Nombre de documents

9

CV de Maxime Puys


Communication dans un congrès9 documents

  • Maxime Puys, Jean-Louis Roch, Marie-Laure Potet. Domain Specific Stateful Filtering with Worst-Case Bandwidth. 11th International Conference on Critical Information Infrastructures Security (CRITIS 2016), Oct 2016, Paris, France. <http://critis2016.org/>. <hal-01393829>
  • Maxime Puys, Marie-Laure Potet, Jean-Louis Roch. Filtrage et vérification de flux métiers dans les systèmes industriels. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France. <ressi2016.sciencesconf.org>. <hal-01316590>
  • Maxime Puys, Marie-Laure Potet, Jean-Louis Roch. Génération systématique de scénarios d'attaques contre des systèmes industriels. 15èmes journées Approches Formelles dans l'Assistance au Développement de Logiciels, Jun 2016, Besançon, France. <http://afadl2016.conf.citi-lab.fr/>. <hal-01330949>
  • Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys. Private Multi-party Matrix Multiplication and Trust Computations. Pierangela Samarati. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.61-72, 2016, Proceedings of the 13th International Joint Conference on e-Business and Telecommunications. <http://www.secrypt.icete.org/>. <10.5220/0005957200610072>. <hal-01344750v2>
  • Maxime Puys, Marie-Laure Potet, Pascal Lafourcade. Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. 35th International Conference, SAFECOMP 2016, Sep 2016, Trondheim, Norway. 2016, 35th International Conference, SAFECOMP 2016. <https://www.ntnu.edu/safecomp2016>. <10.1007/978-3-319-45477-1_6>. <hal-01366059>
  • Pascal Lafourcade, Maxime Puys. Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties. 8th International Symposium on Foundations and Practice of Security 8th International Symposium, FPS 2015, Oct 2015, Clermont-Ferrand, France. Springer, 8th International Symposium, FPS 2015 pp.137-155, 2016, Foundations nd Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers. <http://confiance-numerique.clermont-universite.fr/fps2015/>. <10.1007/978-3-319-30303-1_9>. <hal-01306395>
  • Marie-Laure Potet, Laurent Mounier, Maxime Puys, Louis Dureuil. Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections. Seventh IEEE International Conference on Software Testing, Verification and Validation, Mar 2014, Cleveland, United States. Seventh IEEE International Conference on Software Testing, Verification and Validation, ICST 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, USA, 2014, <10.1109/ICST.2014.34>. <hal-01229274>
  • Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne, et al.. Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. Foundations and Practice of Security, Nov 2014, Montreal, Canada. Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers, <10.1007/978-3-319-17040-4_7>. <hal-01229261>
  • Maxime Puys, Lionel Rivière, Julien Bringer, Thanh-Ha Le. High-Level Simulation for Multiple Fault Injection Evaluation. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, Sep 2014, Wroclaw, Poland. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers, 2015, <10.1007/978-3-319-17016-9_19>. <hal-01229279>