Theo dõi
Guillaume Hiet
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Towards automated protocol reverse engineering using semantic information
G Bossert, F Guihéry, G Hiet
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1602014
Modular verification of programs with effects and effect handlers in Coq
T Letan, Y Régis-Gianas, P Chifflier, G Hiet
Formal Methods: 22nd International Symposium, FM 2018, Held as Part of the …, 2018
45*2018
Policy-based intrusion detection in web applications by monitoring java information flows
G Hiet, VVT Tong, L Me, B Morin
2008 Third International Conference on Risks and Security of Internet and …, 2008
332008
ARMHEx: A hardware extension for DIFT on ARM-based SoCs
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat
2017 27th International Conference on Field Programmable Logic and …, 2017
322017
Teaching android mobile security
JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ...
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
232019
Modelling to simulate botnet command and control protocols for the evaluation of network intrusion detection systems
G Bossert, G Hiet, T Henin
2011 Conference on Network and Information Systems Security, 1-8, 2011
232011
Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode
R Chevalier, M Villatel, D Plaquin, G Hiet
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
212017
Efficient mining of temporal safety properties for intrusion detection in industrial control systems
O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk
IFAC-PapersOnLine 51 (24), 1043-1050, 2018
152018
Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications: mise …
G Hiet
Université Rennes 1, 2008
152008
Detecting process-aware attacks in sequential control systems
O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
132016
Netzob: un outil pour la rétro-conception de protocoles de communication
G Bossert, F Guihéry, G Hiet
SSTIC 2012, 43, 2012
122012
Monitoring both os and program level information flows to detect intrusions against network servers
G Hiet, L Mé, B Morin, VVT Tong
IEEE Workshop on Monitoring, Attack Detection and Mitigation, unknown, 2007
122007
A small and adaptive coprocessor for information flow tracking in ARM SoCs
MA Wahab, P Cotret, MN Allah, G Hiet, AK Biswas, V Lapotre, G Gogniat
2018 International Conference on ReConFigurable Computing and FPGAs …, 2018
102018
SpecCert: specifying and verifying hardware-based security enforcement
T Letan, P Chifflier, G Hiet, P Néron, B Morin
International Symposium on Formal Methods, 496-512, 2016
92016
Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems
R Chevalier, D Plaquin, C Dalton, G Hiet
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
72019
Vers une détection d'intrusions à fiabilité et pertinence prouvables
C Bidan, G Hiet, L Mé, B Morin, J Zimmermann
REVUE DE L ELECTRICITE ET DE L ELECTRONIQUE 9, 75, 2006
72006
A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity
M Baty, P Wilke, G Hiet, A Fontaine, A Trieu
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 372-387, 2023
62023
RT-DFI: Optimizing data-flow integrity for real-time systems
N Bellec, G Hiet, S Rokicki, F Tronel, I Puaut
ECRTS 2022-34th Euromicro Conference on Real-Time Systems, 1-24, 2022
62022
Towards a hardware-assisted information flow tracking ecosystem for ARM processors
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat
2016 26th International Conference on Field Programmable Logic and …, 2016
62016
Détection fiable et pertinente de flux d'information illégaux
G Hiet, L Mé, J Zimmermann, C Bidan, B Morin, VVT Tong
Sixth Conference on Security and Network Architectures (SARSSI), unknown, 2007
62007
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20