CompCertS: A Memory-Aware Verified C Compiler Using a Pointer as Integer Semantics F Besson, S Blazy, P Wilke Journal of Automated Reasoning 63, 369-392, 2019 | 51 | 2019 |
An abstract stack based approach to verified compositional compilation to machine code Y Wang, P Wilke, Z Shao Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019 | 47 | 2019 |
A precise and abstract memory model for C using symbolic values F Besson, S Blazy, P Wilke Asian Symposium on Programming Languages and Systems, 449-468, 2014 | 40 | 2014 |
A concrete memory model for CompCert F Besson, S Blazy, P Wilke Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing …, 2015 | 34 | 2015 |
Debiasing android malware datasets: How can i trust your results if your dataset is biased? TC Miranda, PF Gimenez, JF Lalande, VVT Tong, P Wilke IEEE Transactions on Information Forensics and Security 17, 2182-2197, 2022 | 21 | 2022 |
CompCertELF: verified separate compilation of C programs into ELF object files Y Wang, X Xu, P Wilke, Z Shao Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-28, 2020 | 21 | 2020 |
Compiling sandboxes: Formally verified software fault isolation F Besson, S Blazy, A Dang, T Jensen, P Wilke Programming Languages and Systems: 28th European Symposium on Programming …, 2019 | 19 | 2019 |
A verified CompCert front-end for a memory model supporting pointer arithmetic and uninitialised data F Besson, S Blazy, P Wilke Journal of Automated Reasoning 62 (4), 433-480, 2019 | 17 | 2019 |
Abusing android runtime for application obfuscation P Graux, JF Lalande, P Wilke, VVT Tong 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 7 | 2020 |
Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections N Gaudin, JL Hatchikian-Houdot, F Besson, P Cotret, G Gogniat, G Hiet, ... 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023 | 5 | 2023 |
A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity M Baty, P Wilke, G Hiet, A Fontaine, A Trieu 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 372-387, 2023 | 4 | 2023 |
Isolating malicious code in Android malware in the wild VVT Tong, C Herzog, TC Miranda, P Graux, JF Lalande, P Wilke MALCON 2019-14th International Conference on Malicious and Unwanted Software, 2019 | 4 | 2019 |
Formal hardware/software models for cache locking enabling Fast and Secure Code JL Hatchikian-Houdot, P Wilke, F Besson, G Hiet European Symposium on Research in Computer Security, 153-173, 2024 | 2 | 2024 |
Preventing serialization vulnerabilities through transient field detection P Graux, JF Lalande, VVT Tong, P Wilke Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1598-1606, 2021 | 2 | 2021 |
Formally verified compilation of low-level C code P Wilke Université de Rennes, 2016 | 2 | 2016 |
OATs’inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications P Graux, JF Lalande, V Viet Triem Tong, P Wilke Digital Threats: Research and Practice 4 (2), 1-27, 2023 | 1 | 2023 |
DaViz: Visualization for Android Malware Datasets TC Miranda, JF Lalande, VVT Tong, P Wilke RESSI 2022-Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité …, 2022 | 1 | 2022 |
Work in progress: A formally verified shadow stack for RISC-V M Baty, G Hiet, P Wilke Tech. rep. https://silmworkshop. github. io/2022-papers/silm2022-shadowstack …, 2022 | 1 | 2022 |
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures C Herzog, VVT Tong, P Wilke, A Van Straaten, JL Lanet arXiv preprint arXiv:2009.12204, 2020 | 1 | 2020 |
An XVisor extension using a Domain Specific Language to detect Rootkits in Virtual Machines L Hemmerlé, F Tronel, P Wilke, JC Prévotet | | 2025 |