Volgen
Marie-Laure Potet
Marie-Laure Potet
laboratoire VERIMAG - Grenoble Alpes University
Geverifieerd e-mailadres voor univ-grenoble-alpes.fr - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis
R David, S Bardin, TD Ta, L Mounier, J Feist, ML Potet, JY Marion
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
1202016
Statically detecting use after free on binary code
J Feist, L Mounier, ML Potet
Journal of Computer Virology and Hacking Techniques 10 (3), 211-217, 2014
1112014
Symbolic deobfuscation: From virtualized code back to the original
J Salwan, S Bardin, ML Potet
International Conference on Detection of Intrusions and Malware, and …, 2018
812018
FISSC: A fault injection and simulation secure collection
L Dureuil, G Petiot, ML Potet, TH Le, A Crohen, P de Choudens
International Conference on Computer Safety, Reliability, and Security, 3-11, 2016
732016
Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections
ML Potet, L Mounier, M Puys, L Dureuil
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
662014
Adaptable translator of B specifications to embedded C programs
D Bert, S Boulmé, ML Potet, A Requet, L Voisin
International Symposium of Formal Methods Europe, 94-113, 2003
642003
From code review to fault injection attacks: Filling the gap using fault model inference
L Dureuil, ML Potet, P de Choudens, C Dumas, J Clédière
International conference on smart card research and advanced applications …, 2015
632015
GeneSyst: A Tool to Reason About Behavioral Aspects of B Event Specifications. Application to Security Properties
D Bert, ML Potet, N Stouls
International Conference of B and Z Users, 299-318, 2005
542005
Composition and Refinement in the B-Method
ML Potet, Y Rouzaud
International Conference of B Users, 46-65, 1998
491998
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free
J Feist, L Mounier, S Bardin, R David, ML Potet
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
432016
Specification of concretization and symbolization policies in symbolic execution
R David, S Bardin, J Feist, L Mounier, ML Potet, TD Ta, JY Marion
Proceedings of the 25th International Symposium on Software Testing and …, 2016
392016
A review of intrusion detection systems for industrial control systems
M Kaouk, JM Flaus, ML Potet, R Groz
2019 6th International Conference on Control, Decision and Information …, 2019
382019
Taint dependency sequences: A characterization of insecure execution paths based on input-sensitive cause sequences
D Ceara, L Mounier, ML Potet
2010 Third International Conference on Software Testing, Verification, and …, 2010
352010
Test purposes: adapting the notion of specification to testing
Y Ledru, L du Bousquet, P Bontron, O Maury, C Oriat, ML Potet
Proceedings 16th Annual International Conference on Automated Software …, 2001
342001
Get rid of inline assembly through verification-oriented lifting
F Recoules, S Bardin, R Bonichon, L Mounier, ML Potet
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
322019
Formal analysis of security properties on the OPC-UA SCADA protocol
M Puys, ML Potet, P Lafourcade
International Conference on Computer Safety, Reliability, and Security, 67-75, 2016
322016
Protection des forêts contre l’incendie
PY COLIN, M JAPPIOT, A MARIEL
Cahier FAO Conservation 36, 2001
302001
Security policy enforcement through refinement process
N Stouls, ML Potet
International Conference of B Users, 216-231, 2007
282007
Spécification formelle avec B
H Habrias, JY Lafaye, ML Potet
Hermès Science Publications, 2001
282001
A study on components and assembly primitives in B
D Bert, ML Potet, Y Rouzaud
Proceedings of the first B conference, 47-62, 1996
241996
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20