[5]
| P.-H. Thevenon, S. Riou, D.-M. Tran, M. Puys, N. F. Polychronou, M. El Majihi, and C. Sivelle. iMRC: integrated monitoring & recovery component, a solution to guarantee the security of embedded systems. Journal of Internet Services and Information Security (JISIS) (Rank Scimago Q3), 13(1):4--32, 2022. [bib] [pdf]
@article{TRDPPES22,
author = {Thevenon, Pierre-Henri and
Riou, Sebastien and
Tran, Duc-Minh and
Puys, Maxime and
Polychronou, Nikolaos Foivos and
El Majihi, Mustapha and
Sivelle, Camille},
title = {{iMRC:} Integrated Monitoring \& Recovery Component, a Solution
to Guarantee the Security of Embedded Systems},
journal = {Journal of Internet Services and Information Security (JISIS)
(Rank Scimago Q3)},
volume = {13},
number = {1},
pages = {4--32},
year = {2022},
url = {https://maxime.puys.name/publications/pdf/TRDPPES22.pdf}
}
|
[4]
| M. Puys, P.-H. Thevenon, S. M. Mocanu, M. Gallissot, and C. Sivelle. SCADA cybersecurity awareness and teaching with hardware-in-the-loop platforms. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) (Rank Scimago Q2), 13(1):4--32, 2022. [bib] [pdf]
@article{PTMGS22,
author = {Puys, Maxime and
Thevenon, Pierre-Henri and
Mocanu, St\'{e}phane Mocanu and
Gallissot, Mathieu and
Sivelle, Camille},
title = {{SCADA} Cybersecurity Awareness and Teaching with
Hardware-In-The-Loop Platforms},
journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and
Dependable Applications (JoWUA) (Rank Scimago Q2)},
volume = {13},
number = {1},
pages = {4--32},
year = {2022},
url = {https://maxime.puys.name/publications/pdf/PTMGS22.pdf}
}
|
[3]
| N.-F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IoT/IIoT devices, and their detection mechanisms. ACM Transactions on Design Automation of Electronic Systems (Rank Sciamago Q2), 27(1):1--35, 2021. [bib] [pdf]
@article{PTPB21a,
author = {Polychronou, Nikolaos-Foivos and Thevenon, Pierre-Henri and
Puys, Maxime and Beroulle, Vincent},
title = {A Comprehensive Survey of Attacks without Physical Access
Targeting Hardware Vulnerabilities in {IoT/IIoT} Devices, and
Their Detection Mechanisms},
journal = {ACM Transactions on Design Automation of Electronic Systems
(Rank Sciamago Q2)},
volume = {27},
number = {1},
pages = {1--35},
year = {2021},
url = {https://maxime.puys.name/publications/pdf/PTPB21a.pdf}
}
|
[2]
| J. Dreier, M. Puys, M.-L. Potet, P. Lafourcade, and J.-L. Roch. Formally and practically verifying flow properties in industrial systems. Computers & Security, Elsevier (Rank Sciamago Q1), 86(1):453--470, 2019. [bib] [pdf]
@article{DPPLR19,
author = {Dreier, Jannik and
Puys, Maxime and
Potet, Marie-Laure and
Lafourcade, Pascal and
Roch, Jean-Louis},
title = {Formally and practically verifying flow properties in industrial
systems},
journal = {Computers \& Security, Elsevier (Rank Sciamago Q1)},
volume = {86},
number = {1},
pages = {453--470},
year = {2019},
url = {https://maxime.puys.name/publications/pdf/DPPLR18.pdf}
}
|
[1]
| J.-G. Dumas, P. Lafourcade, J.-B. Orfila, and M. Puys. Dual protocols for private multi-party matrix multiplication and trust computations. Computers & Security, Elsevier (Rank Sciamago Q1), 71(1):51--70, 2017. [bib] [pdf]
@article{DLOP17,
author = {Dumas, Jean-Guillaume and
Lafourcade, Pascal and
Orfila, Jean-Baptiste and
Puys, Maxime},
title = {Dual protocols for private multi-party matrix multiplication and
trust computations},
journal = {Computers \& Security, Elsevier (Rank Sciamago Q1)},
volume = {71},
number = {1},
pages = {51--70},
year = {2017},
url = {https://maxime.puys.name/publications/pdf/DLOP17.pdf}
}
|
[21]
| S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, M. Puys, and K. Sakiyama. Secure voting protocol using balance scale. Foundations and Practice of Security - 17th International Symposium, FPS 2024, Montreal, Canada, December 9-11, 2024, Revised Selected Papers, Montreal, Canada [bib] [pdf]
@inproceedings{KLMMPS24b,
title = {Secure Voting Protocol Using Balance Scale},
author = {Kaneko, Shohei and Lafourcade, Pascal and Mallordy, Lola-Baie and Miyahara, Daiki and Puys, Maxime and Sakiyama, Kazuo},
booktitle = {Foundations and Practice of Security - 17th International
Symposium, FPS 2024, Montreal, Canada, December 9-11, 2024,
Revised Selected Papers},
address = {Montreal, Canada},
year = {2024},
url = {https://maxime.puys.name/publications/pdf/KLMMPS24b.pdf}
}
|
[20]
| S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, M. Puys, and K. Sakiyama. Balance-based zkp protocols for pencil-and-paper puzzles. Information Security Conference, 2024 [bib] [pdf]
@inproceedings{KLMMPS24a,
title = {Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles},
author = {Kaneko, Shohei and Lafourcade, Pascal and Mallordy, Lola-Baie and Miyahara, Daiki and Puys, Maxime and Sakiyama, Kazuo},
booktitle = {Information Security Conference},
year = {2024},
url = {https://maxime.puys.name/publications/pdf/KLMMPS24a.pdf}
}
|
[19]
| M. Da Silva, M. Puys, P.-H. Thevenon, and S. Mocanu. Plc logic-based cybersecurity risks identification for ics. The 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B), 2023 [bib] [pdf]
@inproceedings{DPTM23,
title = {PLC Logic-Based Cybersecurity Risks Identification for ICS},
author = {Da Silva, Mike and Puys, Maxime and Thevenon, Pierre-Henri and
Mocanu, St\'{e}phane},
booktitle = {The 18th International Conference on Availability, Reliability
and Security, {ARES} 2023, Benevento, Italy, Aug. 29 – Sept. 1,
2023 (Rank Core B)},
year = {2023},
url = {https://maxime.puys.name/publications/pdf/DPTM23.pdf}
}
|
[18]
| M. Da Silva, M. Puys, P.-H. Thevenon, S. Mocanu, and N. Nkawa. Automated ics template for stride microsoft threat modeling tool. The 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B), 2023 [bib] [pdf]
@inproceedings{DPTMN23,
title = {Automated ICS template for STRIDE Microsoft Threat Modeling
Tool},
author = {Da Silva, Mike and Puys, Maxime and Thevenon, Pierre-Henri and
Mocanu, St\'{e}phane and Nkawa, Nelson},
booktitle = {The 18th International Conference on Availability, Reliability
and Security, {ARES} 2023, Benevento, Italy, Aug. 29 – Sept. 1,
2023 (Rank Core B)},
year = {2023},
url = {https://maxime.puys.name/publications/pdf/DPTMN23.pdf}
}
|
[17]
| N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. A hybrid solution for constraint devices to detect microarchitectural attacks. IEEE European Symposium on Security and Privacy (EuroS&P 2023) - Workshops, Delft, Netherlands, July 3-7, 2023, 2023 [bib] [pdf]
@inproceedings{PTPB23,
title = {A Hybrid Solution for Constraint Devices to Detect
Microarchitectural Attacks},
author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri
and Puys, Maxime and Beroulle, Vincent},
booktitle = {IEEE European Symposium on Security and Privacy (EuroS\&P 2023)
- Workshops, Delft, Netherlands, July 3-7, 2023},
year = {2023},
url = {https://maxime.puys.name/publications/pdf/PTPB23.pdf}
}
|
[16]
| C. Sivelle, L. Debbah, M. Puys, P. Lafourcade, and T. Franco-Rondisson. Automatic implementations synthesis of secure protocols and attacks from abstract models. 27th Nordic Conference on Secure IT Systems (NordSec), Reykjavik, Iceland, Nov. 30 -- Dec. 2, 2022 (Rank ERA C), 2022 [bib] [pdf]
@inproceedings{SDPLF22,
title = {Automatic Implementations Synthesis of Secure Protocols and
Attacks from Abstract Models},
author = {Sivelle, Camille and Debbah, Lorys and Puys, Maxime and Lafourcade,
Pascal and Franco-Rondisson, Thibault},
booktitle = {27th Nordic Conference on Secure IT Systems (NordSec), Reykjavik,
Iceland, Nov. 30 -- Dec. 2, 2022 (Rank ERA C)},
year = {2022},
url = {https://maxime.puys.name/publications/pdf/SDPLF22.pdf}
}
|
[15]
| N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. MaDMAN: Detection of software attacks targeting hardware vulnerabilities. 24th IEEE Euromicro Conference on Digital System Design (DSD), Palermo, Italy, Sept, 1-3, 2021 (Rank Qualis B1), pages 355--362, 2021 [bib] [pdf]
@inproceedings{PTPB21b,
title = {{MaDMAN}: Detection of Software Attacks Targeting Hardware Vulnerabilities},
author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri
and Puys, Maxime and Beroulle, Vincent},
booktitle = {24th IEEE Euromicro Conference on Digital System Design (DSD),
Palermo, Italy, Sept, 1-3, 2021 (Rank Qualis B1)},
pages = {355-362},
year = {2021},
url = {https://maxime.puys.name/publications/pdf/PTPB21b.pdf}
}
|
[14]
| N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. Securing IoI/IIoT from software attacks targeting hardware vulnerabilities. 2021 19th IEEE International New Circuits and Systems Conference (NEWCAS), Toulon, France, June 13-16, 2021 (Rank Qualis B4), pages 1--4, 2021 [bib] [pdf]
@inproceedings{PTPB21c,
title = {Securing {IoI}/{IIoT} from Software Attacks Targeting Hardware
Vulnerabilities},
author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri and
Puys, Maxime and Beroulle, Vincent},
booktitle = {2021 19th {IEEE} International New Circuits and Systems
Conference ({NEWCAS}), Toulon, France, June 13-16, 2021 (Rank
Qualis B4)},
pages = {1--4},
year = {2021},
url = {https://maxime.puys.name/publications/pdf/PTPB21c.pdf}
}
|
[13]
| M. Puys, P.-H. Thevenon, and S. Mocanu. Hardware-in-the-loop labs for scada cybersecurity awareness and training. The 16th International Conference on Availability, Reliability and Security, ARES 2021, Vienna, Austria, August 17-20, 2021 (Rank Core B), pages 1--10, 2021 [bib] [pdf]
@inproceedings{PTM21,
title = {Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training},
author = {Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane},
booktitle = {The 16th International Conference on Availability, Reliability and Security,
{ARES} 2021, Vienna, Austria, August 17-20, 2021 (Rank Core B)},
pages = {1--10},
year = {2021},
url = {https://maxime.puys.name/publications/pdf/PTM21.pdf}
}
|
[12]
| M. Puys, J.-P. Krimm, and R. Collado. Towards cybersecurity act: A survey on iot evaluation frameworks. SECURWARE 2020-The Fourteenth International Conference on Emerging Security Information, Systems and Technologies (Rank Qualis B3), pages 69--74, 2020 [bib] [pdf]
@inproceedings{PKC20,
title = {Towards Cybersecurity Act: A Survey on IoT Evaluation
Frameworks},
author = {Puys, Maxime and Krimm, Jean-Pierre and Collado, Rapha{\"e}l},
booktitle = {{SECURWARE} 2020-The Fourteenth International Conference on
Emerging Security Information, Systems and Technologies
(Rank Qualis B3)},
pages = {69--74},
year = {2020},
url = {https://maxime.puys.name/publications/pdf/PKC20.pdf}
}
|
[11]
| J. Dumas, P. Lafourcade, J. López Fenner, D. Lucas, J. Orfila, C. Pernet, and M. Puys. Secure multiparty matrix multiplication based on strassen-winograd algorithm. Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings (Rank Core B), pages 67--88, 2019 [bib] [pdf]
@inproceedings{DLFLPP19,
author = {Dumas, Jean{-}Guillaume and
Lafourcade, Pascal and
L{\'{o}}pez Fenner, Julio and
Lucas, David and
Orfila, Jean{-}Baptiste and
Pernet, Cl{\'{e}}ment and
Puys, Maxime},
title = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd
Algorithm},
booktitle = {Advances in Information and Computer Security - 14th International
Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
Proceedings (Rank Core B)},
pages = {67--88},
year = {2019},
url = {https://maxime.puys.name/publications/pdf/DLFLPP19.pdf}
}
|
[10]
| B. Badrignans, V. Danjean, J. Dumas, P. Elbaz-Vincent, S. Machenaud, J. Orfila, F. Pebay-Peyroula, F. Pebay-Peyroula, M. Potet, M. Puys, J. Richier, and R. Jean-Louis. Security Architecture for Embedded Point-to-Points Splitting Protocols. WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security, 2017 [bib] [pdf]
@inproceedings{BDDEOPPPRR17,
author = {Badrignans, Benoit and
Danjean, Vincent and
Dumas, Jean{-}Guillaume and
Elbaz{-}Vincent, Philippe and
Machenaud, Sabine and
Orfila, Jean{-}Baptiste and
Pebay{-}Peyroula, Florian and
Pebay{-}Peyroula, François and
Potet, Marie{-}Laure and
Puys, Maxime and
Richier, Jean{-}Luc and
Jean{-}Louis, Roch},
title = {{Security Architecture for Embedded Point-to-Points Splitting Protocols}},
booktitle = {{WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security}},
year = {2017},
url = {https://maxime.puys.name/publications/pdf/BDDEOPPPRR17.pdf}
}
|
[9]
| M. Puys, M. Potet, and A. Khaled. Generation of applicative attacks scenarios against industrial systems. Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers, pages 127--143, 2017 [bib] [pdf]
@inproceedings{PPK17,
author = {Puys, Maxime and
Potet, Marie{-}Laure and
Khaled, Abdelaziz},
title = {Generation of Applicative Attacks Scenarios Against Industrial Systems},
booktitle = {Foundations and Practice of Security - 10th International Symposium,
{FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers},
pages = {127--143},
year = {2017},
url = {https://maxime.puys.name/publications/pdf/PPK17.pdf}
}
|
[8]
| J. Dreier, M. Puys, M. Potet, P. Lafourcade, and J. Roch. Formally verifying flow integrity properties in industrial systems. Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE) 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017 (Rank Core B), pages 55--66, Best Student Paper Award, 2017 [bib] [pdf]
@inproceedings{DPPLR17,
author = {Dreier, Jannik and
Puys, Maxime and
Potet, Marie{-}Laure and
Lafourcade, Pascal and
Roch, Jean{-}Louis},
title = {Formally Verifying Flow Integrity Properties in Industrial Systems},
booktitle = {Proceedings of the 14th International Joint Conference on e-Business
and Telecommunications {(ICETE)} 2017) - Volume 4: SECRYPT, Madrid,
Spain, July 24-26, 2017 (Rank Core B)},
pages = {55--66},
year = {2017},
note = {Best Student Paper Award},
url = {https://maxime.puys.name/publications/pdf/DPPLR17.pdf}
}
|
[7]
| M. Puys, J. Roch, and M. Potet. Domain specific stateful filtering with worst-case bandwidth. Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers (Rank Core C), pages 321--327, 2016 [bib] [pdf]
@inproceedings{PRP16,
author = {Puys, Maxime and
Roch, Jean{-}Louis and
Potet, Marie{-}Laure},
title = {Domain Specific Stateful Filtering with Worst{-}Case Bandwidth},
booktitle = {Critical Information Infrastructures Security - 11th International
Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised
Selected Papers (Rank Core C)},
pages = {321--327},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PRP16.pdf}
}
|
[6]
| M. Puys, M. Potet, and P. Lafourcade. Formal analysis of security properties on the OPC-UA SCADA protocol. Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings (Rank Core B), pages 67--75, 2016 [bib] [pdf]
@inproceedings{PPL16,
author = {Puys, Maxime and
Potet, Marie{-}Laure and
Lafourcade, Pascal},
title = {Formal Analysis of Security Properties on the {OPC-UA} {SCADA} Protocol},
booktitle = {Computer Safety, Reliability, and Security - 35th International Conference,
{SAFECOMP} 2016, Trondheim, Norway, September 21-23, 2016, Proceedings (Rank Core B)},
pages = {67--75},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PPL16.pdf}
}
|
[5]
| J. Dumas, P. Lafourcade, J. Orfila, and M. Puys. Private multi-party matrix multiplication and trust computations. Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016 (Rank Core B), pages 61--72, Best Paper Award, 2016 [bib] [pdf]
@inproceedings{DLOP16,
author = {Dumas, Jean{-}Guillaume and
Lafourcade, Pascal and
Orfila, Jean{-}Baptiste and
Puys, Maxime},
title = {Private Multi-party Matrix Multiplication and Trust Computations},
booktitle = {Proceedings of the 13th International Joint Conference on e-Business
and Telecommunications ({ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
Portugal, July 26-28, 2016 (Rank Core B)},
pages = {61--72},
year = {2016},
note = {Best Paper Award},
url = {https://maxime.puys.name/publications/pdf/DLOP16.pdf}
}
|
[4]
| P. Lafourcade and M. Puys. Performance evaluations of cryptographic protocols verification tools dealing with algebraic properties. Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers, pages 137--155, 2015 [bib] [pdf]
@inproceedings{LP15,
author = {Lafourcade, Pascal and
Puys, Maxime},
title = {Performance Evaluations of Cryptographic Protocols Verification Tools
Dealing with Algebraic Properties},
booktitle = {Foundations and Practice of Security - 8th International Symposium,
{FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
Selected Papers},
pages = {137--155},
year = {2015},
url = {https://maxime.puys.name/publications/pdf/LP15.pdf}
}
|
[3]
| L. Rivière, M. Potet, T. Le, J. Bringer, H. Chabanne, and M. Puys. Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks. Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers, pages 92--111, 2014 [bib] [pdf]
@inproceedings{RPLBCP14,
author = {Rivi{\`{e}}re, Lionel and
Potet, Marie{-}Laure and
Le, Thanh{-}Ha and
Bringer, Julien and
Chabanne, Herv{\'{e}} and
Puys, Maxime},
title = {Combining High-Level and Low-Level Approaches to Evaluate Software
Implementations Robustness Against Multiple Fault Injection Attacks},
booktitle = {Foundations and Practice of Security - 7th International Symposium,
{FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
Papers},
pages = {92--111},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/RPLBCP14.pdf}
}
|
[2]
| M. Puys, L. Rivière, J. Bringer, and T. Le. High-level simulation for multiple fault injection evaluation. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers, pages 293--308, 2014 [bib] [pdf]
@inproceedings{PRBL14,
author = {Puys, Maxime and
Rivi{\`{e}}re, Lionel and
Bringer, Julien and
Le, Thanh{-}Ha},
title = {High-Level Simulation for Multiple Fault Injection Evaluation},
booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security
Assurance - 9th International Workshop, {DPM} 2014, 7th International
Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
pages = {293--308},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PRBL14.pdf}
}
|
[1]
| M. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. Seventh IEEE International Conference on Software Testing, Verification and Validation, ICST 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, USA (Core Rank A), pages 213--222, 2014 [bib] [pdf]
@inproceedings{PMPD14,
author = {Potet, Marie{-}Laure and
Mounier, Laurent and
Puys, Maxime and
Dureuil, Louis},
title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of
Secured Codes against Control Flow Injections},
booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification
and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland,
Ohio, {USA} (Core Rank A)},
pages = {213--222},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf}
}
|
[8]
| M. Puys and P.-H. Thevenon. PULSE - cybersécurité des systèmes industriels. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2022, Chambon-sur-Lac, France, 2022 [bib] [pdf]
@inproceedings{PT22,
author = {Puys, Maxime and
Thevenon, Pierre-Henri},
title = {{PULSE} - Cybersécurité des systèmes industriels},
booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la
S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2022,
Chambon-sur-Lac, France}},
year = {2022},
url = {https://maxime.puys.name/publications/pdf/PT22.pdf}
}
|
[7]
| M. Gallissot, M. Puys, and P.-H. Thevenon. Wonder-Cloud, une plateforme pour l’analyse et l’émulation de micrologiciels ainsi que la composition de pots de miels. C&esar 2020 - Deceptive Security, Rennes, France, pages 1--8, 2020 [bib] [pdf]
@inproceedings{GPT20,
author = {Gallissot, Mathieu and Puys, Maxime and Thevenon, Pierre-Henri},
title = {{Wonder-Cloud, une plateforme pour l’analyse et l’{\'e}mulation
de micrologiciels ainsi que la composition de pots de miels}},
booktitle = {{C\&esar 2020 - Deceptive Security, Rennes, France}},
pages = {1--8},
year = {2020},
url = {https://maxime.puys.name/publications/pdf/GPT20.pdf}
}
|
[6]
| S. Mocanu, M. Puys, and P.-H. Thevenon. An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems. C&esar 2019 - Virtualization and Cybersecurity, Rennes, France, pages 1--16, 2019 [bib] [pdf]
@inproceedings{MPT19,
author = {Mocanu, St{\'e}phane and
Puys, Maxime and
Thevenon, Pierre-Henri},
title = {{An Open-Source Hardware-In-The-Loop Virtualization System for
Cybersecurity Studies of SCADA Systems}},
booktitle = {{C\&esar 2019 - Virtualization and Cybersecurity, Rennes, France}},
pages = {1-16},
year = {2019},
url = {https://maxime.puys.name/publications/pdf/MPT19.pdf}
}
|
[5]
| M. Puys and P.-H. Thevenon. Les défis posés par la sécurisation de l'iot industriel. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2019, Erquy, France, 2019 [bib] [pdf]
@inproceedings{PT19,
author = {Puys, Maxime and
Thevenon, Pierre-Henri},
title = {Les d{\'e}fis pos{\'e}s par la s{\'e}curisation de l'IoT industriel},
booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la
S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2019,
Erquy, France}},
year = {2019},
url = {https://maxime.puys.name/publications/pdf/PT19.pdf}
}
|
[4]
| M. Puys, M. Potet, and J. Roch. Filtrage et vérification de flux métiers dans les systèmes industriels. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2016, Toulouse, France, 2016 [bib] [pdf]
@inproceedings{PPR16b,
author = {Puys, Maxime and
Potet, Marie{-}Laure and
Roch, Jean{-}Louis},
title = {Filtrage et v{\'e}rification de flux m{\'e}tiers dans les
syst{\`e}mes industriels},
booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la
S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2016,
Toulouse, France}},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PPR16b.pdf}
}
|
[3]
| M. Puys, M. Potet, and J. Roch. Génération systématique de scénarios d'attaques contre des systèmes industriels. Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL 2016, Besançon, France, 2016 [bib] [pdf]
@inproceedings{PPR16a,
author = {Puys, Maxime and
Potet, Marie{-}Laure and
Roch, Jean{-}Louis},
title = {G{\'e}n{\'e}ration syst{\'e}matique de sc{\'e}narios d'attaques
contre des syst{\`e}mes industriels},
booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de
Logiciels, AFADL 2016, Besan{\c c}on, France}},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PPR16a.pdf}
}
|
[2]
| M. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. 1er Colloque sur la Confiance Numérique en Auvergne, Clermont-Ferrand, France, 2014 [bib] [pdf]
@inproceedings{PMPD14b,
author = {Potet, Marie{-}Laure and
Mounier, Laurent and
Puys, Maxime and
Dureuil, Louis},
title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of
Secured Codes against Control Flow Injections},
booktitle = {{1er Colloque sur la Confiance Num{\'e}rique en Auvergne,
Clermont-Ferrand, France}},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf}
}
|
[1]
| M. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL 2014, Paris, France, 2014 [bib] [pdf]
@inproceedings{PMPD14a,
author = {Potet, Marie{-}Laure and
Mounier, Laurent and
Puys, Maxime and
Dureuil, Louis},
title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of
Secured Codes against Control Flow Injections},
booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de
Logiciels, AFADL 2014, Paris, France}},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf}
}
|