Charlie Jacomme
Charlie Jacomme
Home
Publications
Teaching
Non Academic Materials
Contact
Light
Dark
Automatic
Publications
Type
Conference paper
Journal article
Thesis
Date
2023
2022
2021
2020
2019
2018
Cas Cremers
,
Charlie Jacome
,
Philip Lukert
(2023).
Subterm-based proof techniques for improving the automation and scope of security protocol analysis
.
Proceedings of the 36th IEEE Computer Security Foundations Symposium (CSF'23)
.
PDF
Cite
Vincent Cheval
,
Cas Cremers
,
Alexander Dax
,
Lucca Hirschi
,
Charlie Jacomme
,
Steve Kremer
(2023).
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
.
USENIX Security Symposium (USENIX Security), 2023
🏆
Distinguished Paper Award
.
PDF
Cite
Cas Cremers
,
Charlie Jacomme
,
Aurora Naska
(2023).
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations
.
USENIX Security Symposium (USENIX Security), 2023
.
Cite
Cas Cremers
,
Alexander Dax
,
Charlie Jacomme
,
Mang Zhao
(2023).
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security
.
USENIX Security Symposium (USENIX Security), 2023.
🏆
Distinguished Paper Award
.
Cite
Charlie Jacomme
,
Elise Klein
,
Steve Kremer
,
Maïwenn Racouchot
(2023).
A comprehensive, formal and automated analysis of the EDHOC protocol
.
USENIX Security Symposium (USENIX Security), 2023
.
PDF
Cite
Vincent Cheval
,
Charlie Jacomme
,
Steve Kremer
,
Robert Künnemann
(2022).
SAPIC+: protocol verifiers of the world, unite!
.
USENIX Security Symposium (USENIX Security), 2022
.
PDF
Cite
Cas Cremers
,
Caroline Fontaine
,
Charlie Jacomme
(2022).
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
.
Proceedings of the 43nd IEEE Symposium on Security and Privacy (S&P'22)
.
PDF
Cite
Gilles Barthe
,
Charlie Jacomme
,
Steve Kremer
(2021).
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields
.
ACM Trans. Comput. Logic
.
PDF
Cite
DOI
URL
David Baelde
,
Stéphanie Delaune
,
Adrien Koutsos
,
Charlie Jacomme
,
Solène Moreau
(2021).
An interactive prover for protocol verification in the computational model
.
IEEE Symposium on Security and Privacy (S&P'21)
.
PDF
Cite
Charlie Jacomme
,
Steve Kremer
(2021).
An extensive formal analysis of multi-factor authentication protocols
.
ACM Transactions on Privacy and Security (TOPS)
.
PDF
Cite
Hubert Comon
,
Charlie Jacomme
,
Guillaume Scerri
(2020).
Oracle simulation: a technique for protocol composition with long term shared secrets
.
Proceedings of the 27st ACM Conference on Computer and Communications Security (CCS'20)
.
PDF
Cite
Long Version
Charlie Jacomme
(2020).
Proofs of Security Protocols - Symbolic Methods and Powerful Attackers
.
PDF
Cite
URL
Gilles Barthe
,
Charlie Jacomme
,
Steve Kremer
(2020).
Universal equivalence and majority on probabilistic programs over finite fields
.
Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS'20)
.
PDF
Cite
Gilles Barthe
,
Benjamin Grégoire
,
Charlie Jacomme
,
Steve Kremer
,
Pierre-Yves Strub
(2019).
Symbolic methods in computational cryptography proofs
.
Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'19)
.
PDF
Cite
DOI
URL
Gilles Barthe
,
Xiong Fan
,
Joshua Gancher
,
Benjamin Grégoire
,
Charlie Jacomme
,
Elaine Shi
(2018).
Symbolic Proofs for Lattice-Based Cryptography
.
Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS'18)
.
PDF
Cite
URL
Charlie Jacomme
,
Steve Kremer
(2018).
An extensive formal analysis of multi-factor authentication protocols
.
Proceedings of the 31st IEEE Computer Security Foundations Symposium (CSF'18)
.
PDF
Cite
DOI
URL
Charlie Jacomme
,
Steve Kremer
,
Guillaume Scerri
(2018).
Symbolic Models for Isolated Execution Environments
.
Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS&P'17)
.
PDF
Cite
DOI
URL
Cite
×