Home > Topics > PACS > Publications > Publications



Journal Articles

  1. Output-sensitive Information flow analysis. Cristian Ene, Laurent Mounier, Marie-Laure Potet - Logical Methods in Computer Science - [bibtex]


Conference Articles

  1. Countermeasures Optimization in Multiple Fault-Injection Context. Etienne Boespflug, Cristian Ene, Laurent Mounier, Marie-Laure Potet - 2020 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2020 - [bibtex]
  2. An End-to-End Approach for Multi-Fault Attack Vulnerability Assessment. Vincent Werner, Laurent Maingault, Marie-Laure Potet - 2020 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2020 - [bibtex]


Conference Articles

  1. Output-Sensitive Information Flow Analysis. Cristian Ene, Laurent Mounier, Marie-Laure Potet - FORTE 2019 - 39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems, J. A. P?erez and N. Yoshida (Eds.): LNCS 11535 - [bibtex]
  2. A Review of Intrusion Detection Systems for Industrial Control Systems. Mohamad Kaouk, Jean-Marie Flaus, Marie-Laure Potet, Roland Groz - 6th International Conference on Control, Decision and Information Technologies, CoDIT 2019, Paris, France, April 23-26, 2019 - [bibtex]


Journal Articles

  1. Formally and practically verifying flow properties in industrial systems. Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch - Computers & Security - [bibtex]

Conference Articles

  1. Model Generation for Quantified Formulas: A Taint-Based Approach. Benjamin Farinier, Sebastien Bardin, Richard Bonichon, Marie-Laure Potet - CAV'18, 30th International Conference on Computer Aided Verification - [bibtex]
  2. Binary Deobfuscation and Dynamic Symbolic Execution. Jonthan Salwan, Sebastien Bardin, Marie-Laure Potet - DIMVA'18, 15th Conference on Detection of Intrusions and Malware and Vulnerability Assessment - [bibtex]
  3. Compositional Verification in Action. Hubert Garavel, Frederic Lang, Laurent Mounier - FMICS - [bibtex]


Conference Articles

  1. Metrics for runtime detection of allocators in binaries. Franck de Goer, Roland Groz, Laurent Mounier - 10th USENIX Workshop on Cyber Security Experimentation and Test, CSET - [bibtex]
  2. scat: Learning from a Single Execution of a Binary. Franck de Goer, Christopher Ferreira, Laurent Mounier - Proceedings of SANER 2017 - [bibtex]
  3. Security Architecture for Embedded Point-to-Points Splitting Protocols. Benoit Badrignans, Vincent Danjean, Jean-Guillaume Dumas, Philippe Elbaz-Vincent, Sabine Machenaud, Jean-Baptiste Orfila, Florian Pebay-Peyroula, François Pebay-Peyroula, Marie-Laure Potet, Maxime Puys, Jean-Luc Richier, Jean-Louis Roch - WCICSS'17 - [bibtex]
  4. Generation of Applicative Attacks Scenarios Against Industrial Systems. Maxime Puys, Marie-Laure Potet, Abdelaziz Khaled - Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers - [bibtex]
  5. Formally Verifying Flow Properties in Industrial Systems. Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017. - [bibtex]
  6. Deobfuscation of VM based software protection. Jonathan Salwan, Sebastien Bardin, Marie-Laure Potet - Symposium sur la sécurité des technologies de l'information et des communications, SSTIC, France, Rennes, June 7-9 2017 - [bibtex]


Conference Articles

  1. Toward large-scale vulnerability discovery using Machine Learning. Gustavo Grieco, Guillermo Luis Grinblat, Lucas Uzal, Sanjay Rawat, Josselin Feist, Laurent Mounier - Proceedings of CODASPY 2016 - [bibtex]
  2. Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information. Josselin Feist, Laurent Mounier, Marie-Laure Potet - Software Engineering and Formal Methods - 14th International Conference, SEFM 2016, Held as Part of STAF 2016, Vienna, Austria, July 4-8, 2016, Proceedings - [bibtex]
  3. Specification of concretization and symbolization policies in symbolic execution. Robin David, Sebastien Bardin, Josselin Feist, Laurent Mounier, Marie-Laure Potet, Thanh Dinh Ta, Jean-Yves Marion - Proceedings of the 25th International Symposium on Software Testing and Analysis, ISSTA 2016, Saarbrucken, Germany, July 18-20, 2016 - [bibtex]
  4. BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-level Analysis. Robin David, Sebastien Bardin, Josselin Feist, Jean-Yves Marion, Laurent Mounier, Marie-Laure Potet, Thanh Dinh Ta - Proceedings of SANER 2016 - [bibtex]
  5. Finding the Needle in the Heap: Combining Static Analysis and Dynamic Symbolic Execution to Trigger Use-After-Free. Feist Josselin, Mounier Laurent, Marie-Laure Potet, Sebastien Bardin, David Robin - Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop, SSPREW 2016, Los Angeles, USA, December 5-6, 2016 - [bibtex]
  6. Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. Maxime Puys, Marie-Laure Potet, Pascal Lafourcade - International Conference on Computer Safety, Reliability, and Security (SAFECOMP'16) - [bibtex]
  7. Domain Specific Stateful Filtering with Worst-Case Bandwidth. Maxime Puys, Jean-Louis Roch, Marie-Laure Potet - 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016) - [bibtex]
  8. FISSC: A Fault Injection and Simulation Secure Collection. Louis Dureuil, Guillaume Petiot, Marie-Laure Potet, Thanh-Ha Lee, Aude Crohen, Philippe De Choudens - Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings - [bibtex]


Conference Articles

  1. Lightweight Heuristics to Retrieve Parameter Associations from Binaries. Franck de Goer, Roland Groz, Laurent Mounier - Proceedings of the 5th Program Protection and Reverse Engineering Workshop - [bibtex]
  2. From Code Review to Fault Injection Attacks: Filling the Gap using Fault Model Inference). Louis Dureuil, Marie-Laure Potet, Philippe de Choudens, Cécile Dumas, Jessy Clediére - 14th Smart Card Research and Advanced Application Conference) - [bibtex]


Journal Articles

  1. Statically detecting Use-After-Free on Binary Code. Josselin Feist, Laurent Mounier, Marie-Laure Potet - Journal of Computer Virology and Hacking Techniques - [bibtex]
  2. Analyse de Code et Recherche de Vulnérabilités. Marie-Laure Potet, Josselin Feist, Laurent Mounier - Revue MISC - [bibtex]
  3. Apport des méthodes formelles pour l'exploitation des logs informatiques dans un contexte contractuel. Gregor Goessler, Daniel Le Métayer, Eduardo Mazza, Marie-Laure Potet, Lacramioara Astefanoaei - TSI, Technique et Science Informatiques - [bibtex]


  1. Exercices de programmation fonctionnelle en Ocaml une approche pédagogique par l'algorithmique, la preuve et la complexité. Fabienne Carrier, Pascal Lafourcade, Laurent Mounier - [bibtex]

Conference Articles

  1. On the Expressiveness of some Runtime Validation Techniques. Ylies Falcone, Jean-Claude Fernandez, Laurent Mounier - HOWARD-60: A Festschrift on the Occasion of Howard Barringer's 60th Birthday - [bibtex]
  2. Lazart: a symbolic approach for evaluation the robustness of secured codes against control flow fault injection. Marie-Laure Potet, Laurent Mounier, Maxime Puys, Louis Dureuil - ICST - [bibtex]
  3. LiSTT: An Investigation into Unsound-incomplete Yet Practical Result Yielding Static Taintflow Analysis. Sanjay Rawat, Laurent Mounier, Marie-Laure Potet - Proceedings of SAW 2014 (ARES Workshop) - [bibtex]
  4. Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Herve Chabanne, Maxime Puys - Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers - [bibtex]


Conference Articles

  1. A stack model for symbolic buffer overflow exploitability analysis (Extended Abstract). Gustavo Grieco, Laurent Mounier, Marie-Laure Potet, Sanjay Rawat - 5th Workshop on the Constraints in Software Testing, Verification and Analysis CSTVA 2013 (in association with ICST 2013) - [bibtex]
  2. Predictive Taint Analysis for Extended Testing of Parallel Executions. Emmanuel Sifakis, Laurent Mounier - Hardware and Software: Verification and Testing - 9th International Haifa Verification Conference - [bibtex]

Contact | Site Map | Site powered by SPIP 3.2.19 + AHUNTSIC [CC License]

info visites 2088364