Follow
Maxime Puys
Title
Cited by
Cited by
Year
Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections
ML Potet, L Mounier, M Puys, L Dureuil
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
522014
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol
M Puys, ML Potet, P Lafourcade
35th International Conference on Computer Safety, Reliability and Security, 2016
262016
Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks
L Rivière, ML Potet, TH Le, J Bringer, H Chabanne, M Puys
Foundations and Practice of Security: 7th International Symposium, FPS 2014 …, 2015
262015
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties
P Lafourcade, M Puys
8th International Symposium on Foundations & Practice of Security, 2015
222015
Dual protocols for private multi-party matrix multiplication and trust computations
JG Dumas, P Lafourcade, JB Orfila, M Puys
Computers & security 71, 51-70, 2017
182017
Private multi-party matrix multiplication and trust computations
JG Dumas, P Lafourcade, JB Orfila, M Puys
arXiv preprint arXiv:1607.03629, 2016
132016
Secure multiparty matrix multiplication based on strassen-winograd algorithm
JG Dumas, P Lafourcade, J Lopez Fenner, D Lucas, JB Orfila, C Pernet, ...
Advances in Information and Computer Security: 14th International Workshop …, 2019
102019
Formally verifying flow properties in industrial systems
J Dreier, M Puys, ML Potet, P Lafourcade, JL Roch
SECRYPT 2017-14th International Conference on Security and Cryptography, 55-66, 2017
92017
A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IoT/IIoT devices, and their detection mechanisms
NF Polychronou, PH Thevenon, M Puys, V Beroulle
ACM Transactions on Design Automation of Electronic Systems (TODAES) 27 (1 …, 2021
82021
An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems
S Mocanu, M Puys, PH Thevenon
C&esar 2019-Virtualization and Cybersecurity, 1-16, 2019
82019
Generation of applicative attacks scenarios against industrial systems
M Puys, ML Potet, A Khaled
Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018
82018
Formally and practically verifying flow properties in industrial systems
J Dreier, M Puys, ML Potet, P Lafourcade, JL Roch
Computers & Security 86, 453-470, 2019
62019
High-level simulation for multiple fault injection evaluation
M Puys, L Riviere, J Bringer, T Le
Data Privacy Management, Autonomous Spontaneous Security, and Security …, 2015
52015
Security architecture for point-to-point splitting protocols
B Badrignans, V Danjean, JG Dumas, P Elbaz-Vincent, S Machenaud, ...
WCICSS 2017-IEEE World Congress on Industrial Control Systems Security, 2017
42017
Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training
M Puys, PH Thevenon, S Mocanu
Proceedings of the 16th International Conference on Availability …, 2021
32021
Securing iot/iiot from software attacks targeting hardware vulnerabilities
NF Polychronou, PH Thevenon, P Maxime, V Beroulle
2021 19th IEEE International New Circuits and Systems Conference (NEWCAS), 1-4, 2021
32021
Madman: Detection of software attacks targeting hardware vulnerabilities
NF Polychronou, PH Thevenon, M Puys, V Beroulle
2021 24th Euromicro Conference on Digital System Design (DSD), 355-362, 2021
22021
WonderCloud, une plateforme pour l’analyse et l’émulation de micrologiciels ainsi que la composition de pots de miels
M Gallissot, M Puys, PH Thevenon
Proc. of the 27th C&esar conference on Deceptive Security (C&esar 2020 …, 2020
22020
Domain specific stateful filtering with worst-case bandwidth
M Puys, JL Roch, ML Potet
Critical Information Infrastructures Security: 11th International Conference …, 2017
22017
Génération systématique de scénarios d'attaques contre des systèmes industriels
M Puys, ML Potet, JL Roch
15èmes journées Approches Formelles dans l'Assistance au Développement de …, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20