Gilles Grimaud

Affiliations:
  • LIFL Lille, France


According to our database1, Gilles Grimaud authored at least 53 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
From MMU to MPU: adaptation of the Pip kernel to constrained devices.
CoRR, 2023

ZBDS2023: A multi location Zigbee dataset to build innovative IoT Intrusion Detection Systems.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

2022
One Year of DDoS Attacks Against a Cloud Provider: an Overview.
CoRR, 2022

A Formal Correctness Proof for an EDF Scheduler Implementation.
Proceedings of the 28th IEEE Real-Time and Embedded Technology and Applications Symposium, 2022

2021
Nested compartmentalisation for constrained devices.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

Forensic analysis of IoT ecosystem.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

2020
Proving partial-correctness and invariance properties of transition-system models.
Sci. Comput. Program., 2020

Evidence Gathering in IoT Criminal Investigation.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

Bluetooth devices fingerprinting using low cost SDR.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020

Discovering Connected Objects in the Criminal Investigations.
Proceedings of the 2020 International Conference on Omni-layer Intelligent Systems, 2020

2019
Digital Investigation of IoT Devices in the Criminal Scene.
J. Univers. Comput. Sci., 2019

2018
Formal proof of dynamic memory isolation based on MMU.
Sci. Comput. Program., 2018

Proof-Oriented Design of a Separation Kernel with Minimal Trusted Computing Base.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2018

Ensuring IoT Security with an Architecture Based on a Separation Kernel.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

Challenges for the design of a privacy-preserving, multi-domain telemetry system for widely-spread network security appliances.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018

A low-cost energy consumption measurement platform.
Proceedings of the Workshop on INTelligent Embedded Systems Architectures and Applications, 2018

Porting the Pip Proto-Kernel's Model to Multi-core Environments.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

IoT Forensic: identification and classification of evidence in criminal investigations.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
EE-CFI: Externalized Control Flow Integrity for Embedded Devices.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Automatic Inference of Energy Models for Peripheral Components in Embedded Systems.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017

2016
Toward Energy Profiling of Connected Embedded Systems.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

2015
Virtual Keyboard Logging Counter-Measures Using Human Vision Properties.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Energy Consumption of Networked Embedded Systems.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

2012
Large-Scale Coordinated attacks: Impact on the Cloud Security.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2010
Efficient off-board deployment and customization of virtual machine-based embedded systems.
ACM Trans. Embed. Comput. Syst., 2010

Efficient Web Requests Scheduling Considering Resources Sharing.
Proceedings of the MASCOTS 2010, 2010

Impact of Pages Sizes to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale.
Proceedings of the CISIS 2010, 2010

Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
Consistency and scalability in event notification for embedded Web applications.
Proceedings of the 11th IEEE International Symposium on Web Systems Evolution, 2009

The Web of Things: Interconnecting Devices with High Usability and Performance.
Proceedings of the International Conference on Embedded Software and Systems, 2009

Serving embedded content via web applications: model, design and experimentation.
Proceedings of the 9th ACM & IEEE International conference on Embedded software, 2009

Smews: Smart and Mobile Embedded Web Server.
Proceedings of the 2009 International Conference on Complex, 2009

Object Memory Management for Constrained Devices with Heterogeneous Memories.
Proceedings of the Intelligent Technical Systems, 2009

2007
On the use of metatypes for safe embedded operating system extension.
Int. J. Parallel Emergent Distributed Syst., 2007

An Information Flow Verifier for Small Embedded Systems.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

An object memory management solution for small devices with heterogeneous memories.
Proceedings of the Fifth Workshop on Intelligent Solutions in Embedded Systems, 2007

Bringing Worst Case Execution Time Awareness to an Open Smart Card OS.
Proceedings of the 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 2007

A DSL approach for object memory management of small devices.
Proceedings of the 5th International Symposium on Principles and Practice of Programming in Java, 2007

A Verifiable Lightweight Escape Analysis Supporting Creational Design Patterns.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Embedding verifiable information flow analysis.
Proceedings of the 2006 International Conference on Privacy, 2006

Integrated Security Verification and Validation: Case Study.
Proceedings of the LCN 2006, 2006

A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods.
Proceedings of the Smart Card Research and Advanced Applications, 2006

Efficient Packet Scheduler For Wireless Ad Hoc Networks With Switched Beam Antennas.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Secure extensible type system for efficient embedded operating system by using metatypes.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Ahead of Time Deployment in ROM of a Java-OS.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005

Application-Driven Customization of an Embedded Java Virtual Machine.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Romization: Early Deployment and Customization of Java Systems for Constrained Devices.
Proceedings of the Construction and Analysis of Safe, 2005

2004
A low-footprint class loading mechanism for embedded Java virtual machines.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004

2002
Code mobile et carte à puce.
Tech. Sci. Informatiques, 2002

Building an "Impossible" Verifier on a Java Card.
Proceedings of the Second Workshop on Industrial Experiences with Systems Software, 2002

2000
Application of the B formal method to the proof of a type verification algorithm.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000

1999
FACADE: A Typed Intermediate Language Dedicated to Smart Cards.
Proceedings of the Software Engineering, 1999

1998
Recoverable Persistent Memory for SmartCard.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998


  Loading...