Follow
Guillaume Hiet
Title
Cited by
Cited by
Year
Towards automated protocol reverse engineering using semantic information
G Bossert, F Guihéry, G Hiet
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1572014
Modular verification of programs with effects and effect handlers in Coq
T Letan, Y Régis-Gianas, P Chifflier, G Hiet
Formal Methods: 22nd International Symposium, FM 2018, Held as Part of the …, 2018
47*2018
Policy-based intrusion detection in web applications by monitoring java information flows
G Hiet, VVT Tong, L Me, B Morin
2008 Third International Conference on Risks and Security of Internet and …, 2008
332008
ARMHEx: A hardware extension for DIFT on ARM-based SoCs
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat
2017 27th International Conference on Field Programmable Logic and …, 2017
322017
Modelling to simulate botnet command and control protocols for the evaluation of network intrusion detection systems
G Bossert, G Hiet, T Henin
2011 Conference on Network and Information Systems Security, 1-8, 2011
232011
Teaching android mobile security
JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ...
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
212019
Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode
R Chevalier, M Villatel, D Plaquin, G Hiet
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
212017
Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications: mise …
G Hiet
Université Rennes 1, 2008
162008
Efficient mining of temporal safety properties for intrusion detection in industrial control systems
O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk
IFAC-PapersOnLine 51 (24), 1043-1050, 2018
152018
Detecting process-aware attacks in sequential control systems
O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
132016
Netzob: un outil pour la rétro-conception de protocoles de communication
G Bossert, F Guihéry, G Hiet
SSTIC 2012, 43, 2012
122012
Monitoring both os and program level information flows to detect intrusions against network servers
G Hiet, L Mé, B Morin, VVT Tong
IEEE Workshop on Monitoring, Attack Detection and Mitigation, unknown, 2007
122007
A small and adaptive coprocessor for information flow tracking in ARM SoCs
MA Wahab, P Cotret, MN Allah, G Hiet, AK Biswas, V Lapotre, G Gogniat
2018 International Conference on ReConFigurable Computing and FPGAs …, 2018
92018
SpecCert: specifying and verifying hardware-based security enforcement
T Letan, P Chifflier, G Hiet, P Néron, B Morin
International Symposium on Formal Methods, 496-512, 2016
92016
Towards a hardware-assisted information flow tracking ecosystem for ARM processors
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat
2016 26th International Conference on Field Programmable Logic and …, 2016
72016
Vers une détection d'intrusions à fiabilité et pertinence prouvables
C Bidan, G Hiet, L Mé, B Morin, J Zimmermann
REVUE DE L ELECTRICITE ET DE L ELECTRONIQUE 9, 75, 2006
72006
Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems
R Chevalier, D Plaquin, C Dalton, G Hiet
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
62019
Détection fiable et pertinente de flux d'information illégaux
G Hiet, L Mé, J Zimmermann, C Bidan, B Morin, VVT Tong
Sixth Conference on Security and Network Architectures (SARSSI), unknown, 2007
62007
Mitigating actions
R Chevalier, D Plaquin, G Hiet, A Baldwin
US Patent 10,896,085, 2021
52021
A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapôtre, G Gogniat, AK Biswas
2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 92-97, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20