Benjamin Beurdouche (@beurdouche) 's Twitter Profile
Benjamin Beurdouche

@beurdouche

Security Researcher and Cryptography TL @Mozilla / Tweets are my own. IH-SNC7

ID: 390112090

calendar_today13-10-2011 13:45:33

183 Tweet

657 Followers

484 Following

Brian Smith (@brian_____) 's Twitter Profile Photo

There is a huge amount of code in NSS between those highest-level layers and lowest-level layers. That middle layer will never be proven correct and it’s survived lots of static analysis and fuzzing. It is totally uninteresting. But that’s where the bugs are likely to be found.

Nikhil Swamy (@lambdanik) 's Twitter Profile Photo

RiSE just announced a new position to work on proof-oriented programming, in F* and related technologies. Come work with us! careers.microsoft.com/us/en/job/1220…

Eric Rescorla (@ekr____) 's Twitter Profile Photo

We can do a lot for DNS security by protecting the link between the endpoint and the recursive resolver, a point Thomas H. Ptacek has been making for years. Whether it's DoH, DoT, or DoQ doesn't really matter that much. educatedguesswork.org/posts/dns-secu…

Bernard Ourghanlian (@ourghanlian) 's Twitter Profile Photo

CHERI provides fine-grained spatial memory safety at a hardware level. msrc-blog.microsoft.com/2022/01/20/an_… #cybersecurity #ConfidentialComputing

Christian Janson (@chrjanson) 's Twitter Profile Photo

The Security Standardisation Research Conference (SSR) will take place on June 6 in Genoa and is co-located with IEEE EuroS&P IEEE European Symposium on Security and Privacy. The submission deadline (firm) will be March 4 and all details can be found at ssr2022.com.

Nikhil Swamy (@lambdanik) 's Twitter Profile Photo

The F* book is beginning to look more like a book! Lots more to go, but funny how seeing it in a different format really makes it more a book in my head. fstar-lang.org/tutorial/proof… restructuredText is pretty nice for targeting both html and latex. #fstarlang

Jonathan Protzenko (@_protz_) 's Twitter Profile Photo

My student @Kachoc_ and I are thrilled to announce Aeneas, a new verification toolchain for Rust programs. It's on arxiv arxiv.org/abs/2206.07185 and conditionally accepted at ICFP 2022... 🧵

IACR (@iacr_news) 's Twitter Profile Photo

#ePrint TreeSync: Authenticated Group Management for Messaging Layer Security: T Wallez, J Protzenko, B Beurdouche, K Bhargavan ia.cr/2022/1732

Théophile Wallez (@twallez) 's Twitter Profile Photo

MLS is a new secure group messaging protocol, soon coming up in a standard. datatracker.ietf.org/doc/draft-ietf… It aims to have strong confidentiality properties, with fancy names like "forward-secrecy" or "post-compromise security"! How do we prove them?

Ryan Hurst (@rmhrisk) 's Twitter Profile Photo

I am super excited to see Apple engaging in this work—it is outstanding. However, I have been secretly hoping that both Apple and Google would adopt MLS (Messaging Layer Security) as part of their plan to both support RCS (Rich Communication Services). While the evolution of the

Jan-Ivar Bruaroey (@jibrewery) 's Twitter Profile Photo

This month's Advancing #WebRTC from #Mozilla dives into the new standard video processing APIs MediaStreamTrackProcessor and VideoTrackGenerator. We cover differences across browsers, and how to polyfill the gap in all browsers, including #Firefox! blog.mozilla.org/webrtc/unbundl…

Éric Bothorel (@ebothorel) 's Twitter Profile Photo

Le chiffrement de bout en bout des communications ne saurait être fragilisé pour permettre des accès par des tiers, fûssent-ils les services de rens. C'est tout un pan de la confiance dans les messageries qui s'en trouverait questionné.

Julien Vanegue (@jvanegue) 's Twitter Profile Photo

Formal verification has never been more important now that LLMs take a central place in code generation. The psychological effect of assuming capability and best intention from a human does *not* translate to the setting where a robot writes the code.