Guillaume Hiet

Orcid: 0000-0002-7176-9760

According to our database1, Guillaume Hiet authored at least 26 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

A Generic Framework to Develop and Verify Security Mechanisms at the Microarchitectural Level: Application to Control-Flow Integrity.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
Cross-domain alert correlation methodology for industrial control systems.
Comput. Secur., 2022

RT-DFI: Optimizing Data-Flow Integrity for Real-Time Systems.
Proceedings of the 34th Euromicro Conference on Real-Time Systems, 2022

2021
Modular verification of programs with effects and effects handlers.
Formal Aspects Comput., 2021

DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Security at the Hardware/Software Interface.
, 2021

2020
Preface of the 2<sup>nd</sup> Workshop on the Security of Software/Hardware Interfaces (SILM 2020).
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Teaching Android Mobile Security.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
A small and adaptive coprocessor for information flow tracking in ARM SoCs.
Proceedings of the 2018 International Conference on ReConFigurable Computing and FPGAs, 2018

Modular Verification of Programs with Effects and Effect Handlers in Coq.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
ARMHEx: A framework for efficient DIFT in real-world SoCs.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

ARMHEx: A hardware extension for DIFT on ARM-based SoCs.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Preventive information flow control through a mechanism of split addresses.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Detecting Process-Aware Attacks in Sequential Control Systems.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

A Self-correcting Information Flow Control Model for the Web-Browser.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Towards a hardware-assisted information flow tracking ecosystem for ARM processors.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016

SpecCert: Specifying and Verifying Hardware-Based Security Enforcement.
Proceedings of the FM 2016: Formal Methods, 2016

2014
Towards automated protocol reverse engineering using semantic information.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2012
Spécification et mécanisme de détection de flots d'information illégaux.
Tech. Sci. Informatiques, 2012

2011
From SSIR to CIDre: A New Security Research Group in Rennes, France.
Proceedings of the First SysSec Workshop 2011, 2011

2009
Policy-based intrusion detection in web applications by monitoring Java information flows.
Int. J. Inf. Comput. Secur., 2009

2008
Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications : mise en œuvre sous Linux pour les programmes Java.
PhD thesis, 2008


  Loading...