[11]
|
J. Dumas, P. Lafourcade, J. L. Fenner, D. Lucas, J. Orfila, C. Pernet, and
M. Puys.
Secure multiparty matrix multiplication based on strassen-winograd
algorithm.
In Advances in Information and Computer Security - 14th
International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30,
2019, Proceedings, 2019.
[pdf] [bib]
@inproceedings{DLLLOPP19,
author = {Jean{-}Guillaume Dumas and
Pascal Lafourcade and
Julio L{\'{o}}pez Fenner and
David Lucas and
Jean{-}Baptiste Orfila and
Cl{\'{e}}ment Pernet and
Maxime Puys},
title = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd
Algorithm},
booktitle = {Advances in Information and Computer Security - 14th International
Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
Proceedings},
year = {2019},
url = {https://maxime.puys.name/publications/pdf/DLLLOPP19.pdf}
}
|
[10]
|
B. Badrignans, V. Danjean, J. Dumas, P. Elbaz-Vincent, S. Machenaud,
J. Orfila, F. Pebay-Peyroula, F. Pebay-Peyroula, M. Potet, M. Puys,
J. Richier, and J. Roch.
Security Architecture for Embedded Point-to-Points Splitting
Protocols.
In WCICSS'17, 2017.
[pdf] [bib]
@inproceedings{BDDEOPPPRR17,
author = {Badrignans, Benoit and
Danjean, Vincent and
Dumas, Jean{-}Guillaume and
Elbaz{-}Vincent, Philippe and
Machenaud, Sabine and
Orfila, Jean{-}Baptiste and
Pebay{-}Peyroula, Florian and
Pebay{-}Peyroula, François and
Potet, Marie{-}Laure and
Puys, Maxime and
Richier, Jean{-}Luc and
Roch, Jean{-}Louis},
title = {{Security Architecture for Embedded Point-to-Points Splitting Protocols}},
booktitle = {WCICSS'17},
year = {2017},
url = {https://maxime.puys.name/publications/pdf/BDDEOPPPRR17.pdf}
}
|
[9]
|
M. Puys, M. Potet, and A. Khaled.
Generation of applicative attacks scenarios against industrial
systems.
In FPS'17, Nancy, France, 2017.
[pdf] [bib]
@inproceedings{PPK17,
author = {Maxime Puys and
Marie{-}Laure Potet and
Abdelaziz Khaled},
title = {Generation of Applicative Attacks Scenarios Against Industrial Systems},
booktitle = {FPS'17, Nancy, France},
year = {2017},
url = {https://maxime.puys.name/publications/pdf/PPK17.pdf}
}
|
[8]
|
J. Dreier, M. Puys, M. Potet, P. Lafourcade, and J. Roch.
Formally verifying flow integrity properties in industrial systems.
In SECRYPT'17, Madrid, Spain, 2017.
Best Student Paper Award.
[pdf] [bib]
@inproceedings{DPPLR17,
author = {Jannik Dreier and
Maxime Puys and
Marie{-}Laure Potet and
Pascal Lafourcade and
Jean{-}Louis Roch},
title = {Formally Verifying Flow Integrity Properties in Industrial Systems},
booktitle = {SECRYPT'17, Madrid, Spain},
year = {2017},
url = {https://maxime.puys.name/publications/pdf/DPPLR17.pdf}
}
|
[7]
|
M. Puys, J. Roch, and M. Potet.
Domain specific stateful filtering with worst-case bandwidth.
In CRITIS'16, Paris, France, 2016.
[pdf] [bib]
@inproceedings{PRP16,
author = {Maxime Puys and
Jean{-}Louis Roch and
Marie{-}Laure Potet},
title = {Domain Specific Stateful Filtering with Worst{-}Case Bandwidth},
booktitle = {CRITIS'16, Paris, France},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PRP16.pdf}
}
|
[6]
|
M. Puys, M. Potet, and P. Lafourcade.
Formal analysis of security properties on the OPC-UA SCADA
protocol.
In Computer Safety, Reliability, and Security - 35th
International Conference, SAFECOMP 2016, Trondheim, Norway, September
21-23, 2016, Proceedings, pages 67--75, 2016.
[pdf] [bib]
@inproceedings{PPL16,
author = {Maxime Puys and
Marie{-}Laure Potet and
Pascal Lafourcade},
title = {Formal Analysis of Security Properties on the {OPC-UA} {SCADA} Protocol},
booktitle = {Computer Safety, Reliability, and Security - 35th International Conference,
{SAFECOMP} 2016, Trondheim, Norway, September 21-23, 2016, Proceedings},
pages = {67--75},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PPL16.pdf}
}
|
[5]
|
J. Dumas, P. Lafourcade, J. Orfila, and M. Puys.
Private multi-party matrix multiplication and trust computations.
In Proceedings of the 13th International Joint Conference on
e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon,
Portugal, July 26-28, 2016., pages 61--72, 2016.
Best Paper Award.
[pdf] [bib]
@inproceedings{DLOP16,
author = {Jean{-}Guillaume Dumas and
Pascal Lafourcade and
Jean{-}Baptiste Orfila and
Maxime Puys},
title = {Private Multi-party Matrix Multiplication and Trust Computations},
booktitle = {Proceedings of the 13th International Joint Conference on e-Business
and Telecommunications ({ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
Portugal, July 26-28, 2016.},
pages = {61--72},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/DLOP16.pdf}
}
|
[4]
|
P. Lafourcade and M. Puys.
Performance evaluations of cryptographic protocols verification tools
dealing with algebraic properties.
In Foundations and Practice of Security - 8th International
Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
Selected Papers, pages 137--155, 2015.
[pdf] [bib]
@inproceedings{LP15,
author = {Pascal Lafourcade and
Maxime Puys},
title = {Performance Evaluations of Cryptographic Protocols Verification Tools
Dealing with Algebraic Properties},
booktitle = {Foundations and Practice of Security - 8th International Symposium,
{FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
Selected Papers},
pages = {137--155},
year = {2015},
url = {https://maxime.puys.name/publications/pdf/LP15.pdf}
}
|
[3]
|
L. Rivière, M. Potet, T. Le, J. Bringer, H. Chabanne, and M. Puys.
Combining high-level and low-level approaches to evaluate software
implementations robustness against multiple fault injection attacks.
In Foundations and Practice of Security - 7th International
Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised
Selected Papers, pages 92--111, 2014.
[pdf] [bib]
@inproceedings{RPLBCP14,
author = {Lionel Rivi{\`{e}}re and
Marie{-}Laure Potet and
Thanh{-}Ha Le and
Julien Bringer and
Herv{\'{e}} Chabanne and
Maxime Puys},
title = {Combining High-Level and Low-Level Approaches to Evaluate Software
Implementations Robustness Against Multiple Fault Injection Attacks},
booktitle = {Foundations and Practice of Security - 7th International Symposium,
{FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
Papers},
pages = {92--111},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/RPLBCP14.pdf}
}
|
[2]
|
M. Puys, L. Rivière, J. Bringer, and T. Le.
High-level simulation for multiple fault injection evaluation.
In Data Privacy Management, Autonomous Spontaneous Security, and
Security Assurance - 9th International Workshop, DPM 2014, 7th
International Workshop, SETOP 2014, and 3rd International Workshop, QASA
2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers, pages
293--308, 2014.
[pdf] [bib]
@inproceedings{PRBL14,
author = {Maxime Puys and
Lionel Rivi{\`{e}}re and
Julien Bringer and
Thanh{-}Ha Le},
title = {High-Level Simulation for Multiple Fault Injection Evaluation},
booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security
Assurance - 9th International Workshop, {DPM} 2014, 7th International
Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
pages = {293--308},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PRBL14.pdf}
}
|
[1]
|
M. Potet, L. Mounier, M. Puys, and L. Dureuil.
Lazart: A symbolic approach for evaluation the robustness of
secured codes against control flow injections.
In Seventh IEEE International Conference on Software Testing,
Verification and Validation, ICST 2014, March 31 2014-April 4, 2014,
Cleveland, Ohio, USA, pages 213--222, 2014.
[pdf] [bib]
@inproceedings{PMPD14,
author = {Marie{-}Laure Potet and
Laurent Mounier and
Maxime Puys and
Louis Dureuil},
title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of
Secured Codes against Control Flow Injections},
booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification
and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland,
Ohio, {USA}},
pages = {213--222},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf}
}
|
[4]
|
M. Puys, M. Potet, and J. Roch.
Filtrage et vérification de flux métiers dans les
systèmes industriels.
In Rendez-Vous de la Recherche et de l'Enseignement de la
Sécurité des Systèmes d'Information, RESSI 2016, Toulouse,
France, 2016.
[pdf] [bib]
@inproceedings{PPR16b,
author = {Maxime Puys and
Marie{-}Laure Potet and
Jean{-}Louis Roch},
title = {Filtrage et v{\'e}rification de flux m{\'e}tiers dans les
syst{\`e}mes industriels},
booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la
S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2016,
Toulouse, France}},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PPR16b.pdf}
}
|
[3]
|
M. Puys, M. Potet, and J. Roch.
Génération systématique de scénarios d'attaques
contre des systèmes industriels.
In Approches Formelles dans l'Assistance au Développement
de Logiciels, AFADL 2016, Besançon, France, 2016.
[pdf] [bib]
@inproceedings{PPR16a,
author = {Maxime Puys and
Marie{-}Laure Potet and
Jean{-}Louis Roch},
title = {G{\'e}n{\'e}ration syst{\'e}matique de sc{\'e}narios d'attaques
contre des syst{\`e}mes industriels},
booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de
Logiciels, AFADL 2016, Besan{\c c}on, France}},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PPR16a.pdf}
}
|
[2]
|
M. Potet, L. Mounier, M. Puys, and L. Dureuil.
Lazart: A symbolic approach for evaluation the robustness of
secured codes against control flow injections.
In 1er Colloque sur la Confiance Numérique en Auvergne,
Clermont-Ferrand, France.
[pdf] [bib]
@inproceedings{PMPD14b,
author = {Marie{-}Laure Potet and
Laurent Mounier and
Maxime Puys and
Louis Dureuil},
title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of
Secured Codes against Control Flow Injections},
booktitle = {{1er Colloque sur la Confiance Num{\'e}rique en Auvergne,
Clermont-Ferrand, France}},
url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf}
}
|
[1]
|
M. Potet, L. Mounier, M. Puys, and L. Dureuil.
Lazart: A symbolic approach for evaluation the robustness of
secured codes against control flow injections.
In Approches Formelles dans l'Assistance au Développement
de Logiciels, AFADL 2014, Paris, France, 2014.
[pdf] [bib]
@inproceedings{PMPD14a,
author = {Marie{-}Laure Potet and
Laurent Mounier and
Maxime Puys and
Louis Dureuil},
title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of
Secured Codes against Control Flow Injections},
booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de
Logiciels, AFADL 2014, Paris, France}},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf}
}
|