Towards automated protocol reverse engineering using semantic information G Bossert, F Guihéry, G Hiet Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 137 | 2014 |
Modular verification of programs with effects and effect handlers in Coq T Letan, Y Régis-Gianas, P Chifflier, G Hiet Formal Methods: 22nd International Symposium, FM 2018, Held as Part of the …, 2018 | 43* | 2018 |
Policy-based intrusion detection in web applications by monitoring java information flows G Hiet, VVT Tong, L Me, B Morin 2008 Third International Conference on Risks and Security of Internet and …, 2008 | 33 | 2008 |
ARMHEx: A hardware extension for DIFT on ARM-based SoCs MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat 2017 27th International Conference on Field Programmable Logic and …, 2017 | 28 | 2017 |
Modelling to simulate botnet command and control protocols for the evaluation of network intrusion detection systems G Bossert, G Hiet, T Henin 2011 Conference on Network and Information Systems Security, 1-8, 2011 | 23 | 2011 |
Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode R Chevalier, M Villatel, D Plaquin, G Hiet Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 21 | 2017 |
Teaching android mobile security JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ... Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019 | 19 | 2019 |
Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications: mise … G Hiet Université Rennes 1, 2008 | 15 | 2008 |
Efficient mining of temporal safety properties for intrusion detection in industrial control systems O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk IFAC-PapersOnLine 51 (24), 1043-1050, 2018 | 12 | 2018 |
Netzob: un outil pour la rétro-conception de protocoles de communication G Bossert, F Guihéry, G Hiet SSTIC 2012, 43, 2012 | 12 | 2012 |
Monitoring both os and program level information flows to detect intrusions against network servers G Hiet, L Mé, B Morin, VVT Tong IEEE Workshop on Monitoring, Attack Detection and Mitigation, unknown, 2007 | 12 | 2007 |
Detecting process-aware attacks in sequential control systems O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016 | 10 | 2016 |
SpecCert: specifying and verifying hardware-based security enforcement T Letan, P Chifflier, G Hiet, P Néron, B Morin International Symposium on Formal Methods, 496-512, 2016 | 9 | 2016 |
A small and adaptive coprocessor for information flow tracking in ARM SoCs MA Wahab, P Cotret, MN Allah, G Hiet, AK Biswas, V Lapotre, G Gogniat 2018 International Conference on ReConFigurable Computing and FPGAs …, 2018 | 8 | 2018 |
Towards a hardware-assisted information flow tracking ecosystem for ARM processors MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat 2016 26th International Conference on Field Programmable Logic and …, 2016 | 7 | 2016 |
Vers une détection d'intrusions à fiabilité et pertinence prouvables C Bidan, G Hiet, L Mé, B Morin, J Zimmermann REVUE DE L ELECTRICITE ET DE L ELECTRONIQUE 9, 75, 2006 | 7 | 2006 |
Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems R Chevalier, D Plaquin, C Dalton, G Hiet Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 6 | 2019 |
Détection fiable et pertinente de flux d'information illégaux G Hiet, L Mé, J Zimmermann, C Bidan, B Morin, VVT Tong Sixth Conference on Security and Network Architectures (SARSSI), unknown, 2007 | 6 | 2007 |
Mitigating actions R Chevalier, D Plaquin, G Hiet, A Baldwin US Patent 10,896,085, 2021 | 4 | 2021 |
A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components MA Wahab, P Cotret, MN Allah, G Hiet, V Lapôtre, G Gogniat, AK Biswas 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 92-97, 2018 | 4 | 2018 |