Software vulnerabilities: Publications & Conferences

Conferences
  • Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty. Open 802.15.4 IR-UWB Modular Platform For Localization Protocols Evaluation
    IEEE Radio and Antenna Days of the Indian Ocean (RADIO), 23rd to 26th September 2019
  • C. Henin and D. Le Métayer. Towards a framework for challenging ML-based decisions
    DeceptECAI 2020 - 1st International Workshop on Deceptive AI @ECAI2020Santiago de Chili
  • A. Papadimitriou, K. Nomikos, M. Psarakis, E. Aerabi and D. Hely. You can detect but you cannot hide: Fault Assisted Side Channel Analysis on Protected Software-based Block Ciphers
    2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2020, pp. 1-6,
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula, Athanasios Papadimitriou. Cross-layer analysis of software fault models and countermeasures against hardware fault attacks in a RISC-V processor
    Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 71, pp.102862
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula. Fault Injection on Hidden Registers in a RISC-V Rocket Processor and Software Countermeasures
    Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2019, Florence, Italy. pp.252-255, 2019
  • Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent, Thanh-Ha Le. Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis.
    3rd International Workshop on Software PROtection, Nov 2019, London, United Kingdom.
  • Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent. Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning.
    Software Security, Protection, and Reverse Engineering Workshop (SSPREW9), Dec 2019, San Juan, United States
  • Ramtine Tofighi-Shirazi, Maria Christofi, Philippe Elbaz-Vincent, and Thanh-ha Le, DoSE: Deobfuscation based on Semantic Equivalence,
    Software Security, Protection, and Reverse Engineering Workshop (SSPREW-8),San Juan, PR, USA. ACM, New York, NY, USA, 12 pages, December 3–4, 2018
  • Marie-Laure Potet and Lionel Morel, Tools and Benchmark for robustness code evaluation against fault injection,
    Injection de fautes : attaques physiques, protections logicielles et mécanismes d'évaluation de la robustesse, Paris, May 2018
  • Lionel Morel, Marie-Laure Potet, Damien Couroussé, Laurent Mounier and Laurent Maingault, Towards Fault Analysis of Firmware Updaters,
    Injection de fautes : attaques physiques, protections logicielles et mécanismes d'évaluation de la robustesse, Paris, May 2018
  • Benjamin Farinier, Sébastien Bardin, Richard Bonichon and Marie-Laure Potet, Model Generation for Quantified Formulas: A Taint-Based Approach,
    30th International Conference on Computer Aided Verification (CAV 18) , July 2018
  • Benjamin Farinier, Sébastien Bardin, Richard Bonichon, M-L. Potet, En finir avec les faux positifs avec l’exécution symbolique robuste, Journées Francophones des Langages Applicatifs, Feb 2019, Les Rousses, France
  • Claire Maïza, Valentin Touzeau, David Monniaux, Jan Reineke. Fast and exact analysis for LRU caches, Proceedings of the ACM on Programming Languages, ACM, 2019, 3 (POPL)
  • F. Recoules, S. Bardin, R. Bonichon, L. Mounier and M. Potet,  "Get Rid of Inline Assembly through Verification-Oriented Lifting », 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), San Diego, CA, USA, 2019 pp. 577-589
  • Cristian Ene, Laurent Mounier, Marie-Laure Potet. Output-sensitive Information flow analysis, 39th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2019, Copenhagen, Denmark. pp.93-110
  • Johan Laurent, Christophe Deleuze, Vincent Beroulle, Florian Pebay-Peyroula. Analyzing Software Security Against Complex Fault Models with Frama-C Value Analysis, 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Aug 2019, Atlanta, United States. pp.33-40,
Publications
  • R. Tofighi-Shirazi, M. Christofi, Ph. Elbaz-Vincent, and T.-ha Le. DoSE : Deobfuscation based on Semantic Equivalence
    Software Security, Protection, and Reverse Engineering Workshop (SSPREW8)
  • Johan Laurent, Christophe Deleuze, Vincent Beroulle, Florian Pebay-Peyroula,Analyzing Software Security against Complex Fault Models with Frama-C Value Analysis
    FDTC 2019
  • Johan Laurent, Christophe Deleuze, Florian Pebay-Peyroula, Vincent Beroulle. Bridging the Gap between RTL and Software Fault Injection
    JETC 2020.
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze Florian Pebay-Peyroula and Athanasios Papadimitriou. Cross-Layer Analysis of Software Fault Models and Countermeasures Against Hardware Fault, Attacks in a RISC-V Processor
    Elsevier Microprocessors and Microsystems journal (MICPRO), 2019
  • Nikolaos Foivos Polychronou, Pierre-Henri Thevenon, Maxime Puys, Vincent Beroulle. Detection of Software Attacks Targeting Hardware Vulnerabilities
    Digital System Design (DSD 2021)
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze and Florian Pebay-Peyroula. Fault Injection on Hidden Registers in a RISC-V Rocket processor and Software Countermeasures
    Design, Automation, And Test In Europe (DATE), march 2019
  • Chukri Soueidi, Ali Kassem, Yliès Falcone. BISM: Bytecode-Level Instrumentation for Software Monitoring
  • Sylvain Hallé, Raphaël Khoury, Quentin Betti, Antoine El-Hokayem, Yliès Falcone. Decentralized enforcement of document lifecycle constraints.
    Information Systems, Elsevier, 2017, ?10.1016/j.is.2017.08.002?
  • Ali Kassem, Yliès Falcone. Detecting Fault Injection Attacks with Runtime Verification
    SPRO 2019 - 3rd International Workshop on Software PROtection, Nov 2019, Londres, United Kingdom. pp.65-76,
  • Chukri Soueidi, Marius Monnier, Ali Kassem, Yliès Falcone. Efficient and Expressive Bytecode-Level Instrumentation for Java Programs
  • Yliès Falcone, Srinivas Pinisetty. On the Runtime Enforcement of Timed Properties
    In: Finkbeiner B., Mariani L. (eds) Runtime Verification. RV 2019. Lecture Notes in Computer Science, vol 11757. Springer, Cham. ?10.1145/3338503.3357724?.
  • Matthieu Renard, Antoine Rollet, Yliès Falcone. Runtime enforcement of timed properties using games. Formal Aspects Comput.
  • Nicolas Belleville, Damien Couroussé, Karine Heydemann, Henri-Pierre Charles, Automated Software Protection for the Masses Against Side-Channel Attacks,
    ACM Transactions on Architecture and Code Optimization, Association for Computing Machinery, 2018, 15 (4), pp.47:1--47:27
  • Cyril Bresch, David Hély, Athanasios Papadimitriou, Stack Redundancy to Thwart Return Oriented Programming in Embedded Systems,
    IEEE Embedded Systems Letters, Volume 10, Issue 3, September 2018
  • Jonathan Salwan, Sebastien Bardin and Marie-Laure Potet, Binary Deobfuscation and Dynamic Symbolic Execution,
    DIMVA'18, 15th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, June 2018