by kinds

Journal Articles

2023

  1. Formally Verifying Optimizations with Block Simulations. Léo Gourdin, Benjamin Bonneau, Sylvain Boulmé, David Monniaux, Alexandre Bérard - Proceedings of the ACM on Programming Languages, Issue OOPSLA2 - [bibtex]

2021

  1. Output-sensitive Information flow analysis. Cristian Ene, Laurent Mounier, Marie-Laure Potet - Logical Methods in Computer Science - [bibtex]

2018

  1. Formally and practically verifying flow properties in industrial systems. Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch - Computers & Security - [bibtex]

2014

  1. Apport des méthodes formelles pour l'exploitation des logs informatiques dans un contexte contractuel. Gregor Goessler, Daniel Le Métayer, Eduardo Mazza, Marie-Laure Potet, Lacramioara Astefanoaei - TSI, Technique et Science Informatiques - [bibtex]
  2. Statically detecting Use-After-Free on Binary Code. Josselin Feist, Laurent Mounier, Marie-Laure Potet - Journal of Computer Virology and Hacking Techniques - [bibtex]
  3. Analyse de Code et Recherche de Vulnérabilités. Marie-Laure Potet, Josselin Feist, Laurent Mounier - Revue MISC - [bibtex]

book

2014

  1. Exercices de programmation fonctionnelle en Ocaml une approche pédagogique par l'algorithmique, la preuve et la complexité. Fabienne Carrier, Pascal Lafourcade, Laurent Mounier - [bibtex]

Conference Articles

2024

  1. Chamois: agile development of CompCert extensions for optimization and security. David Monniaux, Sylvain Boulmé - JFLA 2024 -- 35es Journées Francophones des Langages Applicatifs - [bibtex]

2023

  1. Lazy Code Transformations in a Formally Verified Compiler. Léo Gourdin - ICOOOLPS '23: 18th ACM International Workshop on Implementation, Compilation, Optimization of OO Languages, Programs and Systems - [bibtex]
  2. Testing a Formally Verified Compiler. David Monniaux, Léo Gourdin, Sylvain Boulmé, Olivier Lebeltel - Tests and Proofs (TAP 2023) - [bibtex]

2022

  1. The Trusted Computing Base of the CompCert Verified Compiler. David Monniaux, Sylvain Boulmé - Programming Languages and Systems (ESOP 2022) - [bibtex]
  2. Formally Verified Superblock Scheduling. Cyril Six, Léo Gourdin, Sylvain Boulmé, David Monniaux, Justus Fasse, Nicolas Nardino - Certified Programs and Proofs (CPP '22) - [bibtex]
  3. A CompCert Backend with Symbolic Encryption. Paolo Torrini, Sylvain Boulmé - Sixth workshop on Principles of Secure Compilation (PriSC'22), part of the 49th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL 2022) - [bibtex]

2020

  1. Countermeasures Optimization in Multiple Fault-Injection Context. Etienne Boespflug, Cristian Ene, Laurent Mounier, Marie-Laure Potet - 2020 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2020 - [bibtex]
  2. An End-to-End Approach for Multi-Fault Attack Vulnerability Assessment. Vincent Werner, Laurent Maingault, Marie-Laure Potet - 2020 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2020 - [bibtex]

2019

  1. Output-Sensitive Information Flow Analysis. Cristian Ene, Laurent Mounier, Marie-Laure Potet - FORTE 2019 - 39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems, J. A. P?erez and N. Yoshida (Eds.): LNCS 11535 - [bibtex]
  2. A Review of Intrusion Detection Systems for Industrial Control Systems. Mohamad Kaouk, Jean-Marie Flaus, Marie-Laure Potet, Roland Groz - 6th International Conference on Control, Decision and Information Technologies, CoDIT 2019, Paris, France, April 23-26, 2019 - [bibtex]

2018

  1. Compositional Verification in Action. Hubert Garavel, Frederic Lang, Laurent Mounier - FMICS - [bibtex]
  2. Model Generation for Quantified Formulas: A Taint-Based Approach. Benjamin Farinier, Sebastien Bardin, Richard Bonichon, Marie-Laure Potet - CAV'18, 30th International Conference on Computer Aided Verification - [bibtex]
  3. Binary Deobfuscation and Dynamic Symbolic Execution. Jonthan Salwan, Sebastien Bardin, Marie-Laure Potet - DIMVA'18, 15th Conference on Detection of Intrusions and Malware and Vulnerability Assessment - [bibtex]

2017

  1. Generation of Applicative Attacks Scenarios Against Industrial Systems. Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled - Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers - [bibtex]
  2. Formally Verifying Flow Properties in Industrial Systems. Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017. - [bibtex]
  3. Deobfuscation of VM based software protection. Jonathan Salwan, Sebastien Bardin, Marie-Laure Potet - Symposium sur la sécurité des technologies de l'information et des communications, SSTIC, France, Rennes, June 7-9 2017 - [bibtex]
  4. Security Architecture for Embedded Point-to-Points Splitting Protocols. Benoit Badrignans, Vincent Danjean, Jean-Guillaume Dumas, Philippe Elbaz-Vincent, Sabine Machenaud, Jean-Baptiste Orfila, Florian Pebay-Peyroula, François Pebay-Peyroula, Marie-Laure Potet, Maxime Puys, Jean-Luc Richier, Jean-Louis Roch - WCICSS'17 - [bibtex]
  5. Metrics for runtime detection of allocators in binaries. Franck de Goer, Roland Groz, Laurent Mounier - 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET - [bibtex]
  6. scat: Learning from a Single Execution of a Binary. Franck de Goer, Christopher Ferreira, Laurent Mounier - Proceedings of SANER 2017 - [bibtex]

2016

  1. Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. Maxime Puys, Marie-Laure Potet, Pascal Lafourcade - International Conference on Computer Safety, Reliability, and Security (SAFECOMP'16) - [bibtex]
  2. Domain Specific Stateful Filtering with Worst-Case Bandwidth. Maxime Puys, Jean-Louis Roch, Marie-Laure Potet - 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016) - [bibtex]
  3. FISSC: A Fault Injection and Simulation Secure Collection. Louis Dureuil, Guillaume Petiot, Marie-Laure Potet, Thanh-Ha Lee, Aude Crohen, Philippe De Choudens - Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings - [bibtex]
  4. Toward large-scale vulnerability discovery using Machine Learning. Gustavo Grieco, Guillermo Luis Grinblat, Lucas Uzal, Sanjay Rawat, Josselin Feist, Laurent Mounier - Proceedings of CODASPY 2016 - [bibtex]
  5. Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information. Josselin Feist, Laurent Mounier, Marie-Laure Potet - Software Engineering and Formal Methods - 14th International Conference, SEFM 2016, Held as Part of STAF 2016, Vienna, Austria, July 4-8, 2016, Proceedings - [bibtex]
  6. Specification of concretization and symbolization policies in symbolic execution. Robin David, Sebastien Bardin, Josselin Feist, Laurent Mounier, Marie-Laure Potet, Thanh Dinh Ta, Jean-Yves Marion - Proceedings of the 25th International Symposium on Software Testing and Analysis, ISSTA 2016, Saarbrucken, Germany, July 18-20, 2016 - [bibtex]
  7. BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-level Analysis. Robin David, Sebastien Bardin, Josselin Feist, Jean-Yves Marion, Laurent Mounier, Marie-Laure Potet, Thanh Dinh Ta - Proceedings of SANER 2016 - [bibtex]
  8. Finding the Needle in the Heap: Combining Static Analysis and Dynamic Symbolic Execution to Trigger Use-After-Free. Feist Josselin, Mounier Laurent, Marie-Laure Potet, Sebastien Bardin, David Robin - Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop, SSPREW 2016, Los Angeles, USA, December 5-6, 2016 - [bibtex]

2015

  1. From Code Review to Fault Injection Attacks: Filling the Gap using Fault Model Inference). Louis Dureuil, Marie-Laure Potet, Philippe de Choudens, Cécile Dumas, Jessy Clediére - 14th Smart Card Research and Advanced Application Conference) - [bibtex]
  2. Lightweight Heuristics to Retrieve Parameter Associations from Binaries. Franck de Goer, Roland Groz, Laurent Mounier - Proceedings of the 5th Program Protection and Reverse Engineering Workshop - [bibtex]

2014

  1. Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Herve Chabanne, Maxime Puys - Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers - [bibtex]
  2. On the Expressiveness of some Runtime Validation Techniques. Ylies Falcone, Jean-Claude Fernandez, Laurent Mounier - HOWARD-60: A Festschrift on the Occasion of Howard Barringer's 60th Birthday - [bibtex]
  3. Lazart: a symbolic approach for evaluation the robustness of secured codes against control flow fault injection. Marie-Laure Potet, Laurent Mounier, Maxime Puys, Louis Dureuil - ICST - [bibtex]
  4. LiSTT: An Investigation into Unsound-incomplete Yet Practical Result Yielding Static Taintflow Analysis. Sanjay Rawat, Laurent Mounier, Marie-Laure Potet - Proceedings of SAW 2014 (ARES Workshop) - [bibtex]

2013

  1. Predictive Taint Analysis for Extended Testing of Parallel Executions. Emmanuel Sifakis, Laurent Mounier - Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference - [bibtex]
  2. A stack model for symbolic buffer overflow exploitability analysis (Extended Abstract). Gustavo Grieco, Laurent Mounier, Marie-Laure Potet, Sanjay Rawat - 5th Workshop on the Constraints in Software Testing, Verification and Analysis CSTVA 2013 (in association with ICST 2013) - [bibtex]

Contact | Site Map | Site powered by SPIP 4.2.16 + AHUNTSIC [CC License]

info visites 4155710