- Presentation
- HAL publications
- Activity reports
SECSI Research team
Security of information systems
- Leader : Jean Goubault-Larrecq
- Type : Project team
- Research center(s) : Saclay
- Field : Algorithmics, Programming, Software and Architecture
- Theme : Programs, Verification and Proofs
- Ecole normale supérieure de Cachan, CNRS, Laboratoire specification et vérification (LSV) (UMR8643)
Team presentation
The SECSI project team is a research team on security of information systems. It is organized along three directions, and their inter-relationships:- Verification of cryptographic protocols;
- Intrusion detection;
- Static analysis of programs in order to detect security faults and vulnerabilities at the protocol level.
Research themes
- Security of cryptographic protocols: confidentiality, authentication, freshness, privacy, anonymity.
- Tree automata, set constraints, decidable subclasses of first-order logic and encodings/approximation of parallel cryptographic processes.
- Intrusion detection, efficient online model-checking algorithms with application to detection and reporting of composite events.
- Static analysis, especially using abstract domains of tree automata for shape analysis and security analysis.
International and industrial relations
National projects
- The RNTL EVA Project (automatic verification and explanation of cryptographic protocols).
- The RNTL DICO Project (cooperative intrusion detection).
ACIs (Actions concertées incitatives)
- The ACI Crypto VERNAM (subclasses of cryptographic protocols).
- The ACI Crypto PSI-Robuste (security of cryptographically-oriented programs).
- The ACI "Jeunes Chercheurs" Sécurité informatique, protocoles cryptographiques et détection d'intrusions (relationships between cryptographic protocol verification and intrusion detection).
Keywords: Security Cryptographic protocols Intrusion detection Automata Logic Static analysis
Research teams of the same theme :
- ABSTRACTION - Abstract Interpretation and Static Analysis
- ATEAMS - Analysis and Transformation based on rEliAble tool coMpositionS
- CARTE - Theoretical adverse computations, and safety
- CASSIS - Combination of approaches to the security of infinite states systems
- CELTIQUE - Software certification with semantic analysis
- COMETE - Concurrency, Mobility and Transactions
- CONTRAINTES - Constraint programming
- DEDUCTEAM - Deduction modulo, interopérabilité et démonstration automatique
- FORMES - Formal Methods for Embedded Systems
- GALLIUM - Programming languages, types, compilation and proofs
- MARELLE - Mathematical, Reasoning and Software
- MEXICO - Modeling and Exploitation of Interaction and Concurrency
- MOSCOVA - Mobililty, security, concurrence, verification and analysis
- PAREO - Formal islands: foundations and applications
- PARSIFAL - Proof search and reasoning with logic specifications
- PI.R2 - Design, study and implementation of languages for proofs and programs
- PROSECCO - Programming securely with cryptography
- TASC - Theory, Algorithms and Systems for Constraints
- TOCCATA - Certified Programs, Certified Tools, Certified Floating-Point Computations
- TYPICAL - Types, Logic and computing
- VERIDIS - Modeling and Verification of Distributed Algorithms and Systems
Contact
Team leader
Jean Goubault-Larrecq
Tel.: +33 1 47 40 75 68
Secretariat
Tel.: +33 1 47 40 75 17
Inria
Inria.fr
Inria Channel

Find out more
See also