Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-domain alert correlation methodology for industrial control systems., , , , and . Comput. Secur., (2022)DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification., , , and . EuroS&P Workshops, page 86-95. IEEE, (2021)Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020)., , and . EuroS&P Workshops, page 681. IEEE, (2020)Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode., , , and . ACSAC, page 399-411. ACM, (2017)Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications : mise en œuvre sous Linux pour les programmes Java.. University of Rennes 1, France, (2008)A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components., , , , , , and . AsianHOST, page 92-97. IEEE, (2018)Preventive information flow control through a mechanism of split addresses., , and . SIN, page 1-8. ACM, (2016)Modular verification of programs with effects and effects handlers., , , and . Formal Aspects Comput., 33 (1): 127-150 (2021)Policy-based intrusion detection in web applications by monitoring Java information flows., , , and . Int. J. Inf. Comput. Secur., 3 (3/4): 265-279 (2009)Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections., , , , , , , and . EuroS&P Workshops, page 304-310. IEEE, (2023)