Maxime Puys
Maxime Puys
CEA-Leti
Verifierad e-postadress på cea.fr - Startsida
TitelCiteras avÅr
Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections
ML Potet, L Mounier, M Puys, L Dureuil
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
232014
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties
P Lafourcade, M Puys
8th International Symposium on Foundations & Practice of Security, 2015
142015
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol
M Puys, ML Potet, P Lafourcade
35th International Conference on Computer Safety, Reliability and Security, 2016
112016
Formally Verifying Flow Properties in Industrial Systems
J Dreier, M Puys, ML Potet, P Lafourcade, JL Roch
82017
Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks
L Rivičre, ML Potet, TH Le, J Bringer, H Chabanne, M Puys
International Symposium on Foundations and Practice of Security, 92-111, 2014
82014
Dual protocols for private multi-party matrix multiplication and trust computations
JG Dumas, P Lafourcade, JB Orfila, M Puys
Computers & security 71, 51-70, 2017
72017
Private multi-party matrix multiplication and trust computations
JG Dumas, P Lafourcade, JB Orfila, M Puys
arXiv preprint arXiv:1607.03629, 2016
72016
Generation of applicative attacks scenarios against industrial systems
M Puys, ML Potet, A Khaled
International Symposium on Foundations and Practice of Security, 127-143, 2017
52017
High-level simulation for multiple fault injection evaluation
M Puys, L Riviere, J Bringer, T Le
Data Privacy Management, Autonomous Spontaneous Security, and Security …, 2014
32014
Security architecture for point-to-point splitting protocols
B Badrignans, V Danjean, JG Dumas, P Elbaz-Vincent, S Machenaud, ...
22017
Domain specific stateful filtering with worst-case bandwidth
M Puys, JL Roch, ML Potet
International Conference on Critical Information Infrastructures Security …, 2016
22016
Génération systématique de scénarios d'attaques contre des systčmes industriels
M Puys, ML Potet, JL Roch
15čmes journées Approches Formelles dans l'Assistance au Développement de …, 2016
22016
Secure Multi-Party Matrix Multiplication Based on Strassen-Winograd Algorithm
JG Dumas, P Lafourcade, J Fenner, D Lucas, JB Orfila, C Pernet, M Puys
12019
An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems
S Mocanu, M Puys, PH Thevenon
2019
Formally and practically verifying flow properties in industrial systems
J Dreier, M Puys, ML Potet, P Lafourcade, JL Roch
Computers & Security 86, 453-470, 2019
2019
Formally and Practically Verifying Flow Integrity Properties in Industrial Systems
J Dreier, M Puys, ML Potet, P Lafourcade, JL Roch
2018
Sécurité des systčmes industriels: filtrage applicatif et recherche de scénarios d'attaques
M Puys
2018
Systematic generation of attack scenarios against industrial systems
M Puys, ML Potet, JL Roch
2016
Formal Analysis and Smart-Fuzzing of Industrial Systems
M Puys, ML Potet, JL Roch
RESSI, 2016
2016
Filtrage et vérification de flux métiers dans les systčmes industriels
M Puys, ML Potet, JL Roch
Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systčmes …, 2016
2016
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20