Skip to Main content Skip to Navigation

hal-01330949v1  Conference papers
Maxime PuysMarie-Laure PotetJean-Louis Roch. Génération systématique de scénarios d'attaques contre des systèmes industriels
15èmes journées Approches Formelles dans l'Assistance au Développement de Logiciels, Jun 2016, Besançon, France
hal-01674731v1  Conference papers
Lijun ShanSusanne GrafSophie QuintonLoïc Fejoz. A Framework for Evaluating Schedulability Analysis Tools
Models, Algorithms, Logics and Tools - Essays Dedicated to Kim Guldstrand Larsen on the Occasion of His 60th Birthday, Aug 2017, Aalborg, Denmark
hal-01636392v1  Journal articles
Simon BliudzeSébastien FuricJoseph SifakisAntoine Viel. Rigorous Design of Cyber-Physical Systems
Software and Systems Modeling, Springer Verlag, In press, Software and System Modeling, 18 (3), pp.1613--1636. ⟨10.1007/s10270-017-0642-5⟩
hal-01890246v1  Conference papers
Hubert GaravelFrederic LangLaurent Mounier. Compositional Verification in Action
FMICS 2018 - 23rd International Conference on Formal Methods for Industrial Critical Systems, Sep 2018, Maynooth, Ireland. pp.189-210, ⟨10.1007/978-3-030-00244-2_13⟩
hal-01393888v1  Reports
Lijun ShanSusanne GrafSophie Quinton. RTLib: A Library of Timed Automata for Modeling Real-Time Systems
[Research Report] Grenoble 1 UGA - Université Grenoble Alpe; INRIA Grenoble - Rhone-Alpes. 2016
hal-01898048v1  Conference papers
Xavier BultelJannik DreierJean-Guillaume DumasPascal LafourcadeDaiki Miyahara et al.  Physical Zero-Knowledge Proof for Makaro
SSS 2018 - 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Nov 2018, Tokyo, Japan. pp.111-125, ⟨10.1007/978-3-030-03232-6_8⟩
hal-01344750v2  Conference papers
Jean-Guillaume DumasPascal LafourcadeJean-Baptiste OrfilaMaxime Puys. Private Multi-party Matrix Multiplication and Trust Computations
13th International Conference on Security and Cryptography SECRYPT 16, Jul 2016, Lisbon, Portugal. pp.61-72, ⟨10.5220/0005957200610072⟩
hal-01653884v1  Journal articles
Ali KassemYliès FalconePascal Lafourcade. Formal analysis and offline monitoring of electronic exams
Formal Methods in System Design, Springer Verlag, 2017, 51 (1), pp.117 - 153. ⟨10.1007/s10703-017-0280-0⟩
hal-02410129v1  Book sections
Kevin MarquetJacques CombazFrancoise Berthoud. Introduction aux impacts environnementaux du numérique
1024, bulletin de la Société Informatique de France, pp.85-97, 2019
hal-01898426v1  Journal articles
Ayoub NouriBraham MediouniMarius BozgaJacques CombazSaddek Bensalem et al.  Performance Evaluation of Stochastic Real-Time Systems with the SBIP Framework
International Journal of Critical Computer-Based Systems, Inderscience, In press, pp.1-33
hal-01285579v1  Conference papers
Hosein NazarpourYlìès FalconeSaddek BensalemMarius BozgaJacques Combaz. Monitoring Multi-Threaded Component-Based Systems
12th International Conference on integrated Formal Methods, Jun 2016, Reykjavik, Finland
hal-02348828v1  Conference papers
Simon IostiDenis Kuperberg. Eventually Safe Languages
Developments in Language Theory, Aug 2019, Varsovie, Poland. pp.192-205, ⟨10.1007/978-3-030-24886-4_14⟩
hal-01896590v2  Conference papers
Braham MediouniAyoub NouriMarius BozgaAxel LegaySaddek Bensalem. Mitigating Security Risks through Attack Strategies Exploration
ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Nov 2018, Limassol, Cyprus. pp.392-413, ⟨10.1007/978-3-030-03421-4_25⟩
hal-01399967v1  Conference papers
Levent DemirMathieu ThieryVincent RocaJean-Louis RochJean-Michel Tenkes. Improving dm-crypt performance for XTS-AES mode through extended requests: first results
GreHack 2016. The 4th International Symposium on Research in Grey-Hat Hacking - aka GreHack , Nov 2016, Grenoble, France
hal-01406591v1  Conference papers
Ayoub NouriMarius BozgaAxel LegaySaddek Bensalem. Performance Evaluation of Complex Systems Using the SBIP Framework
he International Conference on Verification and Evaluation of Computer and Communication Systems (VECoS), Oct 2016, Tunis, Tunisia
hal-01882412v1  Conference papers
Yliès FalconeHosein NazarpourMohamad JaberMarius BozgaSaddek Bensalem. Tracing Distributed Component-Based Systems, a Brief Overview
Proceedings of the 18th International Conference on Runtime Verification, Nov 2018, Limassol, Cyprus
hal-01888538v1  Conference papers
Braham MediouniAyoub NouriMarius BozgaMahieddine DellabaniAxel Legay et al.  SBIP 2.0: Statistical Model Checking Stochastic Real-time Systems
ATVA 2018 - 16th International Symposium Automated Technology for Verification and Analysis, Oct 2018, Los Angeles, CA, United States. pp.536-542, ⟨10.1007/978-3-030-01090-4_33⟩
hal-01964222v1  Conference papers
Fabrizio BiondiThomas Given-WilsonAxel LegayCassius PuodziusJean Quilbeuf. Tutorial: an Overview of Malware Detection and Evasion Techniques
ISoLA 2018 - 8th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation, Oct 2018, Limassol, Cyprus. pp.1-23
hal-01962080v1  Book sections
Delphine BeaulatonIoana CristescuAxel LegayJean Quilbeuf. A Modeling Language for Security Threats of IoT Systems
Formal Methods for Industrial Critical Systems - 23rd International Conference, FMICS 2018, 11119, Springer, pp.258-268, 2018, LNCS, 978-3-030-00243-5. ⟨10.1007/978-3-030-00244-2_17⟩
hal-01206882v3  Conference papers
David MonniauxLaure Gonnord. Cell morphing: from array programs to array-free Horn clauses
23rd Static Analysis Symposium (SAS 2016), Sep 2016, Edimbourg, United Kingdom