Accéder directement au contenu

Maxime Puys

Maitre de conférences à l'Université Clermont Auvergne
93%
Libre accès
30
Documents
Affiliations actuelles
  • 1063677
Identifiants chercheurs

Publications

Image document

Automatic implementations synthesis of secure protocols and attacks from abstract models

Camille Sivelle , Lorys Debbah , Maxime Puys , Pascal Lafourcade , Thibault Franco-Rondisson
Lecture Notes in Computer Science, 2023, Secure IT Systems, 13700, pp.234-252. ⟨10.1007/978-3-031-22295-5_13⟩
Article dans une revue hal-03835049v1
Image document

A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms

Nikolaos-Foivos Polychronou , Pierre-Henri Thevenon , Maxime Puys , Vincent Beroulle
ACM Transactions on Design Automation of Electronic Systems, 2022, 27 (1), pp.1-35. ⟨10.1145/3471936⟩
Article dans une revue hal-03600586v1

iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems

Pierre-Henri Thevenon , Sébastien Riou , Duc-Minh Tran , Maxime Puys , Nikolaos Polychronou
Journal of Internet Services and Information Security (JISIS), 2022, 12 (2), pp.1-24
Article dans une revue cea-04072866v1
Image document

SCADA cybersecurity awareness and teaching with Hardware-In-The-Loop platforms

Maxime Puys , Pierre-Henri Thevenon , Stéphane Mocanu , Mathieu Gallissot , Camille Sivelle
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2022, 13 (1), pp.4-32. ⟨10.22667/JOWUA.2022.03.31.004⟩
Article dans une revue hal-03636896v1
Image document

Formally and Practically Verifying Flow Integrity Properties in Industrial Systems

Jannik Dreier , Maxime Puys , Marie-Laure Potet , Pascal Lafourcade , Jean-Louis Roch
Computers and Security, 2018, 86, pp.453-470. ⟨10.1016/j.cose.2018.09.018⟩
Article dans une revue hal-01959766v2
Image document

Dual Protocols for Private Multi-party Matrix Multiplication and Trust Computations

Jean-Guillaume Dumas , Pascal Lafourcade , Jean-Baptiste Orfila , Maxime Puys
Computers and Security, 2017, 71, pp.51-70. ⟨10.1016/j.cose.2017.04.013⟩
Article dans une revue hal-01497866v1
Image document

A hybrid solution for constrained devices to detect microarchitectural attacks

Nikolaos Foivos Polychronou , Pierre-Henri Thevenon , Maxime Puys , Vincent Beroulle
EuroS&P 2023 - 8th IEEE European Symposium on Security and Privacy, Jul 2023, Delft, Netherlands
Communication dans un congrès hal-04149021v1
Image document

Automated ICS template for STRIDE Microsoft Threat Modeling Tool

Mike Da Silva , Maxime Puys , Pierre-Henri Thevenon , Stéphane Mocanu , Nelson Nkawa
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Aug 2023, Benevento, Italy. pp.1-7, ⟨10.1145/3600160.3605068⟩
Communication dans un congrès hal-04165419v1
Image document

PLC Logic-Based Cybersecurity Risks Identification for ICS

Mike Da Silva , Maxime Puys , Pierre-Henri Thevenon , Stéphane Mocanu
ARES 2023 - 18th International Conference on Availability, Reliability and Security, Aug 2023, Benevento, Italy. pp.1-10, ⟨10.1145/3600160.3605067⟩
Communication dans un congrès hal-04165414v1

Research for a new solution for the detection of malwares in IoT/IIoT devices

Nikolaos Polychronou , Pierre-Henri Thevenon , Maxime Puys
Journée Code et Cryptographie 2022, Oct 2022, Toulouse, France
Communication dans un congrès cea-04072867v1
Image document

Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities

Nikolaos Foivos Polychronou , Pierre-Henri Thevenon , Vincent Beroulle , Nikolaos Polychronou , Maxime Puys
19th IEEE International New Circuits and Systems Conference (NEWCAS 2021), Jun 2021, Toulon, France. ⟨10.1109/NEWCAS50681.2021.9462776⟩
Communication dans un congrès hal-03601214v1
Image document

MaDMAN: Detection of Software Attacks Targeting Hardware Vulnerabilities

Nikolaos Foivos Polychronou , Pierre-Henri Thevenon , Vincent Beroulle , Maxime Puys
2021 24th Euromicro Conference on Digital System Design (DSD), Sep 2021, Palermo, France. pp.355-362, ⟨10.1109/DSD53832.2021.00060⟩
Communication dans un congrès hal-03601312v1
Image document

Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training

Maxime Puys , Pierre-Henri Thevenon , Stéphane Mocanu
ARES 2021 - 16th International Conference on Availability, Reliability and Security - Workshop on Education, Training and Awareness in Cybersecurity (ETACS 2021), Aug 2021, Vienna, Austria. ⟨10.1145/3465481.3469185⟩
Communication dans un congrès hal-03282601v1
Image document

Towards Cybersecurity Act: A Survey on IoT Evaluation Frameworks

Maxime Puys , Jean-Pierre Krimm , Raphaël Collado
SECURWARE 2020 - The Fourteenth International Conference on Emerging Security Information, Systems and Technologies, Nov 2020, Valence, Spain
Communication dans un congrès cea-03019512v1
Image document

Secure Multi-Party Matrix Multiplication Based on Strassen-Winograd Algorithm

Jean-Guillaume Dumas , Pascal Lafourcade , Julio Lopez Fenner , David Lucas , Jean-Baptiste Orfila
The 14th International Workshop on Security (IWSEC 2019), Aug 2019, Tokyo, Japan. pp.67-88, ⟨10.1007/978-3-030-26834-3_5⟩
Communication dans un congrès hal-01781554v3
Image document

An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems

Stéphane Mocanu , Maxime Puys , Pierre-Henri Thevenon
C&esar 2019 - Virtualization and Cybersecurity, Nov 2019, Rennes, France. pp.1-16
Communication dans un congrès hal-02371133v1
Image document

Formally Verifying Flow Properties in Industrial Systems

Jannik Dreier , Maxime Puys , Marie-Laure Potet , Pascal Lafourcade , Jean-Louis Roch
SECRYPT 2017 - 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.55-66, ⟨10.5220/0006396500550066⟩
Communication dans un congrès hal-01527913v1
Image document

Generation of Applicative Attacks Scenarios Against Industrial Systems

Maxime Puys , Marie-Laure Potet , Abdelaziz Khaled
10th International Symposium on Foundations and Practice of Security, FPS 2017, Oct 2017, Nancy, France
Communication dans un congrès hal-01615534v1
Image document

Security Architecture for Point-to-Point Splitting Protocols

Benoit Badrignans , Vincent Danjean , Jean-Guillaume Dumas , Philippe Elbaz-Vincent , Sabine Machenaud
WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security, Dec 2017, Cambridge, United Kingdom
Communication dans un congrès hal-01657605v1
Image document

Domain Specific Stateful Filtering with Worst-Case Bandwidth

Maxime Puys , Jean-Louis Roch , Marie-Laure Potet
11th International Conference on Critical Information Infrastructures Security (CRITIS 2016), UIC, Oct 2016, Paris, France
Communication dans un congrès hal-01393829v1
Image document

Formal Analysis of Security Properties on the OPC-UA SCADA Protocol

Maxime Puys , Marie-Laure Potet , Pascal Lafourcade
35th International Conference, SAFECOMP 2016, Sep 2016, Trondheim, Norway. ⟨10.1007/978-3-319-45477-1_6⟩
Communication dans un congrès hal-01366059v1
Image document

Private Multi-party Matrix Multiplication and Trust Computations

Jean-Guillaume Dumas , Pascal Lafourcade , Jean-Baptiste Orfila , Maxime Puys
13th International Conference on Security and Cryptography SECRYPT 16, Jul 2016, Lisbon, Portugal. pp.61-72, ⟨10.5220/0005957200610072⟩
Communication dans un congrès hal-01344750v2
Image document

Génération systématique de scénarios d'attaques contre des systèmes industriels

Maxime Puys , Marie-Laure Potet , Jean-Louis Roch
15èmes journées Approches Formelles dans l'Assistance au Développement de Logiciels, Jun 2016, Besançon, France
Communication dans un congrès hal-01330949v1
Image document

Filtrage et vérification de flux métiers dans les systèmes industriels

Maxime Puys , Marie-Laure Potet , Jean-Louis Roch
Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), May 2016, Toulouse, France
Communication dans un congrès hal-01316590v1
Image document

Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties

Pascal Lafourcade , Maxime Puys
8th International Symposium on Foundations and Practice of Security 8th International Symposium, FPS 2015, Oct 2015, Clermont-Ferrand, France. pp.137-155, ⟨10.1007/978-3-319-30303-1_9⟩
Communication dans un congrès hal-01306395v1
Image document

High-Level Simulation for Multiple Fault Injection Evaluation

Maxime Puys , Lionel Rivière , Julien Bringer , Thanh-Ha Le
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, Sep 2014, Wroclaw, Poland. ⟨10.1007/978-3-319-17016-9_19⟩
Communication dans un congrès hal-01229279v1
Image document

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks

Lionel Rivière , Marie-Laure Potet , Thanh-Ha Le , Julien Bringer , Hervé Chabanne
Foundations and Practice of Security, Nov 2014, Montreal, Canada. ⟨10.1007/978-3-319-17040-4_7⟩
Communication dans un congrès hal-01229261v1
Image document

Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections

Marie-Laure Potet , Laurent Mounier , Maxime Puys , Louis Dureuil
Seventh IEEE International Conference on Software Testing, Verification and Validation, Mar 2014, Cleveland, United States. ⟨10.1109/ICST.2014.34⟩
Communication dans un congrès hal-01229274v1
Image document

Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques

Maxime Puys
Cryptographie et sécurité [cs.CR]. Communauté Université Grenoble-Alpes, 2018. Français. ⟨NNT : ⟩
Thèse tel-01827270v1
Image document

Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques

Maxime Puys
Cryptographie et sécurité [cs.CR]. Université Grenoble Alpes, 2018. Français. ⟨NNT : 2018GREAM009⟩
Thèse tel-01893142v1