scispace - formally typeset
J

Jean Goubault-Larrecq

Researcher at Université Paris-Saclay

Publications -  114
Citations -  1899

Jean Goubault-Larrecq is an academic researcher from Université Paris-Saclay. The author has contributed to research in topics: Probabilistic logic & Topological space. The author has an hindex of 27, co-authored 100 publications receiving 1792 citations. Previous affiliations of Jean Goubault-Larrecq include Centre national de la recherche scientifique & French Institute for Research in Computer Science and Automation.

Papers
More filters
Journal Article

Cryptographic protocol analysis on real C code

TL;DR: This work describes how cryptographic protocol verification techniques based on solving clause sets can be applied to detect vulnerabilities of C programs in the Dolev-Yao model, statically.
Proceedings ArticleDOI

Log auditing through model-checking

TL;DR: It is argued that this is naturally expressed as a model-checking problem against linear Kripke models, and an efficient on-line algorithm is described, making the approach attractive for complex log auditing tasks.
Book

Non-Hausdorff Topology and Domain Theory: Selected Topics in Point-Set Topology

TL;DR: This unique book on modern topology looks well beyond traditional treatises and explores spaces that may, but need not, be Hausdorff, essential for domain theory, the cornerstone of semantics of computer languages.
Book ChapterDOI

Cryptographic protocol analysis on real c code

TL;DR: In this paper, the authors describe how cryptographic protocol verification techniques based on solving clause sets can be applied to detect vulnerabilities of C programs in the Dolev-Yao model, statically, integrating fairly simple pointer analysis techniques with an analysis of which messages an external intruder may collect and forge.
Book ChapterDOI

A Method for Automatic Cryptographic Protocol Verification

TL;DR: An automatic, terminating method for verifying confidentiality properties, and to a lesser extent freshness properties of cryptographic protocols, using a specific extension of tree automata, ?