Follow
Pierre WILKE
Title
Cited by
Cited by
Year
CompCertS: A Memory-Aware Verified C Compiler Using a Pointer as Integer Semantics
F Besson, S Blazy, P Wilke
Journal of Automated Reasoning 63, 369-392, 2019
512019
An abstract stack based approach to verified compositional compilation to machine code
Y Wang, P Wilke, Z Shao
Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019
472019
A precise and abstract memory model for C using symbolic values
F Besson, S Blazy, P Wilke
Asian Symposium on Programming Languages and Systems, 449-468, 2014
402014
A concrete memory model for CompCert
F Besson, S Blazy, P Wilke
Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing …, 2015
342015
Debiasing android malware datasets: How can i trust your results if your dataset is biased?
TC Miranda, PF Gimenez, JF Lalande, VVT Tong, P Wilke
IEEE Transactions on Information Forensics and Security 17, 2182-2197, 2022
212022
CompCertELF: verified separate compilation of C programs into ELF object files
Y Wang, X Xu, P Wilke, Z Shao
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-28, 2020
212020
Compiling sandboxes: Formally verified software fault isolation
F Besson, S Blazy, A Dang, T Jensen, P Wilke
Programming Languages and Systems: 28th European Symposium on Programming …, 2019
192019
A verified CompCert front-end for a memory model supporting pointer arithmetic and uninitialised data
F Besson, S Blazy, P Wilke
Journal of Automated Reasoning 62 (4), 433-480, 2019
172019
Abusing android runtime for application obfuscation
P Graux, JF Lalande, P Wilke, VVT Tong
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
72020
Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections
N Gaudin, JL Hatchikian-Houdot, F Besson, P Cotret, G Gogniat, G Hiet, ...
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023
52023
A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity
M Baty, P Wilke, G Hiet, A Fontaine, A Trieu
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 372-387, 2023
42023
Isolating malicious code in Android malware in the wild
VVT Tong, C Herzog, TC Miranda, P Graux, JF Lalande, P Wilke
MALCON 2019-14th International Conference on Malicious and Unwanted Software, 2019
42019
Formal hardware/software models for cache locking enabling Fast and Secure Code
JL Hatchikian-Houdot, P Wilke, F Besson, G Hiet
European Symposium on Research in Computer Security, 153-173, 2024
22024
Preventing serialization vulnerabilities through transient field detection
P Graux, JF Lalande, VVT Tong, P Wilke
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1598-1606, 2021
22021
Formally verified compilation of low-level C code
P Wilke
Université de Rennes, 2016
22016
OATs’inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications
P Graux, JF Lalande, V Viet Triem Tong, P Wilke
Digital Threats: Research and Practice 4 (2), 1-27, 2023
12023
DaViz: Visualization for Android Malware Datasets
TC Miranda, JF Lalande, VVT Tong, P Wilke
RESSI 2022-Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité …, 2022
12022
Work in progress: A formally verified shadow stack for RISC-V
M Baty, G Hiet, P Wilke
Tech. rep. https://silmworkshop. github. io/2022-papers/silm2022-shadowstack …, 2022
12022
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
C Herzog, VVT Tong, P Wilke, A Van Straaten, JL Lanet
arXiv preprint arXiv:2009.12204, 2020
12020
An XVisor extension using a Domain Specific Language to detect Rootkits in Virtual Machines
L Hemmerlé, F Tronel, P Wilke, JC Prévotet
2025
The system can't perform the operation now. Try again later.
Articles 1–20