Towards automated protocol reverse engineering using semantic information G Bossert, F Guihéry, G Hiet Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 72 | 2014 |
Policy-based intrusion detection in web applications by monitoring java information flows G Hiet, VVT Tong, L Me, B Morin 2008 Third International Conference on Risks and Security of Internet and …, 2008 | 32 | 2008 |
Modelling to simulate botnet command and control protocols for the evaluation of network intrusion detection systems G Bossert, G Hiet, T Henin 2011 Conference on Network and Information Systems Security, 1-8, 2011 | 20 | 2011 |
Modular verification of programs with effects and effect handlers in coq T Letan, Y Régis-Gianas, P Chifflier, G Hiet International Symposium on Formal Methods, 338-354, 2018 | 16 | 2018 |
Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications: mise … G Hiet | 11 | 2008 |
Monitoring both os and program level information flows to detect intrusions against network servers G Hiet, L Mé, B Morin, VVT Tong IEEE Workshop on Monitoring, Attack Detection and Mitigation, 2007 | 11 | 2007 |
Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode R Chevalier, M Villatel, D Plaquin, G Hiet Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 8 | 2017 |
ARMHEx: A hardware extension for DIFT on ARM-based SoCs MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat 2017 27th International Conference on Field Programmable Logic and …, 2017 | 8 | 2017 |
Teaching android mobile security JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ... Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019 | 7 | 2019 |
Netzob: un outil pour la rétro-conception de protocoles de communication G Bossert, F Guihéry, G Hiet SSTIC 2012, 43, 2012 | 6 | 2012 |
SpecCert: specifying and verifying hardware-based security enforcement T Letan, P Chifflier, G Hiet, P Néron, B Morin International Symposium on Formal Methods, 496-512, 2016 | 5 | 2016 |
Detecting Process-Aware Attacks in Sequential Control Systems O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk Nordic Conference on Secure IT Systems, 20-36, 2016 | 5 | 2016 |
Détection fiable et pertinente de flux d'information illégaux G Hiet, L Mé, J Zimmermann, C Bidan, B Morin, VVT Tong Sixth Conference on Security and Network Architectures (SARSSI), unknown, 2007 | 5 | 2007 |
Vers une détection d'intrusions à fiabilité et pertinence prouvables C Bidan, G Hiet, L Mé, B Morin, J Zimmermann REVUE DE L ELECTRICITE ET DE L ELECTRONIQUE 9, 75, 2006 | 5 | 2006 |
Towards a hardware-assisted information flow tracking ecosystem for ARM processors MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat 2016 26th International Conference on Field Programmable Logic and …, 2016 | 4 | 2016 |
A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat, AK Biswas 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 92-97, 2018 | 3 | 2018 |
Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk IFAC-PapersOnLine 51 (24), 1043-1050, 2018 | 3 | 2018 |
Preventive information flow control through a mechanism of split addresses D Subramanian, G Hiet, C Bidan Proceedings of the 9th International Conference on Security of Information …, 2016 | 2 | 2016 |
Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems R Chevalier, D Plaquin, C Dalton, G Hiet Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 1 | 2019 |
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images R Chevalier, S Cristalli, C Hauser, Y Shoshitaishvili, R Wang, C Kruegel, ... Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019 | 1 | 2019 |