Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine | 0 | 0.34 | 2021 |
RUSTINA: Automatically Checking and Patching Inline Assembly Interface Compliance (Artifact Evaluation) : Accepted submission #992 – "Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine" | 0 | 0.34 | 2021 |
Output-Sensitive Information Flow Analysis | 0 | 0.34 | 2021 |
Countermeasures Optimization in Multiple Fault-Injection Context | 0 | 0.34 | 2020 |
An End-to-End Approach for Multi-Fault Attack Vulnerability Assessment | 0 | 0.34 | 2020 |
Get Rid of Inline Assembly through Verification-Oriented Lifting. | 1 | 0.35 | 2019 |
Formally and practically verifying flow properties in industrial systems | 0 | 0.34 | 2019 |
Output-Sensitive Information Flow Analysis. | 1 | 0.35 | 2019 |
Model Generation For Quantified Formulas: A Taint-Based Approach | 1 | 0.35 | 2018 |
Symbolic Deobfuscation: From Virtualized Code Back To The Original | 1 | 0.35 | 2018 |
Generation of Applicative Attacks Scenarios Against Industrial Systems. | 0 | 0.34 | 2017 |
Formally Verifying Flow Properties in Industrial Systems. | 0 | 0.34 | 2017 |
FISSC: A Fault Injection and Simulation Secure Collection. | 3 | 0.38 | 2016 |
Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information. | 3 | 0.36 | 2016 |
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. | 2 | 0.39 | 2016 |
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free. | 2 | 0.37 | 2016 |
BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis | 11 | 0.49 | 2016 |
Domain Specific Stateful Filtering With Worst-Case Bandwidth | 0 | 0.34 | 2016 |
Specification of concretization and symbolization policies in symbolic execution. | 4 | 0.40 | 2016 |
From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference. | 9 | 0.56 | 2015 |
Apport des méthodes formelles pour l'exploitation de logs informatiques dans un contexte contractuel. | 0 | 0.34 | 2014 |
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. | 1 | 0.38 | 2014 |
Statically detecting use after free on binary code. | 23 | 0.85 | 2014 |
Combining Static and Dynamic Analysis for Vulnerability Detection | 2 | 0.38 | 2013 |
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis | 1 | 0.37 | 2013 |
Liability issues in software engineering: the use of formal methods to reduce legal uncertainties | 8 | 0.59 | 2011 |
Taint Dependency Sequences: A Characterization of Insecure Execution Paths Based on Input-Sensitive Cause Sequences | 12 | 0.77 | 2010 |
Liability in software engineering: overview of the LISE approach and illustration on a case study | 8 | 0.48 | 2010 |
Security policy enforcement through refinement process | 6 | 0.48 | 2010 |
GeneSyst: a tool to reason about behavioral aspects of B event specifications. application to security properties | 22 | 0.95 | 2010 |
A formal framework for specifying and analyzing logs as electronic evidence | 3 | 0.39 | 2010 |
GénéSyst : Génération d'un système de transitions étiquetées à partir d'une spécification B événementiel | 0 | 0.34 | 2010 |
Designing Log Architectures for Legal Evidence | 6 | 0.54 | 2010 |
Relaxing Restrictions on Invariant Composition in the B Method by Ownership Control a laSpec | 0 | 0.34 | 2009 |
A B Formal Framework For Security Developments In The Domain Of Smart Card Applications | 3 | 0.40 | 2008 |
A Verifiable Conformance Relationship between Smart Card Applets and B Security Models | 2 | 0.39 | 2008 |
Interpreting invariant composition in the b method using the spec# ownership relation: a way to explain and relax b restrictions | 3 | 0.39 | 2007 |
Adaptabilité et validation de la traduction de B vers C. Points de vue et résultats du projet BOM | 0 | 0.34 | 2004 |
Stratégie de couverture de test à un haut niveau d'abstraction | 0 | 0.34 | 2004 |
Adaptable Translator of B Specifications to Embedded C Programs | 31 | 1.63 | 2003 |
Spécifications et développements structurés dans la méthode B | 2 | 0.44 | 2003 |
Automatic Construction of Validated B Components from Structured Developments | 3 | 0.44 | 2000 |
Composition and Refinement in the B-Method | 15 | 0.95 | 1998 |
A VDM Specification of the Steam-Boiler Problem | 1 | 0.43 | 1995 |
Equational Reasonning and the Completion Procedure. A Comparative Study in Program Transformation | 0 | 0.34 | 1991 |
Program Synthesis = Proof Method + Knowledge (Example about Recursive Function Synthesis) | 0 | 0.34 | 1986 |
Program Synthesis Through Problem Splitting: A Method for Subproblem Characterization | 0 | 0.34 | 1984 |