Cédric Fournet

Affiliations:
  • Microsoft Research


According to our database1, Cédric Fournet authored at least 113 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Why Should I Trust Your Code?
Commun. ACM, January, 2024

2023
Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
ACM Queue, 2023

Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High Availability.
Proc. VLDB Endow., 2023

Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions.
Proceedings of the 32nd USENIX Security Symposium, 2023

Confidential Computing within an AI Accelerator.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

ASN1*: Provably Correct, Non-malleable Parsing for ASN.1 DER.
Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2023

2022
Confidential Machine Learning within Graphcore IPUs.
CoRR, 2022

IA-CCF: Individual Accountability for Permissioned Ledgers.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

2021
Toward Confidential Cloud Computing: Extending hardware-enforced cryptographic protection to data while in use.
ACM Queue, 2021

Key-schedule Security for the TLS 1.3 Standard.
IACR Cryptol. ePrint Arch., 2021

PAC: Practical Accountability for CCF.
CoRR, 2021

Toward confidential cloud computing.
Commun. ACM, 2021

AMP: authentication of media via provenance.
Proceedings of the MMSys '21: 12th ACM Multimedia Systems Conference, Istanbul, Turkey, 28 September 2021, 2021

2020
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.
IACR Cryptol. ePrint Arch., 2020

AMP: Authentication of Media via Provenance.
CoRR, 2020


2019
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider.
IACR Cryptol. ePrint Arch., 2019

EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Recalling a witness: foundations and applications of monotonic state.
Proc. ACM Program. Lang., 2018

The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication.
J. ACM, 2018

A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2018

State Separation for Code-Based Game-Playing Proofs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Verified low-level programming embedded in F.
Proc. ACM Program. Lang., 2017

A Monadic Framework for Relational Verification (Functional Pearl).
CoRR, 2017

Verified Low-Level Programming Embedded in F<sup>*</sup>.
CoRR, 2017

A messy state of the union: taming the composite state machines of TLS.
Commun. ACM, 2017


2016
miTLS: Verifying Protocol Implementations against Real-World Attacks.
IEEE Secur. Priv., 2016

Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.
IACR Cryptol. ePrint Arch., 2016

Implementing and Proving the TLS 1.3 Record Layer.
IACR Cryptol. ePrint Arch., 2016

Downgrade Resilience in Key-Exchange Protocols.
IACR Cryptol. ePrint Arch., 2016

Oblivious Multi-Party Machine Learning on Trusted Processors.
Proceedings of the 25th USENIX Security Symposium, 2016

Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Dependent types and multi-monadic effects in F.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

A Certified Compiler for Verifiable Computing.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Verified Secure Implementations for the HTTPS Ecosystem: Invited Talk.
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016

Formal Verification of Smart Contracts: Short Paper.
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016

2015
VC3: Trustworthy Data Analytics in the Cloud Using SGX.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Safe & Efficient Gradual Typing for TypeScript.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

Observing and Preventing Leakage in MapReduce.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Square Span Programs with Applications to Succinct NIZK Arguments.
IACR Cryptol. ePrint Arch., 2014

Geppetto: Versatile Verifiable Computation.
IACR Cryptol. ePrint Arch., 2014

Proving the TLS Handshake Secure (as it is).
IACR Cryptol. ePrint Arch., 2014

Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Gradual typing embedded securely in JavaScript.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

Probabilistic relational verification for cryptographic implementations.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

2013
Secure distributed programming with value-dependent types.
J. Funct. Program., 2013

ZQL: A Compiler for Privacy-Preserving Data Processing.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Implementing TLS with Verified Cryptographic Security.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Fully abstract compilation to JavaScript.
Proceedings of the 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2013

Pinocchio coin: building zerocoin from a succinct pairing-based proof system.
Proceedings of the PETShop'13, 2013

Smart meter aggregation via secret-sharing.
Proceedings of the SEGS'13, 2013

2012
Verified Cryptographic Implementations for TLS.
ACM Trans. Inf. Syst. Secur., 2012

Self-certification: bootstrapping certified typecheckers in F* with Coq.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

2011
Refinement types for secure implementations.
ACM Trans. Program. Lang. Syst., 2011

Cryptographic Verification by Typing for a Sample Protocol Implementation.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

Compiling Information-Flow Security to Minimal Trusted Computing Bases.
Proceedings of the Programming Languages and Systems, 2011

Information-flow types for homomorphic encryptions.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Modular code-based cryptographic verification.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Principles and Applications of Refinement Types.
Proceedings of the Logics and Languages for Reliability and Security, 2010

SecPAL: Design and semantics of a decentralized authorization language.
J. Comput. Secur., 2010

Modular verification of security protocol code by typing.
Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2010

Typechecking Higher-Order Security Libraries.
Proceedings of the Programming Languages and Systems - 8th Asian Symposium, 2010

2009
Reliable Evidence: Auditability by Typing.
Proceedings of the Computer Security, 2009

Cryptographic Protocol Synthesis and Verification for Multiparty Sessions.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Secure Enforcement for Global Process Specifications.
Proceedings of the CONCUR 2009 - Concurrency Theory, 20th International Conference, 2009

A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Verified interoperable implementations of security protocols.
ACM Trans. Program. Lang. Syst., 2008

Verifying policy-based web services security.
ACM Trans. Program. Lang. Syst., 2008

Automated verification of selected equivalences for security protocols.
J. Log. Algebraic Methods Program., 2008

A secure compiler for session abstractions.
J. Comput. Secur., 2008

Cryptographically sound implementations for typed information-flow security.
Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2008

Code-Carrying Authorization.
Proceedings of the Computer Security, 2008

A Formal Implementation of Value Commitment.
Proceedings of the Programming Languages and Systems, 2008

Verified implementations of the information card federated identity-management protocol.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Cryptographically verified implementations for TLS.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
A type discipline for authorization policies.
ACM Trans. Program. Lang. Syst., 2007

Secure sessions for Web services.
ACM Trans. Inf. Syst. Secur., 2007

Just fast keying in the pi calculus.
ACM Trans. Inf. Syst. Secur., 2007

A Type Discipline for Authorization in Distributed Systems.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

Secure Implementations for Typed Session Abstractions.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

Design and Semantics of a Decentralized Authorization Language.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Verified Reference Implementations of WS-Security Protocols.
Proceedings of the Web Services and Formal Methods, Third International Workshop, 2006

Cryptographically Sound Implementations for Communicating Processes.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Computational Secrecy by Typing for the Pi Calculus.
Proceedings of the Programming Languages and Systems, 4th Asian Symposium, 2006

2005
A semantics for web services authentication.
Theor. Comput. Sci., 2005

A hierarchy of equivalences for asynchronous calculi.
J. Log. Algebraic Methods Program., 2005

An advisor for web services security policies.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

2004
Modern concurrency abstractions for C#.
ACM Trans. Program. Lang. Syst., 2004

Private authentication.
Theor. Comput. Sci., 2004

Ethernet Topology Discovery without Network Assistance.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

From Stack Inspection to Access Control: A Security Analysis for Libraries.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

Verifying policy-based security for web services.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Stuck-Free Conformance.
Proceedings of the Computer Aided Verification, 16th International Conference, 2004

2003
Stack inspection: Theory and variants.
ACM Trans. Program. Lang. Syst., 2003

Inheritance in the join calculus.
J. Log. Algebraic Methods Program., 2003

Access Control Based on Execution History.
Proceedings of the Network and Distributed System Security Symposium, 2003

TulaFale: A Security Tool for Web Services.
Proceedings of the Formal Methods for Components and Objects, 2003

2002
Hiding Names: Private Authentication in the Applied Pi Calculus.
Proceedings of the Software Security -- Theories and Systems, 2002

Modern Concurrency Abstractions for C<sup>#</sup>.
Proceedings of the ECOOP 2002, 2002

JoCaml: A Language for Concurrent Distributed and Mobile Programming.
Proceedings of the Advanced Functional Programming, 2002

2001
Bisimulations in the join-calculus.
Theor. Comput. Sci., 2001

Mobile values, new names, and secure communication.
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001

2000
Authentication Primitives and Their Compilation.
Proceedings of the POPL 2000, 2000

An Asynchronous, Distributed Implementation of Mobile Ambients.
Proceedings of the Theoretical Computer Science, 2000

The Join Calculus: A Language for Distributed Mobile Programming.
Proceedings of the Applied Semantics, International Summer School, 2000

1999
Secure Communications Processing for Distributed Languages.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

A Top-Down Look at a Secure Message.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1999

1998
Bisimulations in the join-calculus.
Proceedings of the Programming Concepts and Methods, 1998

1997
Secure Implementation of Channel Abstractions.
Proceedings of the Second Workshop on Higher-Order Operational Techniques in Semantics, 1997

Implicit Typing à la ML for the Join-Calculus.
Proceedings of the CONCUR '97: Concurrency Theory, 1997

1996
The Reflexive CHAM and the Join-Calculus.
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996

A Calculus of Mobile Agents.
Proceedings of the CONCUR '96, 1996


  Loading...