Guillaume Hiet
Title
Cited by
Cited by
Year
Towards automated protocol reverse engineering using semantic information
G Bossert, F Guihéry, G Hiet
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
722014
Policy-based intrusion detection in web applications by monitoring java information flows
G Hiet, VVT Tong, L Me, B Morin
2008 Third International Conference on Risks and Security of Internet and …, 2008
322008
Modelling to simulate botnet command and control protocols for the evaluation of network intrusion detection systems
G Bossert, G Hiet, T Henin
2011 Conference on Network and Information Systems Security, 1-8, 2011
202011
Modular verification of programs with effects and effect handlers in coq
T Letan, Y Régis-Gianas, P Chifflier, G Hiet
International Symposium on Formal Methods, 338-354, 2018
162018
Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications: mise …
G Hiet
112008
Monitoring both os and program level information flows to detect intrusions against network servers
G Hiet, L Mé, B Morin, VVT Tong
IEEE Workshop on Monitoring, Attack Detection and Mitigation, 2007
112007
Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode
R Chevalier, M Villatel, D Plaquin, G Hiet
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
82017
ARMHEx: A hardware extension for DIFT on ARM-based SoCs
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat
2017 27th International Conference on Field Programmable Logic and …, 2017
82017
Teaching android mobile security
JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ...
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
72019
Netzob: un outil pour la rétro-conception de protocoles de communication
G Bossert, F Guihéry, G Hiet
SSTIC 2012, 43, 2012
62012
SpecCert: specifying and verifying hardware-based security enforcement
T Letan, P Chifflier, G Hiet, P Néron, B Morin
International Symposium on Formal Methods, 496-512, 2016
52016
Detecting Process-Aware Attacks in Sequential Control Systems
O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk
Nordic Conference on Secure IT Systems, 20-36, 2016
52016
Détection fiable et pertinente de flux d'information illégaux
G Hiet, L Mé, J Zimmermann, C Bidan, B Morin, VVT Tong
Sixth Conference on Security and Network Architectures (SARSSI), unknown, 2007
52007
Vers une détection d'intrusions à fiabilité et pertinence prouvables
C Bidan, G Hiet, L Mé, B Morin, J Zimmermann
REVUE DE L ELECTRICITE ET DE L ELECTRONIQUE 9, 75, 2006
52006
Towards a hardware-assisted information flow tracking ecosystem for ARM processors
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat
2016 26th International Conference on Field Programmable Logic and …, 2016
42016
A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat, AK Biswas
2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 92-97, 2018
32018
Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems
O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk
IFAC-PapersOnLine 51 (24), 1043-1050, 2018
32018
Preventive information flow control through a mechanism of split addresses
D Subramanian, G Hiet, C Bidan
Proceedings of the 9th International Conference on Security of Information …, 2016
22016
Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems
R Chevalier, D Plaquin, C Dalton, G Hiet
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
12019
BootKeeper: Validating Software Integrity Properties on Boot Firmware Images
R Chevalier, S Cristalli, C Hauser, Y Shoshitaishvili, R Wang, C Kruegel, ...
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20