Avatar

Adrien Koutsos

Researcher

INRIA Paris

Biography

I am interested in the application of formal methods in security. I work on proofs of security protocols (in particular of authentication and privacy properties), the application of automated deduction techniques to help automate protocol analysis, and the usage of static analysis in security.

Publications

(2019). Decidability of a Sound Set of Inference Rules for Computational Indistinguishability. 32nd IEEE Computer Security Foundations Symposium, CSF 2019, Hoboken, NJ, USA, June 25-28, 2019.

PDF Slides DOI Long version

(2019). The 5G-AKA Authentication Protocol Privacy. IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019.

PDF Slides DOI Long version

(2017). A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications. 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017.

PDF DOI Long version

(2017). Formal Computational Unlinkability Proofs of RFID Protocols. 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017.

PDF Slides DOI

(2015). Process-Centric Views of Data-Driven Business Artifacts. 18th International Conference on Database Theory, ICDT 2015, March 23-27, 2015, Brussels, Belgium.

PDF DOI

Some Talks

Here are some my seminar and other talks. The slides of my conference talks can be found in the Publications section of this website. For older talks, please see my old website.

The 5G-AKA Authentication Protocol Privacy

STIC Doctoral School Best Scientific Contribution Award Ceremony

The 5G-AKA Authentication Protocol Privacy

Prosecco Seminar

Contact