy, 2016
    
  
    Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016
    
  
    Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
    
  
    Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016
    
  
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
    
  
    Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016
    
  
  2015
    Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
    
  
    Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
    
  
    Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
    
  
    Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015
    
  
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
    
  
  2014
    Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
    
  
    Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014
    
  
    Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014
    
  
    Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
    
  
  2013
    Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
    
  
    Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
    
  
    Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013
    
  
    Proceedings of the PETShop'13, 2013
    
  
  2012
    Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012
    
  
  2011
    Proceedings of the Proceeding of the 16th ACM SIGPLAN international conference on Functional Programming, 2011
    
  
    Proceedings of the Foundations of Security Analysis and Design VI, 2011
    
  
    Proceedings of the Programming Languages and Systems, 2011
    
  
    Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
    
  
    Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
    
  
  2010
    Proceedings of the Logics and Languages for Reliability and Security, 2010
    
  
    J. Comput. Secur., 2010
    
  
    Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010
    
  
    Proceedings of the Programming Languages and Systems - 8th Asian Symposium, 2010
    
  
  2009
    Proceedings of the Computer Security, 2009
    
  
    Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
    
  
    Proceedings of the CONCUR 2009 - Concurrency Theory, 20th International Conference, 2009
    
  
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms.
    
  
    Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
    
  
  2008
    Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2008
    
  
    Proceedings of the Programming Languages and Systems, 2008
    
  
    Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
    
  
Verified implementations of the information card federated identity-management protocol.
    
  
    Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
    
  
    Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
    
  
  2007
    Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
    
  
    Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
    
  
    Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
    
  
  2006
    Proceedings of the Web Services and Formal Methods, Third International Workshop, 2006
    
  
    Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
    
  
    Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
    
  
    Proceedings of the Programming Languages and Systems, 4th Asian Symposium, 2006
    
  
  2005
    Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
    
  
    Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), 2005
    
  
    Proceedings of the Programming Languages and Systems, 2005
    
  
  2004
    Proceedings of the 1st ACM Workshop On Secure Web Services, 2004
    
  
    Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2004
    
  
    Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004
    
  
    Proceedings of the Programming Languages and Systems, 2004
    
  
    Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
    
  
    Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
    
  
    Proceedings of the Computer Aided Verification, 16th International Conference, 2004
    
  
  2003
    Proceedings of the Network and Distributed System Security Symposium, 2003
    
  
    Proceedings of the Formal Methods for Components and Objects, 2003
    
  
  2002
    Proceedings of the Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2002
    
  
    Proceedings of the Software Security -- Theories and Systems, 2002
    
  
    Proceedings of the ECOOP 2002, 2002
    
  
    Proceedings of the Advanced Functional Programming, 2002
    
  
  2001
    Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001
    
  
  2000
    Proceedings of the Theoretical Computer Science, 2000
    
  
    Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 2000
    
  
    Proceedings of the Applied Semantics, International Summer School, 2000
    
  
  1999
    Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
    
  
    Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1999
    
  
  1998
Bisimulations in the join-calculus.
  
    Proceedings of the Programming Concepts and Methods, 1998
    
  
    Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, 1998
    
  
    Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
    
  
  1997
    Proceedings of the CONCUR '97: Concurrency Theory, 1997
    
  
  1996
    Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996