Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections ML Potet, L Mounier, M Puys, L Dureuil 2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014 | 60 | 2014 |
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol M Puys, ML Potet, P Lafourcade 35th International Conference on Computer Safety, Reliability and Security, 2016 | 30 | 2016 |
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties P Lafourcade, M Puys 8th International Symposium on Foundations & Practice of Security, 2015 | 26 | 2015 |
Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks L Rivière, ML Potet, TH Le, J Bringer, H Chabanne, M Puys International Symposium on Foundations and Practice of Security, 92-111, 2014 | 24 | 2014 |
A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms NF Polychronou, PH Thevenon, M Puys, V Beroulle ACM Transactions on Design Automation of Electronic Systems (TODAES) 27 (1 …, 2021 | 22 | 2021 |
Dual protocols for private multi-party matrix multiplication and trust computations JG Dumas, P Lafourcade, JB Orfila, M Puys Computers & security 71, 51-70, 2017 | 17 | 2017 |
Secure multiparty matrix multiplication based on strassen-winograd algorithm JG Dumas, P Lafourcade, J Lopez Fenner, D Lucas, JB Orfila, C Pernet, ... International Workshop on Security, 67-88, 2019 | 13 | 2019 |
Private multi-party matrix multiplication and trust computations JG Dumas, P Lafourcade, JB Orfila, M Puys arXiv preprint arXiv:1607.03629, 2016 | 13 | 2016 |
Generation of applicative attacks scenarios against industrial systems M Puys, ML Potet, A Khaled Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018 | 10 | 2018 |
Formally verifying flow properties in industrial systems J Dreier, M Puys, ML Potet, P Lafourcade, JL Roch SECRYPT 2017-14th International Conference on Security and Cryptography, 55-66, 2017 | 10 | 2017 |
Hardware-in-the-loop labs for SCADA cybersecurity awareness and training M Puys, PH Thevenon, S Mocanu Proceedings of the 16th International Conference on Availability …, 2021 | 9 | 2021 |
An open-source hardware-in-the-loop virtualization system for cybersecurity studies of scada systems S Mocanu, M Puys, PH Thevenon C&esar 2019-Virtualization and Cybersecurity, 1-16, 2019 | 9 | 2019 |
Formally and practically verifying flow properties in industrial systems J Dreier, M Puys, ML Potet, P Lafourcade, JL Roch Computers & Security 86, 453-470, 2019 | 8 | 2019 |
Madman: Detection of software attacks targeting hardware vulnerabilities NF Polychronou, PH Thevenon, M Puys, V Beroulle 2021 24th Euromicro Conference on Digital System Design (DSD), 355-362, 2021 | 7 | 2021 |
Securing iot/iiot from software attacks targeting hardware vulnerabilities NF Polychronou, PH Thevenon, P Maxime, V Beroulle 2021 19th IEEE International New Circuits and Systems Conference (NEWCAS), 1-4, 2021 | 6 | 2021 |
High-level simulation for multiple fault injection evaluation M Puys, L Riviere, J Bringer, T Le International Workshop on Data Privacy Management, 293-308, 2014 | 6 | 2014 |
iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems PH Thevenon, S Riou, DM Tran, M Puys, NF Polychronou, M El Majihi, ... Journal of Internet Services and Information Security (JISIS) 12 (2), 1-24, 2022 | 5 | 2022 |
SCADA cybersecurity awareness and teaching with Hardware-In-The-Loop platforms M Puys, PH Thevenon, S Mocanu, M Gallissot, C Sivelle Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2022 | 4 | 2022 |
Security architecture for point-to-point splitting protocols B Badrignans, V Danjean, JG Dumas, P Elbaz-Vincent, S Machenaud, ... WCICSS 2017-IEEE World Congress on Industrial Control Systems Security, 2017 | 4 | 2017 |
WonderCloud, une plateforme pour l’analyse et l’émulation de micrologiciels ainsi que la composition de pots de miels M Gallissot, M Puys, PH Thevenon Proc. of the 27th C&esar conference on Deceptive Security (C&esar 2020 …, 2020 | 3 | 2020 |