Follow
Guillaume Hiet
Title
Cited by
Cited by
Year
Towards automated protocol reverse engineering using semantic information
G Bossert, F Guihéry, G Hiet
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
1632014
Modular verification of programs with effects and effect handlers in Coq
T Letan, Y Régis-Gianas, P Chifflier, G Hiet
Formal Methods: 22nd International Symposium, FM 2018, Held as Part of the …, 2018
45*2018
Policy-based intrusion detection in web applications by monitoring java information flows
G Hiet, VVT Tong, L Me, B Morin
2008 Third International Conference on Risks and Security of Internet and …, 2008
332008
ARMHEx: A hardware extension for DIFT on ARM-based SoCs
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat
2017 27th International Conference on Field Programmable Logic and …, 2017
322017
Teaching android mobile security
JF Lalande, V Viet Triem Tong, P Graux, G Hiet, W Mazurczyk, H Chaoui, ...
Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019
232019
Modelling to simulate botnet command and control protocols for the evaluation of network intrusion detection systems
G Bossert, G Hiet, T Henin
2011 Conference on Network and Information Systems Security, 1-8, 2011
232011
Co-processor-based behavior monitoring: Application to the detection of attacks against the system management mode
R Chevalier, M Villatel, D Plaquin, G Hiet
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
212017
Efficient mining of temporal safety properties for intrusion detection in industrial control systems
O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk
IFAC-PapersOnLine 51 (24), 1043-1050, 2018
152018
Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications: mise …
G Hiet
Université Rennes 1, 2008
152008
Detecting process-aware attacks in sequential control systems
O Koucham, S Mocanu, G Hiet, JM Thiriet, F Majorczyk
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
132016
Netzob: un outil pour la rétro-conception de protocoles de communication
G Bossert, F Guihéry, G Hiet
SSTIC 2012, 43, 2012
122012
Monitoring both os and program level information flows to detect intrusions against network servers
G Hiet, L Mé, B Morin, VVT Tong
IEEE Workshop on Monitoring, Attack Detection and Mitigation, unknown, 2007
122007
A small and adaptive coprocessor for information flow tracking in ARM SoCs
MA Wahab, P Cotret, MN Allah, G Hiet, AK Biswas, V Lapotre, G Gogniat
2018 International Conference on ReConFigurable Computing and FPGAs …, 2018
102018
SpecCert: specifying and verifying hardware-based security enforcement
T Letan, P Chifflier, G Hiet, P Néron, B Morin
International Symposium on Formal Methods, 496-512, 2016
92016
Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems
R Chevalier, D Plaquin, C Dalton, G Hiet
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
72019
Vers une détection d'intrusions à fiabilité et pertinence prouvables
C Bidan, G Hiet, L Mé, B Morin, J Zimmermann
REVUE DE L ELECTRICITE ET DE L ELECTRONIQUE 9, 75, 2006
72006
A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity
M Baty, P Wilke, G Hiet, A Fontaine, A Trieu
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 372-387, 2023
62023
RT-DFI: Optimizing data-flow integrity for real-time systems
N Bellec, G Hiet, S Rokicki, F Tronel, I Puaut
ECRTS 2022-34th Euromicro Conference on Real-Time Systems, 1-24, 2022
62022
Towards a hardware-assisted information flow tracking ecosystem for ARM processors
MA Wahab, P Cotret, MN Allah, G Hiet, V Lapotre, G Gogniat
2016 26th International Conference on Field Programmable Logic and …, 2016
62016
Détection fiable et pertinente de flux d'information illégaux
G Hiet, L Mé, J Zimmermann, C Bidan, B Morin, VVT Tong
Sixth Conference on Security and Network Architectures (SARSSI), unknown, 2007
62007
The system can't perform the operation now. Try again later.
Articles 1–20