| BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis R David, S Bardin, TD Ta, L Mounier, J Feist, ML Potet, JY Marion 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016 | 131 | 2016 |
| Statically detecting use after free on binary code J Feist, L Mounier, ML Potet Journal of Computer Virology and Hacking Techniques 10 (3), 211-217, 2014 | 113 | 2014 |
| Symbolic deobfuscation: From virtualized code back to the original J Salwan, S Bardin, ML Potet International Conference on Detection of Intrusions and Malware, and …, 2018 | 105 | 2018 |
| FISSC: A fault injection and simulation secure collection L Dureuil, G Petiot, ML Potet, TH Le, A Crohen, P de Choudens International Conference on Computer Safety, Reliability, and Security, 3-11, 2016 | 88 | 2016 |
| Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections ML Potet, L Mounier, M Puys, L Dureuil 2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014 | 74 | 2014 |
| Adaptable translator of B specifications to embedded C programs D Bert, S Boulmé, ML Potet, A Requet, L Voisin International Symposium of Formal Methods Europe, 94-113, 2003 | 67 | 2003 |
| From code review to fault injection attacks: Filling the gap using fault model inference L Dureuil, ML Potet, P de Choudens, C Dumas, J Clédière International conference on smart card research and advanced applications …, 2015 | 66 | 2015 |
| GeneSyst: A Tool to Reason About Behavioral Aspects of B Event Specifications. Application to Security Properties D Bert, ML Potet, N Stouls International Conference of B and Z Users, 299-318, 2005 | 54 | 2005 |
| Composition and Refinement in the B-Method ML Potet, Y Rouzaud International Conference of B Users, 46-65, 1998 | 48 | 1998 |
| A review of intrusion detection systems for industrial control systems M Kaouk, JM Flaus, ML Potet, R Groz 2019 6th International Conference on Control, Decision and Information …, 2019 | 46 | 2019 |
| Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free J Feist, L Mounier, S Bardin, R David, ML Potet Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016 | 46 | 2016 |
| Specification of concretization and symbolization policies in symbolic execution R David, S Bardin, J Feist, L Mounier, ML Potet, TD Ta, JY Marion Proceedings of the 25th International Symposium on Software Testing and …, 2016 | 42 | 2016 |
| Taint dependency sequences: A characterization of insecure execution paths based on input-sensitive cause sequences D Ceara, L Mounier, ML Potet 2010 Third International Conference on Software Testing, Verification, and …, 2010 | 35 | 2010 |
| Get rid of inline assembly through verification-oriented lifting F Recoules, S Bardin, R Bonichon, L Mounier, ML Potet 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 34 | 2019 |
| Test purposes: adapting the notion of specification to testing Y Ledru, L du Bousquet, P Bontron, O Maury, C Oriat, ML Potet Proceedings 16th Annual International Conference on Automated Software …, 2001 | 34 | 2001 |
| Formal analysis of security properties on the OPC-UA SCADA protocol M Puys, ML Potet, P Lafourcade International Conference on Computer Safety, Reliability, and Security, 67-75, 2016 | 33 | 2016 |
| Spécification formelle avec B H Habrias, JY Lafaye, ML Potet Hermès Science Publications, 2001 | 32 | 2001 |
| Security policy enforcement through refinement process N Stouls, ML Potet International Conference of B Users, 216-231, 2007 | 29 | 2007 |
| Protection des forêts contre l'íncendie PY Colin FAO conservation guide, 2001 | 29 | 2001 |
| An end-to-end approach for multi-fault attack vulnerability assessment V Werner, L Maingault, ML Potet 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 10-17, 2020 | 27 | 2020 |