Olivier Gilles

Orcid: 0000-0002-3776-2071

According to our database1, Olivier Gilles authored at least 13 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Call Rewinding: Efficient Backward Edge Protection.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

Aspycot: A Spike and Python Co-simulation Testbench for Hardware Monitoring IPs.
Proceedings of the Rapid Simulation and Performance Evaluation for Design Workshop, 2025

2023
Securing IIoT communications using OPC UA PubSub and Trusted Platform Modules.
J. Syst. Archit., 2023

Execution at RISC: Stealth JOP Attacks on RISC-V Applications.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Securing a RISC-V architecture: A dynamic approach.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Securing Communication in the Field: Protecting Geo-distributed Computing in an Untrusted Environment.
Proceedings of the 30th Computer & Electronics Security Application Rendezvous Conference (C&ESAR 2023) co-located with the 8th European Cyber Week (ECW 2023), 2023

2022
Control-Flow Integrity at RISC: Attacking RISC-V by Jump-Oriented Programming.
CoRR, 2022

2011
A MDE-based optimisation process for real-time systems: optimizing systems at the architecture-level using the real DSL and library of transformation and heuristics.
Comput. Syst. Sci. Eng., 2011

2010
Vers une prise en compte fine de la plate-forme cible dans la construction des systèmes temps réel embarqués critiques par ingénierie des modèles. (Using model-driven architecture to perform a fine-grained accounting for target framework in real time embedded critical systems design).
PhD thesis, 2010

A MDE-Based Optimisation Process for Real-Time Systems.
Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2010

Expressing and Enforcing User-Defined Constraints of AADL Models.
Proceedings of the 15th IEEE International Conference on Engineering of Complex Computer Systems, 2010

2009
Towards Model-Based Optimisations of Real-Time Systems, an Application with the AADL.
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009

2008
Applying WCET Analysis at Architectural Level.
Proceedings of the 8th Intl. Workshop on Worst-Case Execution Time (WCET) Analysis, 2008


  Loading...