[go: up one dir, main page]

Follow
Maxime Puys
Title
Cited by
Cited by
Year
Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections
ML Potet, L Mounier, M Puys, L Dureuil
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
742014
A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IoT/IIoT devices, and their detection mechanisms
NF Polychronou, PH Thevenon, M Puys, V Beroulle
ACM Transactions on Design Automation of Electronic Systems (TODAES) 27 (1 …, 2021
392021
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol
M Puys, ML Potet, P Lafourcade
35th International Conference on Computer Safety, Reliability and Security, 2016
332016
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties
P Lafourcade, M Puys
8th International Symposium on Foundations & Practice of Security, 2015
322015
Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks
L Rivière, ML Potet, TH Le, J Bringer, H Chabanne, M Puys
International Symposium on Foundations and Practice of Security, 92-111, 2014
252014
Dual protocols for private multi-party matrix multiplication and trust computations
JG Dumas, P Lafourcade, JB Orfila, M Puys
Computers & security 71, 51-70, 2017
202017
Madman: Detection of software attacks targeting hardware vulnerabilities
NF Polychronou, PH Thevenon, M Puys, V Beroulle
2021 24th Euromicro Conference on Digital System Design (DSD), 355-362, 2021
152021
Secure multiparty matrix multiplication based on strassen-winograd algorithm
JG Dumas, P Lafourcade, J Lopez Fenner, D Lucas, JB Orfila, C Pernet, ...
International Workshop on Security, 67-88, 2019
152019
Private multi-party matrix multiplication and trust computations
JG Dumas, P Lafourcade, JB Orfila, M Puys
arXiv preprint arXiv:1607.03629, 2016
152016
iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems
PH Thevenon, S Riou, DM Tran, M Puys, NF Polychronou, M El Majihi, ...
Journal of Internet Services and Information Security (JISIS) 12 (2), 1-24, 2022
142022
Hardware-in-the-loop labs for SCADA cybersecurity awareness and training
M Puys, PH Thevenon, S Mocanu
Proceedings of the 16th international conference on availability …, 2021
142021
Formally and practically verifying flow properties in industrial systems
J Dreier, M Puys, ML Potet, P Lafourcade, JL Roch
computers & security 86, 453-470, 2019
142019
An open-source hardware-in-the-loop virtualization system for cybersecurity studies of scada systems
S Mocanu, M Puys, PH Thevenon
C&esar 2019-Virtualization and Cybersecurity, 1-16, 2019
132019
Generation of applicative attacks scenarios against industrial systems
M Puys, ML Potet, A Khaled
International Symposium on Foundations and Practice of Security, 127-143, 2017
132017
Formally verifying flow properties in industrial systems
J Dreier, M Puys, ML Potet, P Lafourcade, JL Roch
SECRYPT 2017-14th International Conference on Security and Cryptography, 55-66, 2017
132017
SCADA cybersecurity awareness and teaching with Hardware-In-The-Loop platforms
M Puys, PH Thevenon, S Mocanu, M Gallissot, C Sivelle
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2022
122022
Automated ICS template for STRIDE Microsoft threat modeling tool
M Da Silva, M Puys, PH Thevenon, S Mocanu, N Nkawa
Proceedings of the 18th International Conference on Availability …, 2023
102023
Securing iot/iiot from software attacks targeting hardware vulnerabilities
NF Polychronou, PH Thevenon, V Beroulle
2021 19th IEEE international new circuits and systems conference (NEWCAS), 1-4, 2021
102021
High-level simulation for multiple fault injection evaluation
M Puys, L Riviere, J Bringer, T Le
International Workshop on Data Privacy Management, 293-308, 2014
82014
PLC Logic-Based Cybersecurity Risks Identification for ICS
M Da Silva, M Puys, PH Thevenon, S Mocanu
Proceedings of the 18th International Conference on Availability …, 2023
52023
The system can't perform the operation now. Try again later.
Articles 1–20