Hassen Saïdi

According to our database1, Hassen Saïdi authored at least 31 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
math-PVS: A Large Language Model Framework to Map Scientific Publications to PVS Theories.
CoRR, 2023

2020
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version.
CoRR, 2020

Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables.
Proceedings of the Applied Cryptography and Network Security, 2020

2018
Wholly!: A Build System For The Modern Software Stack.
Proceedings of the Formal Methods for Industrial Critical Systems, 2018

2012
Aurasium: Practical Policy Enforcement for Android Applications.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

2011
Security implications of Android: a closed system, open software mobile platform.
Proceedings of the SPSM'11, 2011

2010
Homogeneity as an Advantage: It Takes a Community to Protect an Application.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

An Analysis of the iKee.B iPhone Botnet.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

2009
A Foray into Conficker's Logic and Rendezvous Points.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

2008
Eureka: A Framework for Enabling Static Malware Analysis.
Proceedings of the Computer Security, 2008

2007
Guarded models for intrusion detection.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

2006
Discovering Symmetries.
Proceedings of the Formal Methods: Applications and Technology, 2006

2004
Using Model Checking to Assess the Dependability of Agent-Based Systems.
IEEE Intell. Syst., 2004

2003
Protocol Codesign.
Proceedings of the Security Protocols, 2003

Dependable Intrusion Tolerance: Technology Demo.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Self-regenerative software components.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

2002
Combining Monitors for Runtime System Verification.
Proceedings of the Runtime Verification 2002, 2002

An Architecture for an Adaptive Intrusion-Tolerant Server.
Proceedings of the Security Protocols, 2002

2001
A Technique for Invariant Generation.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2001

Intrusion-Tolerant Group Management in Enclaves.
Proceedings of the Security Protocols, 2001

Intrusion-Tolerant Group Management in Enclaves.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Model Checking Guided Abstraction and Analysis.
Proceedings of the Static Analysis, 7th International Symposium, 2000

1999
Modular and Incremental Analysis of Concurrent Software Systems.
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999

Abstract and Model Check While You Prove.
Proceedings of the Computer Aided Verification, 11th International Conference, 1999

1997
Abstraction of parameterized networks.
Proceedings of the Second International Workshop on Verification of Infinite State Systems, 1997

The Invariant Checker: Automated Deductive Verification of Reactive Systems.
Proceedings of the Computer Aided Verification, 9th International Conference, 1997

Construction of Abstract State Graphs with PVS.
Proceedings of the Computer Aided Verification, 9th International Conference, 1997

1996
A Tool for Proving Invariance Properties of Concurrent Systems Automatically.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1996

Verifying Invariants Using theorem Proving.
Proceedings of the Computer Aided Verification, 8th International Conference, 1996

Powerful Techniques for the Automatic Generation of Invariants.
Proceedings of the Computer Aided Verification, 8th International Conference, 1996


  Loading...