Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lucca Hirschi is active.

Publication


Featured researches published by Lucca Hirschi.


international conference on concurrency theory | 2015

Partial Order Reduction for Security Protocols.

David Baelde; Stéphanie Delaune; Lucca Hirschi

Security protocols are concurrent processes that communicate using cryptography with the aim of achieving various security properties. Recent work on their formal verification has brought procedures and tools for deciding trace equivalence properties (e.g., anonymity, unlinkability, vote secrecy) for a bounded number of sessions. However, these procedures are based on a naive symbolic exploration of all traces of the considered processes which, unsurprisingly, greatly limits the scalability and practical impact of the verification tools. In this paper, we overcome this difficulty by developing partial order reduction techniques for the verification of security protocols. We provide reduced transition systems that optimally eliminate redundant traces, and which are adequate for model-checking trace equivalence properties of protocols by means of symbolic execution. We have implemented our reductions in the tool Apte, and demonstrated that it achieves the expected speedup on various protocols.


ieee symposium on security and privacy | 2016

A Method for Verifying Privacy-Type Properties: The Unbounded Case

Lucca Hirschi; David Baelde; Stéphanie Delaune

In this paper, we consider the problem of verifying anonymity and unlinkability in the symbolic model, where protocols are represented as processes in a variant of the applied pi calculus notably used in the ProVerif tool. Existing tools and techniques do not allow one to verify directly these properties, expressed as behavioral equivalences. We propose a different approach: we design two conditions on protocols which are sufficient to ensure anonymity and unlinkability, and which can then be effectively checked automatically using ProVerif. Our two conditions correspond to two broad classes of attacks on unlinkability, corresponding to data and control-flow leaks. This theoretical result is general enough to apply to a wide class of protocols. In particular, we apply our techniques to provide the first formal security proof of the BAC protocol (e-passport). Our work has also lead to the discovery of new attacks, including one on the LAK protocol (RFID authentication) which was previously claimed to be unlinkable (in a weak sense) and one on the PACE protocol (e-passport).


principles of security and trust | 2014

A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems

David Baelde; Stéphanie Delaune; Lucca Hirschi

Many privacy-type properties of security protocols can be modelled using trace equivalence properties in suitable process algebras. It has been shown that such properties can be decided for interesting classes of finite processes (i.e. without replication) by means of symbolic execution and constraint solving. However, this does not suffice to obtain practical tools. Current prototypes suffer from a classical combinatorial explosion problem caused by the exploration of many interleavings in the behaviour of processes. Modersheim et al. [18] have tackled this problem for reachability properties using partial order reduction techniques. We revisit their work, generalize it and adapt it for equivalence checking. We obtain an optimization in the form of a reduced symbolic semantics that eliminates redundant interleavings on the fly.


The Journal of Logic and Algebraic Programming | 2017

A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols

Stéphanie Delaune; Lucca Hirschi

Abstract Cryptographic protocols aim at securing communications over insecure networks such as the Internet, where dishonest users may listen to communications and interfere with them. A secure communication has a different meaning depending on the underlying application. It ranges from the confidentiality of a data to e.g. verifiability in electronic voting systems. Another example of a security notion is privacy . Formal symbolic models have proved their usefulness for analysing the security of protocols. Until quite recently, most results focused on trace properties like confidentiality or authentication. There are however several security properties, which cannot be defined (or cannot be naturally defined) as trace properties and require a notion of behavioural equivalence. Typical examples are anonymity, and privacy related properties. During the last decade, several results and verification tools have been developed to analyse equivalence-based security properties. We propose here a synthesis of decidability and undecidability results for equivalence-based security properties. Moreover, we give an overview of existing verification tools that may be used to verify equivalence-based security properties.


european symposium on research in computer security | 2018

POR for Security Protocol Equivalences - Beyond Action-Determinism.

David Baelde; Stéphanie Delaune; Lucca Hirschi

Formal methods have proved effective to automatically analyse protocols. Recently, much research has focused on verifying trace equivalence on protocols, which is notably used to model interesting privacy properties such as anonymity or unlinkability. Several tools for checking trace equivalence rely on a naive and expensive exploration of all interleavings of concurrent actions, which calls for partial-order reduction (POR) techniques. In this paper, we present the first POR technique for protocol equivalences that does not rely on an action-determinism assumption: we recast trace equivalence as a reachability problem, to which persistent and sleep set techniques can be applied, and we show how to effectively apply these results in the context of symbolic execution. We report on a prototype implementation, improving the tool DeepSec.


ieee computer security foundations symposium | 2018

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR

Jannik Dreier; Lucca Hirschi; Saša Radomirović; Ralf Sasse


ieee symposium on security and privacy | 2017

Mobile Subscriber WiFi Privacy

Piers O'Hanlon; Ravishankar Borgaonkar; Lucca Hirschi


Logical Methods in Computer Science | 2017

A Reduced Semantics for Deciding Trace Equivalence

David Baelde; Stéphanie Delaune; Lucca Hirschi


computer and communications security | 2018

Formal Analysis of 5G Authentication

David A. Basin; Jannik Dreier; Lucca Hirschi; Saša Radomirović; Ralf Sasse; Vincent Stettler


Archive | 2018

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR (Extended Version)

Jannik Dreier; Lucca Hirschi; Saša Radomirović; Ralf Sasse

Collaboration


Dive into the Lucca Hirschi's collaboration.

Top Co-Authors

Avatar

David Baelde

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Stéphanie Delaune

École normale supérieure de Cachan

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stéphanie Delaune

École normale supérieure de Cachan

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge