Yannick Chevalier
Paul Sabatier University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yannick Chevalier.
computer aided verification | 2005
Alessandro Armando; David A. Basin; Yohan Boichut; Yannick Chevalier; Luca Compagna; Jorge Cuellar; P. Hankes Drielsma; Pierre-Cyrille Héam; Olga Kouchnarenko; J. Mantovani; Sebastian Mödersheim; D. von Oheimb; Michaël Rusinowitch; J. Santiago; Mathieu Turuani; Luca Viganò; Laurent Vigneron
AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.
foundations of software technology and theoretical computer science | 2003
Yannick Chevalier; Ralf Küsters; Michaël Rusinowitch; Mathieu Turuani
We present an NP decision procedure for the formal analysis of protocols in presence of modular exponentiation with products allowed in exponents. The number of factors that may appear in the products is unlimited. We illustrate that our model is powerful enough to uncover known attacks on the A-GDH.2 protocol suite.
tools and algorithms for construction and analysis of systems | 2012
Alessandro Armando; Wihem Arsac; Tigran Avanesov; Michele Barletta; Alberto Calvi; Alessandro Cappai; Roberto Carbone; Yannick Chevalier; Luca Compagna; Jorge Cuellar; Gabriel Erzse; Simone Frau; Marius Minea; Sebastian Mödersheim; David von Oheimb; Giancarlo Pellegrino; Serena Elisa Ponta; Marco Rocchetto; Michaël Rusinowitch; Mohammad Torabi Dashti; Mathieu Turuani; Luca Viganò
The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of Services. The platform supports application-level specification languages (such as BPMN and our custom languages) and features three validation backends (CL-AtSe, OFMC, and SATMC), which provide a range of complementary automated reasoning techniques (including service orchestration, compositional reasoning, model checking, and abstract interpretation). We have applied the platform to a large number of industrial case studies, collected into the AVANTSSAR Library of validated problem cases. In doing so, we unveiled a number of problems and vulnerabilities in deployed services. These include, most notably, a serious flaw in the SAML-based Single Sign-On for Google Apps (now corrected by Google as a result of our findings). We also report on the migration of the platform to industry.
computer aided verification | 2002
Yannick Chevalier; Laurent Vigneron
We present a new model for automated verification of security protocols, permitting the use of an unbounded number of protocol runs. We prove its correctness, completeness and also that it terminates. It has been implemented and its efficiency is clearly shown by the number of protocols successfully studied. In particular, we present an attack previously unreported on the Denning-Sacco symmetric key protocol.
international colloquium on automata languages and programming | 2005
Yannick Chevalier; Michaël Rusinowitch
Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of algebraic operators associated with a fixed intruder theory. Examples of such sets of operators comprise XOR, multiplication/exponentiation, abstract encryption/decryption. In this paper we give an algorithm for combining decision procedures for arbitrary intruder theories with disjoint sets of operators, provided that solvability of ordered intruder constraints, a slight generalization of intruder constraints, can be decided in each theory. This is the case for most of the intruder theories for which a decision procedure has been given. In particular our result allows us to decide trace-based security properties of protocols that employ any combination of the above mentioned operators with a bounded number of sessions.
automated software engineering | 2001
Yannick Chevalier; Laurent Vigneron
We present the lazy strategy implemented in a compiler of cryptographic protocols, Casrul. The purpose of this compiler is to verify protocols and to translate them into rewrite rules that can be used by several kinds of automatic or semi-automatic tools for finding flaws, or proving properties. It is entirely automatic, and the efficiency of the generated rules is guaranteed because of the use of a lazy model of intruder behavior. This efficiency is illustrated on several examples.
Theoretical Computer Science | 2005
Yannick Chevalier; Ralf Küsters; Michaël Rusinowitch; Mathieu Turuani
We provide a method for deciding the insecurity of cryptographic protocols in the presence of the standard Dolev-Yao intruder (with a finite number of sessions) extended with so-called oracle rules, i.e., deduction rules that satisfy certain conditions. As an instance of this general framework, we obtain that protocol insecurity is in NP for an intruder that can exploit the properties of the exclusive or (XOR) operator. This operator is frequently used in cryptographic protocols but cannot be handled in most protocol models. An immediate consequence of our proof is that checking whether a message can be derived by an intruder (using XOR) is in PTIME. We also apply our framework to an intruder that exploits properties of certain encryption modes such as cipher block chaining (CBC).
computer aided verification | 2002
Alessandro Armando; David A. Basin; Mehdi Bouallagui; Yannick Chevalier; Luca Compagna; Sebastian Mödersheim; Michaël Rusinowitch; Mathieu Turuani; Luca Viganò; Laurent Vigneron
We introduce AVISS, a tool for security protocol analysis that supports the integration of back-ends implementing different search techniques, allowing for their systematic and quantitative comparison and paving the way to their effective interaction. As a significant example, we have implemented three back-ends, and used the AVISS tool to analyze and find flaws in 36 protocols, including 31 problems in the Clark-Jacobs protocol library and a previously unreported flaw in the Denning-Sacco protocol.
ieee congress on services | 2008
Yannick Chevalier; Mohammed Anis Mekki; Michaël Rusinowitch
Automatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of security services (such as digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. The approach amounts to collecting the constraints on messages, parameters and control flow from the components services and the goal service requirements. A constraint solver checks the feasibility of the composition - possibly adapting the message structure while preserving the semantics - and displays the service composition as a message sequence chart. The resulting composed service can be verified automatically for ensuring that it cannot be subject to active attacks from intruders. The services that are input to our system are provided in a declarative way using a high level specification language. The approach is fully automatic and we show on a case- study how it succeeds in deriving a composed service that is currently proposed as a product by a company.
Information Processing Letters | 2010
Yannick Chevalier; Michaël Rusinowitch
Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role. Unlike previous works, we reduce this compilation process to well-known decision problems in formal protocol analysis. This allows one to define a natural notion of prudent translation and to reuse many known results from the literature in order to cover more crypto-primitives. In particular this work is the first one to show how to compile protocols parameterised by the properties of the available operations.
Collaboration
Dive into the Yannick Chevalier's collaboration.
French Institute for Research in Computer Science and Automation
View shared research outputs