Jean-Louis Lanet

According to our database1, Jean-Louis Lanet authored at least 84 papers between 1996 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM.
Int. J. Inf. Sec., 2019

Formal methods in dynamic software updating: a survey.
IJCCBS, 2019

2018
Machine learning techniques to predict sensitive patterns to fault attack in the Java Card application.
J. Exp. Theor. Artif. Intell., 2018

When time meets test.
Int. J. Inf. Sec., 2018

A Novel Approach for an Interoperable Biometric Verification.
iJIM, 2018

Normalization of Java Source Codes.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Theoretical Security Evaluation of the Human Semantic Authentication Protocol.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems.
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, 2018

Protection of Systems Against Fuzzing Attacks.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

When Fault Injection Collides with Hardware Complexity.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Ransomware's Early Mitigation Mechanisms.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Let's shock our IoT's heart: ARMv7-M under (fault) attacks.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Chronicle of a Java Card death.
J. Computer Virology and Hacking Techniques, 2017

Trust can be misplaced.
J. Cryptographic Engineering, 2017

A formal verification of dynamic updating in a Java-based embedded system.
IJCCBS, 2017

Runtime Code Polymorphism as a Protection Against Side Channel Attacks.
IACR Cryptology ePrint Archive, 2017

Reverse engineering a Java Card memory management algorithm.
Computers & Security, 2017

How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip.
Proceedings of the Information Security Theory and Practice, 2017

An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Detection of Side Channel Attacks Based on Data Tainting in Android Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure.
Proceedings of the Secure IT Systems, 2017

Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017

2016
Vulnerability Prediction Against Fault Attacks.
ERCIM News, 2016

Runtime Code Polymorphism as a Protection Against Side Channel Attacks.
Proceedings of the Information Security Theory and Practice, 2016

A Template Attack Against VERIFY PIN Algorithms.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Paper Tigers: An Endless Fight.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016

Tracking Explicit and Control Flows in Java and Native Android Apps Code.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Ransomware and the Legacy Crypto API.
Proceedings of the Risks and Security of Internet and Systems, 2016

A Formal Verification of Safe Update Point Detection in Dynamic Software Updating.
Proceedings of the Risks and Security of Internet and Systems, 2016

The Hell Forgery - Self Modifying Codes Shoot Again.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
The ultimate control flow transfer in a Java based smart card.
Computers & Security, 2015

An Approach for Formal Verification of Updated Java Bytecode Programs.
Proceedings of the 9th Workshop on Verification and Evaluation of Computer and Communication Systems, 2015

Model-Based Robustness Testing in Event-B Using Mutation.
Proceedings of the Software Engineering and Formal Methods - 13th International Conference, 2015

Beyond Cryptanalysis Is Software Security the Next Threat for Smart Cards.
Proceedings of the Codes, Cryptology, and Information Security, 2015

Countermeasures Mitigation for Designing Rich Shell Code in Java Card.
Proceedings of the Codes, Cryptology, and Information Security, 2015

Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2014
Reversing the operating system of a Java based smart card.
J. Computer Virology and Hacking Techniques, 2014

Security automaton to mitigate laser-based fault attacks on smart cards.
IJTMCC, 2014

COGITO: Code Polymorphism to Secure Devices.
Proceedings of the SECRYPT 2014, 2014

Generating control flow graph from Java card byte code.
Proceedings of the Third IEEE International Colloquium in Information Science and Technology, 2014

Memory Forensics of a Java Card Dump.
Proceedings of the Smart Card Research and Advanced Applications, 2014

Heap ... Hop! Heap Is Also Vulnerable.
Proceedings of the Smart Card Research and Advanced Applications, 2014

2013
Risks induced by Web applications on smart cards.
J. Inf. Sec. Appl., 2013

Virus in a smart card: Myth or reality?
J. Inf. Sec. Appl., 2013

Mitigating Type Confusion on Java Card.
IJSSE, 2013

Detecting Laser Fault Injection for Smart Cards Using Security Automata.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Vulnerability Analysis on Smart Cards Using Fault Tree.
Proceedings of the Computer Safety, Reliability, and Security, 2013

Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

Foreword.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Accessing secure information using export file fraudulence.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
Towards a General Framework for Formal Reasoning about Java Bytecode Transformation.
Proceedings of the Proceedings Fourth International Symposium on Symbolic Computation in Software Science, 2012

A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Attacks against smart cards: Hands on session.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

The Next Smart Card Nightmare - Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Type Classification against Fault Enabled Mutant in Java Based Smart Card.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Bytecode Verification.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SmartCM a smart card fault injection simulator.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Hot updates for Java based smart cards.
Proceedings of the Workshops Proceedings of the 27th International Conference on Data Engineering, 2011

A Security Mechanism to Increase Confidence in M-Transactions.
Proceedings of the CRiSIS 2011, 2011

Evaluation of the Ability to Transform SIM Applications into Hostile Applications.
Proceedings of the Smart Card Research and Advanced Applications, 2011

Combined Software and Hardware Attacks on the Java Card Control Flow.
Proceedings of the Smart Card Research and Advanced Applications, 2011

Enhancing Fuzzing Technique for OKL4 Syscalls Testing.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Developing a Trojan applets in a smart card.
Journal in Computer Virology, 2010

Reusing a JML Specification Dedicated to Verification for Testing, and Vice-Versa: Case Studies.
J. Autom. Reasoning, 2010

Checking the Paths to Identify Mutant Application on Embedded Systems.
Proceedings of the Future Generation Information Technology, 2010

A new payment protocol over the Internet.
Proceedings of the CRiSIS 2010, 2010

2009
Automatic detection of fault attack and countermeasures.
Proceedings of the 4th Workshop on Embedded Systems Security, 2009

2006
JACK - A Tool for Validation of Security and Behaviour of Java Applications.
Proceedings of the Formal Methods for Components and Objects, 5th International Symposium, 2006

2004
Case Study in JML-Based Software Validation.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

Enforcing High-Level Security Properties for Applets.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2003
Java Applet Correctness: A Developer-Oriented Approach.
Proceedings of the FME 2003: Formal Methods, 2003

2002
Checking Secure Interactions of Smart Card Applets: Extended Version.
Journal of Computer Security, 2002

Increasing smart card dependability.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

2000
Electronic Purse Applet Certification: extended abstract.
Electr. Notes Theor. Comput. Sci., 2000

Are Smart Cards the Ideal Domain for Applying Formal Methods?
Proceedings of the ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, York, UK, August 29, 2000

The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow.
Proceedings of the Java on Smart Cards: Programming and Security, 2000

Checking Secure Interactions of Smart Card Applets.
Proceedings of the Computer Security, 2000

1999
New security issues raised by open cards.
Inf. Sec. Techn. Report, 1999

FACADE: A Typed Intermediate Language Dedicated to Smart Cards.
Proceedings of the Software Engineering, 1999

How to Formally Specify the Java Bytecode Semantivs Using the B Method.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

1998
Formal Proof of Smart Card Applets Correctness.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1996
A Load Balancing Task Allocation Scheme in a Hard Real Time System.
Proceedings of the Euro-Par '96 Parallel Processing, 1996


  Loading...