Marie-Laure Potet

Orcid: 0000-0002-7070-6290

According to our database1, Marie-Laure Potet authored at least 61 papers between 1984 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers.
J. Cryptogr. Eng., June, 2023

Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities.
CoRR, 2023

A tool assisted methodology to harden programs against multi-faults injections.
CoRR, 2023

A Compositional Methodology to Harden Programs Against Multi-Fault Attacks.
Proceedings of the Workshop on Fault Detection and Tolerance in Cryptography, 2023

Adversarial Reachability for Program-level Security Analysis.
Proceedings of the Programming Languages and Systems, 2023

2022
BaxMC: a CEGAR approach to Max#SAT.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, 2022

2021
Output-sensitive Information flow analysis.
Log. Methods Comput. Sci., 2021

RUSTInA: Automatically Checking and Patching Inline Assembly Interface Compliance (Artifact Evaluation): Accepted submission #992 - "Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine".
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Fast Calibration of Fault Injection Equipment with Hyperparameter Optimization Techniques.
Proceedings of the Smart Card Research and Advanced Applications, 2021

2020
An End-to-End Approach for Multi-Fault Attack Vulnerability Assessment.
Proceedings of the 17th Workshop on Fault Detection and Tolerance in Cryptography, 2020

Countermeasures Optimization in Multiple Fault-Injection Context.
Proceedings of the 17th Workshop on Fault Detection and Tolerance in Cryptography, 2020

2019
Get rid of inline assembly through trustable verification-oriented lifting.
CoRR, 2019

Formally and practically verifying flow properties in industrial systems.
Comput. Secur., 2019

Get Rid of Inline Assembly through Verification-Oriented Lifting.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

A Review of Intrusion Detection Systems for Industrial Control Systems.
Proceedings of the 6th International Conference on Control, 2019

2018
Symbolic Deobfuscation: From Virtualized Code Back to the Original.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Model Generation for Quantified Formulas: A Taint-Based Approach.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

2017
Formally Verifying Flow Properties in Industrial Systems.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Generation of Applicative Attacks Scenarios Against Industrial Systems.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information.
Proceedings of the Software Engineering and Formal Methods - 14th International Conference, 2016

Formal Analysis of Security Properties on the OPC-UA SCADA Protocol.
Proceedings of the Computer Safety, Reliability, and Security, 2016

FISSC: A Fault Injection and Simulation Secure Collection.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Specification of concretization and symbolization policies in symbolic execution.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Domain Specific Stateful Filtering with Worst-Case Bandwidth.
Proceedings of the Critical Information Infrastructures Security, 2016

Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Statically detecting use after free on binary code.
J. Comput. Virol. Hacking Tech., 2014

Apport des méthodes formelles pour l'exploitation de logs informatiques dans un contexte contractuel.
Tech. Sci. Informatiques, 2014

Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Combining Static and Dynamic Analysis for Vulnerability Detection
CoRR, 2013

A Stack Model for Symbolic Buffer Overflow Exploitability Analysis.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

2011
Preface.
Proceedings of the B 2011 Workshop, 2011

Liability issues in software engineering: the use of formal methods to reduce legal uncertainties.
Commun. ACM, 2011

2010
GénéSyst : Génération d'un système de transitions étiquetées à partir d'une spécification B événementiel
CoRR, 2010

Designing Log Architectures for Legal Evidence.
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010

A Formal Framework for Specifying and Analyzing Logs as Electronic Evidence.
Proceedings of the Formal Methods: Foundations and Applications, 2010

Taint Dependency Sequences: A Characterization of Insecure Execution Paths Based on Input-Sensitive Cause Sequences.
Proceedings of the Third International Conference on Software Testing, 2010

Liability in software engineering: overview of the LISE approach and illustration on a case study.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

2009
Relaxing Restrictions on Invariant Composition in the B Method by Ownership Control <i>a la</i>Spec#.
Proceedings of the Rigorous Methods for Software Construction and Analysis, 2009

2008
A B Formal Framework for Security Developments in the Domain of Smart Card Applications.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Verifiable Conformance Relationship between Smart Card Applets and B Security Models.
Proceedings of the Abstract State Machines, B and Z, First International Conference, 2008

2007
Security Policy Enforcement Through Refinement Process.
Proceedings of the B 2007: Formal Specification and Development in B, 2007

Interpreting Invariant Composition in the B Method Using the Spec# Ownership Relation: A Way to Explain and Relax B Restrictions.
Proceedings of the B 2007: Formal Specification and Development in B, 2007

2005
GeneSyst: A Tool to Reason About Behavioral Aspects of B Event Specifications. Application to Security Properties.
Proceedings of the ZB 2005: Formal Specification and Development in Z and B, 2005

2004
Stratégie de couverture de test à un haut niveau d'abstraction.
Tech. Sci. Informatiques, 2004

Adaptabilité et validation de la traduction de B vers C. Points de vue et résultats du projet BOM.
Tech. Sci. Informatiques, 2004

2003
Spécifications et développements structurés dans la méthode B.
Tech. Sci. Informatiques, 2003

Adaptable Translator of B Specifications to Embedded C Programs.
Proceedings of the FME 2003: Formal Methods, 2003

2002
Spécifications et développements formels : Etude des aspects compositionnels dans la méthode B. (Formal specifications and developments: a study of compositional aspects in the B-method).
, 2002

2001
Test Purposes: Adapting the Notion of Specification to Testing.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001

2000
Automatic Construction of Validated B Components from Structured Developments.
Proceedings of the ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, York, UK, August 29, 2000

1998
Composition and Refinement in the B-Method.
Proceedings of the B'98: Recent Advances in the Development and Use of the B Method, 1998

1995
A VDM Specification of the Steam-Boiler Problem.
Proceedings of the Formal Methods for Industrial Applications, 1995

1991
Equational Reasonning and the Completion Procedure. A Comparative Study in Program Transformation.
Proceedings of the Actes JTASPEFL'91 (Bordeaux, 1991

1988
Preuves et stratégies pour la synthèse déductive de programmes. (Proofs and strategies for deductive program synthesis).
PhD thesis, 1988

1986
Program Synthesis = Proof Method + Knowledge (Example about Recursive Function Synthesis).
Proceedings of the Advances in Artificial Intelligence II, 1986

1984
Program Synthesis Through Problem Splitting: A Method for Subproblem Characterization.
Proceedings of the Artificial Intelligence: Methodology, Systems, Applications, 1984


  Loading...