Skip to main content

Software vulnerabilities: Publications & Conferences

Publications

  • R. Tofighi-Shirazi, M. Christofi, Ph. Elbaz-Vincent, and T.-ha Le. DoSE : Deobfuscation based on Semantic Equivalence
    Software Security, Protection, and Reverse Engineering Workshop (SSPREW8)
  • Johan Laurent, Christophe Deleuze, Vincent Beroulle, Florian Pebay-Peyroula,Analyzing Software Security against Complex Fault Models with Frama-C Value Analysis
    FDTC 2019
  • Johan Laurent, Christophe Deleuze, Florian Pebay-Peyroula, Vincent Beroulle. Bridging the Gap between RTL and Software Fault Injection
    JETC 2020.
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze Florian Pebay-Peyroula and Athanasios Papadimitriou. Cross-Layer Analysis of Software Fault Models and Countermeasures Against Hardware Fault, Attacks in a RISC-V Processor
    Elsevier Microprocessors and Microsystems journal (MICPRO), 2019
  • Nikolaos Foivos Polychronou, Pierre-Henri Thevenon, Maxime Puys, Vincent Beroulle. Detection of Software Attacks Targeting Hardware Vulnerabilities
    Digital System Design (DSD 2021)
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze and Florian Pebay-Peyroula. Fault Injection on Hidden Registers in a RISC-V Rocket processor and Software Countermeasures
    Design, Automation, And Test In Europe (DATE), march 2019
  • Chukri Soueidi, Ali Kassem, Yliès Falcone. BISM: Bytecode-Level Instrumentation for Software Monitoring
  • Sylvain Hallé, Raphaël Khoury, Quentin Betti, Antoine El-Hokayem, Yliès Falcone. Decentralized enforcement of document lifecycle constraints.
    Information Systems, Elsevier, 2017, ?10.1016/j.is.2017.08.002?
  • Ali Kassem, Yliès Falcone. Detecting Fault Injection Attacks with Runtime Verification
    SPRO 2019 - 3rd International Workshop on Software PROtection, Nov 2019, Londres, United Kingdom. pp.65-76,
  • Chukri Soueidi, Marius Monnier, Ali Kassem, Yliès Falcone. Efficient and Expressive Bytecode-Level Instrumentation for Java Programs
  • Yliès Falcone, Srinivas Pinisetty. On the Runtime Enforcement of Timed Properties
    In: Finkbeiner B., Mariani L. (eds) Runtime Verification. RV 2019. Lecture Notes in Computer Science, vol 11757. Springer, Cham. ?10.1145/3338503.3357724?.
  • Matthieu Renard, Antoine Rollet, Yliès Falcone. Runtime enforcement of timed properties using games. Formal Aspects Comput.
  • Jonathan Salwan, Sebastien Bardin and Marie-Laure Potet, Binary Deobfuscation and Dynamic Symbolic Execution,
    DIMVA'18, 15th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, June 2018

Conferences

  • Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty. Open 802.15.4 IR-UWB Modular Platform For Localization Protocols Evaluation
    IEEE Radio and Antenna Days of the Indian Ocean (RADIO), 23rd to 26th September 2019
  • C. Henin and D. Le Métayer. Towards a framework for challenging ML-based decisions
    DeceptECAI 2020 - 1st International Workshop on Deceptive AI @ECAI2020Santiago de Chili
  • A. Papadimitriou, K. Nomikos, M. Psarakis, E. Aerabi and D. Hely. You can detect but you cannot hide: Fault Assisted Side Channel Analysis on Protected Software-based Block Ciphers
    2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2020, pp. 1-6,
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula, Athanasios Papadimitriou. Cross-layer analysis of software fault models and countermeasures against hardware fault attacks in a RISC-V processor
    Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 71, pp.102862
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula. Fault Injection on Hidden Registers in a RISC-V Rocket Processor and Software Countermeasures
    Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2019, Florence, Italy. pp.252-255, 2019
  • Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent, Thanh-Ha Le. Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis.
    3rd International Workshop on Software PROtection, Nov 2019, London, United Kingdom.
  • Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent. Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning.
    Software Security, Protection, and Reverse Engineering Workshop (SSPREW9), Dec 2019, San Juan, United States
  • Ramtine Tofighi-Shirazi, Maria Christofi, Philippe Elbaz-Vincent, and Thanh-ha Le, DoSE: Deobfuscation based on Semantic Equivalence,
    Software Security, Protection, and Reverse Engineering Workshop (SSPREW-8),San Juan, PR, USA. ACM, New York, NY, USA, 12 pages, December 3–4, 2018
  • Benjamin Farinier, Sébastien Bardin, Richard Bonichon and Marie-Laure Potet, Model Generation for Quantified Formulas: A Taint-Based Approach,
    30th International Conference on Computer Aided Verification (CAV 18) , July 2018
  • Cristian Ene, Laurent Mounier, Marie-Laure Potet. Output-sensitive Information flow analysis, 39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.93-110

Submitted on March 26, 2024

Updated on March 26, 2024