-
Notifications
You must be signed in to change notification settings - Fork 0
/
publications.html
919 lines (801 loc) · 102 KB
/
publications.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8" />
<meta http-equiv="X-UA-Compatible" content="IE=edge" />
<meta name="HandheldFriendly" content="True" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<meta name="robots" content="index, follow" />
<link href="https://fonts.googleapis.com/css2?family=Source+Code+Pro:ital,wght@0,400;0,700;1,400&family=Source+Sans+Pro:ital,wght@0,300;0,400;0,700;1,400&display=swap" rel="stylesheet">
<link rel="stylesheet/less" type="text/css" href="https://maxime.puys.name/theme/stylesheet/style.less">
<script src="//cdnjs.cloudflare.com/ajax/libs/less.js/2.5.1/less.min.js" type="text/javascript"></script>
<link id="dark-theme-style" rel="stylesheet" type="text/css"
media="(prefers-color-scheme: dark)"
href="https://maxime.puys.name/theme/stylesheet/dark-theme.min.css">
<link id="pygments-dark-theme" rel="stylesheet" type="text/css"
media="(prefers-color-scheme: dark)"
href="https://maxime.puys.name/theme/pygments/monokai.min.css">
<link id="pygments-light-theme" rel="stylesheet" type="text/css"
media="(prefers-color-scheme: light), (prefers-color-scheme: no-preference)"
href="https://maxime.puys.name/theme/pygments/monokai.min.css">
<link rel="stylesheet" type="text/css" href="https://maxime.puys.name/css/all.css">
<!--
<link rel="stylesheet" type="text/css" href="https://maxime.puys.name/theme/font-awesome/css/fontawesome.css">
<link rel="stylesheet" type="text/css" href="https://maxime.puys.name/theme/font-awesome/css/brands.css">
<link rel="stylesheet" type="text/css" href="https://maxime.puys.name/theme/font-awesome/css/solid.css">
-->
<link rel="stylesheet" type="text/css" href="https://maxime.puys.name/css/custom.css">
<link rel="shortcut icon" href="/images/favicon.ico" type="image/x-icon">
<link rel="icon" href="/images/favicon.ico" type="image/x-icon">
<!-- Chrome, Firefox OS and Opera -->
<meta name="theme-color" content="#333333">
<!-- Windows Phone -->
<meta name="msapplication-navbutton-color" content="#333333">
<!-- iOS Safari -->
<meta name="apple-mobile-web-app-capable" content="yes">
<meta name="apple-mobile-web-app-status-bar-style" content="black-translucent">
<!-- Microsoft EDGE -->
<meta name="msapplication-TileColor" content="#333333">
<meta name="author" content="Maxime Puys" />
<meta name="description" content="Ph.D. Thesis [1] M. Puys. Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques. PhD thesis, Communauté Université Grenoble-Alpes, Feb. 2018. [bib] [pdf] [slides] @phdthesis{phdThesisMaximePuys, author = {Maxime Puys}, title = {S{\'e}curit{\'e} des syst{\`e}mes industriels : filtrage applicatif et recherche de sc{\'e}narios d'attaques}, school = {Communaut{\'e} Universit{\'e} Grenoble{-}Alpes}, year = {2018}, month = {Feb.}, url = {https://maxime.puys.name/publications/pdf/phdThesisMaximePuys.pdf} } International Peer-Reviewed Journals [5] P.-H. Thevenon, S. Riou, D.-M. Tran, M. Puys, N. F. Polychronou, M. El Majihi, and C. Sivelle. iMRC: integrated monitoring & recovery component, a solution to guarantee the security of embedded systems. Journal of Internet Services and Information Security (JISIS) (Rank Scimago Q3), 13(1):4--32, 2022. [bib] [pdf] @article{TRDPPES22, author = {Thevenon, Pierre-Henri and Riou, Sebastien and Tran, Duc-Minh and Puys, Maxime and Polychronou, Nikolaos Foivos and El Majihi, Mustapha and Sivelle, Camille}, title = {{iMRC:} Integrated Monitoring \& Recovery Component, a Solution to Guarantee the Security of Embedded Systems}, journal = {Journal of Internet Services and Information Security (JISIS) (Rank Scimago Q3)}, volume = {13}, number = {1}, pages = {4--32}, year = {2022}, url = {https://maxime.puys.name/publications/pdf/TRDPPES22.pdf} } [4] M. Puys, P.-H. Thevenon, S. M. Mocanu, M. Gallissot, and C. Sivelle. SCADA cybersecurity awareness and teaching with hardware-in-the-loop platforms. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) (Rank Scimago Q2), 13(1):4--32, 2022. [bib] [pdf] @article{PTMGS22, author = {Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane Mocanu and Gallissot, Mathieu and Sivelle, Camille}, title = {{SCADA} Cybersecurity Awareness and Teaching with Hardware-In-The-Loop Platforms}, journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) (Rank Scimago Q2)}, volume = {13}, number = {1}, pages = {4--32}, year = {2022}, url = {https://maxime.puys.name/publications/pdf/PTMGS22.pdf} } [3] N.-F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IoT/IIoT devices, and their detection mechanisms. ACM Transactions on Design Automation of Electronic Systems (Rank Sciamago Q2), 27(1):1--35, 2021. [bib] [pdf] @article{PTPB21a, author = {Polychronou, Nikolaos-Foivos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, title = {A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in {IoT/IIoT} Devices, and Their Detection Mechanisms}, journal = {ACM Transactions on Design Automation of Electronic Systems (Rank Sciamago Q2)}, volume = {27}, number = {1}, pages = {1--35}, year = {2021}, url = {https://maxime.puys.name/publications/pdf/PTPB21a.pdf} } [2] J. Dreier, M. Puys, M.-L. Potet, P. Lafourcade, and J.-L. Roch. Formally and practically verifying flow properties in industrial systems. Computers & Security, Elsevier (Rank Sciamago Q1), 86(1):453--470, 2019. [bib] [pdf] @article{DPPLR19, author = {Dreier, Jannik and Puys, Maxime and Potet, Marie-Laure and Lafourcade, Pascal and Roch, Jean-Louis}, title = {Formally and practically verifying flow properties in industrial systems}, journal = {Computers \& Security, Elsevier (Rank Sciamago Q1)}, volume = {86}, number = {1}, pages = {453--470}, year = {2019}, url = {https://maxime.puys.name/publications/pdf/DPPLR18.pdf} } [1] J.-G. Dumas, P. Lafourcade, J.-B. Orfila, and M. Puys. Dual protocols for private multi-party matrix multiplication and trust computations. Computers & Security, Elsevier (Rank Sciamago Q1), 71(1):51--70, 2017. [bib] [pdf] @article{DLOP17, author = {Dumas, Jean-Guillaume and Lafourcade, Pascal and Orfila, Jean-Baptiste and Puys, Maxime}, title = {Dual protocols for private multi-party matrix multiplication and trust computations}, journal = {Computers \& Security, Elsevier (Rank Sciamago Q1)}, volume = {71}, number = {1}, pages = {51--70}, year = {2017}, url = {https://maxime.puys.name/publications/pdf/DLOP17.pdf} } International Peer-Reviewed Conferences with Proceedings [21] S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, M. Puys, and K. Sakiyama. Secure voting protocol using balance scale. Foundations and Practice of Security - 17th International Symposium, FPS 2024, Montreal, Canada, December 9-11, 2024, Revised Selected Papers, Montreal, Canada [bib] [pdf] @inproceedings{KLMMPS24b, title = {Secure Voting Protocol Using Balance Scale}, author = {Kaneko, Shohei and Lafourcade, Pascal and Mallordy, Lola-Baie and Miyahara, Daiki and Puys, Maxime and Sakiyama, Kazuo}, booktitle = {Foundations and Practice of Security - 17th International Symposium, FPS 2024, Montreal, Canada, December 9-11, 2024, Revised Selected Papers}, address = {Montreal, Canada}, year = {2024}, url = {https://maxime.puys.name/publications/pdf/KLMMPS24b.pdf} } [20] S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, M. Puys, and K. Sakiyama. Balance-based zkp protocols for pencil-and-paper puzzles. Information Security Conference, 2024 [bib] [pdf] @inproceedings{KLMMPS24a, title = {Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles}, author = {Kaneko, Shohei and Lafourcade, Pascal and Mallordy, Lola-Baie and Miyahara, Daiki and Puys, Maxime and Sakiyama, Kazuo}, booktitle = {Information Security Conference}, year = {2024}, url = {https://maxime.puys.name/publications/pdf/KLMMPS24a.pdf} } [19] M. Da Silva, M. Puys, P.-H. Thevenon, and S. Mocanu. Plc logic-based cybersecurity risks identification for ics. The 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B), 2023 [bib] [pdf] @inproceedings{DPTM23, title = {PLC Logic-Based Cybersecurity Risks Identification for ICS}, author = {Da Silva, Mike and Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane}, booktitle = {The 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B)}, year = {2023}, url = {https://maxime.puys.name/publications/pdf/DPTM23.pdf} } [18] M. Da Silva, M. Puys, P.-H. Thevenon, S. Mocanu, and N. Nkawa. Automated ics template for stride microsoft threat modeling tool. The 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B), 2023 [bib] [pdf] @inproceedings{DPTMN23, title = {Automated ICS template for STRIDE Microsoft Threat Modeling Tool}, author = {Da Silva, Mike and Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane and Nkawa, Nelson}, booktitle = {The 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B)}, year = {2023}, url = {https://maxime.puys.name/publications/pdf/DPTMN23.pdf} } [17] N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. A hybrid solution for constraint devices to detect microarchitectural attacks. IEEE European Symposium on Security and Privacy (EuroS&P 2023) - Workshops, Delft, Netherlands, July 3-7, 2023, 2023 [bib] [pdf] @inproceedings{PTPB23, title = {A Hybrid Solution for Constraint Devices to Detect Microarchitectural Attacks}, author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, booktitle = {IEEE European Symposium on Security and Privacy (EuroS\&P 2023) - Workshops, Delft, Netherlands, July 3-7, 2023}, year = {2023}, url = {https://maxime.puys.name/publications/pdf/PTPB23.pdf} } [16] C. Sivelle, L. Debbah, M. Puys, P. Lafourcade, and T. Franco-Rondisson. Automatic implementations synthesis of secure protocols and attacks from abstract models. 27th Nordic Conference on Secure IT Systems (NordSec), Reykjavik, Iceland, Nov. 30 -- Dec. 2, 2022 (Rank ERA C), 2022 [bib] [pdf] @inproceedings{SDPLF22, title = {Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models}, author = {Sivelle, Camille and Debbah, Lorys and Puys, Maxime and Lafourcade, Pascal and Franco-Rondisson, Thibault}, booktitle = {27th Nordic Conference on Secure IT Systems (NordSec), Reykjavik, Iceland, Nov. 30 -- Dec. 2, 2022 (Rank ERA C)}, year = {2022}, url = {https://maxime.puys.name/publications/pdf/SDPLF22.pdf} } [15] N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. MaDMAN: Detection of software attacks targeting hardware vulnerabilities. 24th IEEE Euromicro Conference on Digital System Design (DSD), Palermo, Italy, Sept, 1-3, 2021 (Rank Qualis B1), pages 355--362, 2021 [bib] [pdf] @inproceedings{PTPB21b, title = {{MaDMAN}: Detection of Software Attacks Targeting Hardware Vulnerabilities}, author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, booktitle = {24th IEEE Euromicro Conference on Digital System Design (DSD), Palermo, Italy, Sept, 1-3, 2021 (Rank Qualis B1)}, pages = {355-362}, year = {2021}, url = {https://maxime.puys.name/publications/pdf/PTPB21b.pdf} } [14] N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. Securing IoI/IIoT from software attacks targeting hardware vulnerabilities. 2021 19th IEEE International New Circuits and Systems Conference (NEWCAS), Toulon, France, June 13-16, 2021 (Rank Qualis B4), pages 1--4, 2021 [bib] [pdf] @inproceedings{PTPB21c, title = {Securing {IoI}/{IIoT} from Software Attacks Targeting Hardware Vulnerabilities}, author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, booktitle = {2021 19th {IEEE} International New Circuits and Systems Conference ({NEWCAS}), Toulon, France, June 13-16, 2021 (Rank Qualis B4)}, pages = {1--4}, year = {2021}, url = {https://maxime.puys.name/publications/pdf/PTPB21c.pdf} } [13] M. Puys, P.-H. Thevenon, and S. Mocanu. Hardware-in-the-loop labs for scada cybersecurity awareness and training. The 16th International Conference on Availability, Reliability and Security, ARES 2021, Vienna, Austria, August 17-20, 2021 (Rank Core B), pages 1--10, 2021 [bib] [pdf] @inproceedings{PTM21, title = {Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training}, author = {Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane}, booktitle = {The 16th International Conference on Availability, Reliability and Security, {ARES} 2021, Vienna, Austria, August 17-20, 2021 (Rank Core B)}, pages = {1--10}, year = {2021}, url = {https://maxime.puys.name/publications/pdf/PTM21.pdf} } [12] M. Puys, J.-P. Krimm, and R. Collado. Towards cybersecurity act: A survey on iot evaluation frameworks. SECURWARE 2020-The Fourteenth International Conference on Emerging Security Information, Systems and Technologies (Rank Qualis B3), pages 69--74, 2020 [bib] [pdf] @inproceedings{PKC20, title = {Towards Cybersecurity Act: A Survey on IoT Evaluation Frameworks}, author = {Puys, Maxime and Krimm, Jean-Pierre and Collado, Rapha{\"e}l}, booktitle = {{SECURWARE} 2020-The Fourteenth International Conference on Emerging Security Information, Systems and Technologies (Rank Qualis B3)}, pages = {69--74}, year = {2020}, url = {https://maxime.puys.name/publications/pdf/PKC20.pdf} } [11] J. Dumas, P. Lafourcade, J. López Fenner, D. Lucas, J. Orfila, C. Pernet, and M. Puys. Secure multiparty matrix multiplication based on strassen-winograd algorithm. Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings (Rank Core B), pages 67--88, 2019 [bib] [pdf] @inproceedings{DLFLPP19, author = {Dumas, Jean{-}Guillaume and Lafourcade, Pascal and L{\'{o}}pez Fenner, Julio and Lucas, David and Orfila, Jean{-}Baptiste and Pernet, Cl{\'{e}}ment and Puys, Maxime}, title = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings (Rank Core B)}, pages = {67--88}, year = {2019}, url = {https://maxime.puys.name/publications/pdf/DLFLPP19.pdf} } [10] B. Badrignans, V. Danjean, J. Dumas, P. Elbaz-Vincent, S. Machenaud, J. Orfila, F. Pebay-Peyroula, F. Pebay-Peyroula, M. Potet, M. Puys, J. Richier, and R. Jean-Louis. Security Architecture for Embedded Point-to-Points Splitting Protocols. WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security, 2017 [bib] [pdf] @inproceedings{BDDEOPPPRR17, author = {Badrignans, Benoit and Danjean, Vincent and Dumas, Jean{-}Guillaume and Elbaz{-}Vincent, Philippe and Machenaud, Sabine and Orfila, Jean{-}Baptiste and Pebay{-}Peyroula, Florian and Pebay{-}Peyroula, François and Potet, Marie{-}Laure and Puys, Maxime and Richier, Jean{-}Luc and Jean{-}Louis, Roch}, title = {{Security Architecture for Embedded Point-to-Points Splitting Protocols}}, booktitle = {{WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security}}, year = {2017}, url = {https://maxime.puys.name/publications/pdf/BDDEOPPPRR17.pdf} } [9] M. Puys, M. Potet, and A. Khaled. Generation of applicative attacks scenarios against industrial systems. Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers, pages 127--143, 2017 [bib] [pdf] @inproceedings{PPK17, author = {Puys, Maxime and Potet, Marie{-}Laure and Khaled, Abdelaziz}, title = {Generation of Applicative Attacks Scenarios Against Industrial Systems}, booktitle = {Foundations and Practice of Security - 10th International Symposium, {FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers}, pages = {127--143}, year = {2017}, url = {https://maxime.puys.name/publications/pdf/PPK17.pdf} } [8] J. Dreier, M. Puys, M. Potet, P. Lafourcade, and J. Roch. Formally verifying flow integrity properties in industrial systems. Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE) 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017 (Rank Core B), pages 55--66, Best Student Paper Award, 2017 [bib] [pdf] @inproceedings{DPPLR17, author = {Dreier, Jannik and Puys, Maxime and Potet, Marie{-}Laure and Lafourcade, Pascal and Roch, Jean{-}Louis}, title = {Formally Verifying Flow Integrity Properties in Industrial Systems}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE)} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017 (Rank Core B)}, pages = {55--66}, year = {2017}, note = {Best Student Paper Award}, url = {https://maxime.puys.name/publications/pdf/DPPLR17.pdf} } [7] M. Puys, J. Roch, and M. Potet. Domain specific stateful filtering with worst-case bandwidth. Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers (Rank Core C), pages 321--327, 2016 [bib] [pdf] @inproceedings{PRP16, author = {Puys, Maxime and Roch, Jean{-}Louis and Potet, Marie{-}Laure}, title = {Domain Specific Stateful Filtering with Worst{-}Case Bandwidth}, booktitle = {Critical Information Infrastructures Security - 11th International Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised Selected Papers (Rank Core C)}, pages = {321--327}, year = {2016}, url = {https://maxime.puys.name/publications/pdf/PRP16.pdf} } [6] M. Puys, M. Potet, and P. Lafourcade. Formal analysis of security properties on the OPC-UA SCADA protocol. Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings (Rank Core B), pages 67--75, 2016 [bib] [pdf] @inproceedings{PPL16, author = {Puys, Maxime and Potet, Marie{-}Laure and Lafourcade, Pascal}, title = {Formal Analysis of Security Properties on the {OPC-UA} {SCADA} Protocol}, booktitle = {Computer Safety, Reliability, and Security - 35th International Conference, {SAFECOMP} 2016, Trondheim, Norway, September 21-23, 2016, Proceedings (Rank Core B)}, pages = {67--75}, year = {2016}, url = {https://maxime.puys.name/publications/pdf/PPL16.pdf} } [5] J. Dumas, P. Lafourcade, J. Orfila, and M. Puys. Private multi-party matrix multiplication and trust computations. Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016 (Rank Core B), pages 61--72, Best Paper Award, 2016 [bib] [pdf] @inproceedings{DLOP16, author = {Dumas, Jean{-}Guillaume and Lafourcade, Pascal and Orfila, Jean{-}Baptiste and Puys, Maxime}, title = {Private Multi-party Matrix Multiplication and Trust Computations}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications ({ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016 (Rank Core B)}, pages = {61--72}, year = {2016}, note = {Best Paper Award}, url = {https://maxime.puys.name/publications/pdf/DLOP16.pdf} } [4] P. Lafourcade and M. Puys. Performance evaluations of cryptographic protocols verification tools dealing with algebraic properties. Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers, pages 137--155, 2015 [bib] [pdf] @inproceedings{LP15, author = {Lafourcade, Pascal and Puys, Maxime}, title = {Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, pages = {137--155}, year = {2015}, url = {https://maxime.puys.name/publications/pdf/LP15.pdf} } [3] L. Rivière, M. Potet, T. Le, J. Bringer, H. Chabanne, and M. Puys. Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks. Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers, pages 92--111, 2014 [bib] [pdf] @inproceedings{RPLBCP14, author = {Rivi{\`{e}}re, Lionel and Potet, Marie{-}Laure and Le, Thanh{-}Ha and Bringer, Julien and Chabanne, Herv{\'{e}} and Puys, Maxime}, title = {Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, pages = {92--111}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/RPLBCP14.pdf} } [2] M. Puys, L. Rivière, J. Bringer, and T. Le. High-level simulation for multiple fault injection evaluation. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers, pages 293--308, 2014 [bib] [pdf] @inproceedings{PRBL14, author = {Puys, Maxime and Rivi{\`{e}}re, Lionel and Bringer, Julien and Le, Thanh{-}Ha}, title = {High-Level Simulation for Multiple Fault Injection Evaluation}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, pages = {293--308}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/PRBL14.pdf} } [1] M. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. Seventh IEEE International Conference on Software Testing, Verification and Validation, ICST 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, USA (Core Rank A), pages 213--222, 2014 [bib] [pdf] @inproceedings{PMPD14, author = {Potet, Marie{-}Laure and Mounier, Laurent and Puys, Maxime and Dureuil, Louis}, title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections}, booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, {USA} (Core Rank A)}, pages = {213--222}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf} } French Peer-Reviewed Conferences with Proceedings [8] M. Puys and P.-H. Thevenon. PULSE - cybersécurité des systèmes industriels. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2022, Chambon-sur-Lac, France, 2022 [bib] [pdf] @inproceedings{PT22, author = {Puys, Maxime and Thevenon, Pierre-Henri}, title = {{PULSE} - Cybersécurité des systèmes industriels}, booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2022, Chambon-sur-Lac, France}}, year = {2022}, url = {https://maxime.puys.name/publications/pdf/PT22.pdf} } [7] M. Gallissot, M. Puys, and P.-H. Thevenon. Wonder-Cloud, une plateforme pour l’analyse et l’émulation de micrologiciels ainsi que la composition de pots de miels. C&esar 2020 - Deceptive Security, Rennes, France, pages 1--8, 2020 [bib] [pdf] @inproceedings{GPT20, author = {Gallissot, Mathieu and Puys, Maxime and Thevenon, Pierre-Henri}, title = {{Wonder-Cloud, une plateforme pour l’analyse et l’{\'e}mulation de micrologiciels ainsi que la composition de pots de miels}}, booktitle = {{C\&esar 2020 - Deceptive Security, Rennes, France}}, pages = {1--8}, year = {2020}, url = {https://maxime.puys.name/publications/pdf/GPT20.pdf} } [6] S. Mocanu, M. Puys, and P.-H. Thevenon. An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems. C&esar 2019 - Virtualization and Cybersecurity, Rennes, France, pages 1--16, 2019 [bib] [pdf] @inproceedings{MPT19, author = {Mocanu, St{\'e}phane and Puys, Maxime and Thevenon, Pierre-Henri}, title = {{An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems}}, booktitle = {{C\&esar 2019 - Virtualization and Cybersecurity, Rennes, France}}, pages = {1-16}, year = {2019}, url = {https://maxime.puys.name/publications/pdf/MPT19.pdf} } [5] M. Puys and P.-H. Thevenon. Les défis posés par la sécurisation de l'iot industriel. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2019, Erquy, France, 2019 [bib] [pdf] @inproceedings{PT19, author = {Puys, Maxime and Thevenon, Pierre-Henri}, title = {Les d{\'e}fis pos{\'e}s par la s{\'e}curisation de l'IoT industriel}, booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2019, Erquy, France}}, year = {2019}, url = {https://maxime.puys.name/publications/pdf/PT19.pdf} } [4] M. Puys, M. Potet, and J. Roch. Filtrage et vérification de flux métiers dans les systèmes industriels. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2016, Toulouse, France, 2016 [bib] [pdf] @inproceedings{PPR16b, author = {Puys, Maxime and Potet, Marie{-}Laure and Roch, Jean{-}Louis}, title = {Filtrage et v{\'e}rification de flux m{\'e}tiers dans les syst{\`e}mes industriels}, booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2016, Toulouse, France}}, year = {2016}, url = {https://maxime.puys.name/publications/pdf/PPR16b.pdf} } [3] M. Puys, M. Potet, and J. Roch. Génération systématique de scénarios d'attaques contre des systèmes industriels. Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL 2016, Besançon, France, 2016 [bib] [pdf] @inproceedings{PPR16a, author = {Puys, Maxime and Potet, Marie{-}Laure and Roch, Jean{-}Louis}, title = {G{\'e}n{\'e}ration syst{\'e}matique de sc{\'e}narios d'attaques contre des syst{\`e}mes industriels}, booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de Logiciels, AFADL 2016, Besan{\c c}on, France}}, year = {2016}, url = {https://maxime.puys.name/publications/pdf/PPR16a.pdf} } [2] M. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. 1er Colloque sur la Confiance Numérique en Auvergne, Clermont-Ferrand, France, 2014 [bib] [pdf] @inproceedings{PMPD14b, author = {Potet, Marie{-}Laure and Mounier, Laurent and Puys, Maxime and Dureuil, Louis}, title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections}, booktitle = {{1er Colloque sur la Confiance Num{\'e}rique en Auvergne, Clermont-Ferrand, France}}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf} } [1] M. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL 2014, Paris, France, 2014 [bib] [pdf] @inproceedings{PMPD14a, author = {Potet, Marie{-}Laure and Mounier, Laurent and Puys, Maxime and Dureuil, Louis}, title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections}, booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de Logiciels, AFADL 2014, Paris, France}}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf} } Patents [2] M. Da Silva, P.-H. Thevenon, M. Puys, and S. Mocanu. Method and device for identifying risks of cyberattacks, Jun 2024 [bib] @misc{dasilva2024method, title = {Method and device for identifying risks of cyberattacks}, author = {Da Silva, Mike and Thevenon, Pierre-Henri and Puys, Maxime and Mocanu, St{\'e}phane}, year = {2024}, month = {Jun}, publisher = {US Patent App. 18/534,970} } [1] N. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. System for detecting malwares in a resources constrained device, Aug 2023 [bib] @misc{polychronou2023system, title = {System for detecting malwares in a resources constrained device}, author = {Polychronou, Nikolaos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, year = {2023}, month = {Aug}, publisher = {US Patent App. 18/109,815} }" />
<meta name="keywords" content="">
<meta property="og:site_name" content="Maxime Puys"/>
<meta property="og:title" content="Publications"/>
<meta property="og:description" content="Ph.D. Thesis [1] M. Puys. Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques. PhD thesis, Communauté Université Grenoble-Alpes, Feb. 2018. [bib] [pdf] [slides] @phdthesis{phdThesisMaximePuys, author = {Maxime Puys}, title = {S{\'e}curit{\'e} des syst{\`e}mes industriels : filtrage applicatif et recherche de sc{\'e}narios d'attaques}, school = {Communaut{\'e} Universit{\'e} Grenoble{-}Alpes}, year = {2018}, month = {Feb.}, url = {https://maxime.puys.name/publications/pdf/phdThesisMaximePuys.pdf} } International Peer-Reviewed Journals [5] P.-H. Thevenon, S. Riou, D.-M. Tran, M. Puys, N. F. Polychronou, M. El Majihi, and C. Sivelle. iMRC: integrated monitoring & recovery component, a solution to guarantee the security of embedded systems. Journal of Internet Services and Information Security (JISIS) (Rank Scimago Q3), 13(1):4--32, 2022. [bib] [pdf] @article{TRDPPES22, author = {Thevenon, Pierre-Henri and Riou, Sebastien and Tran, Duc-Minh and Puys, Maxime and Polychronou, Nikolaos Foivos and El Majihi, Mustapha and Sivelle, Camille}, title = {{iMRC:} Integrated Monitoring \& Recovery Component, a Solution to Guarantee the Security of Embedded Systems}, journal = {Journal of Internet Services and Information Security (JISIS) (Rank Scimago Q3)}, volume = {13}, number = {1}, pages = {4--32}, year = {2022}, url = {https://maxime.puys.name/publications/pdf/TRDPPES22.pdf} } [4] M. Puys, P.-H. Thevenon, S. M. Mocanu, M. Gallissot, and C. Sivelle. SCADA cybersecurity awareness and teaching with hardware-in-the-loop platforms. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) (Rank Scimago Q2), 13(1):4--32, 2022. [bib] [pdf] @article{PTMGS22, author = {Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane Mocanu and Gallissot, Mathieu and Sivelle, Camille}, title = {{SCADA} Cybersecurity Awareness and Teaching with Hardware-In-The-Loop Platforms}, journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) (Rank Scimago Q2)}, volume = {13}, number = {1}, pages = {4--32}, year = {2022}, url = {https://maxime.puys.name/publications/pdf/PTMGS22.pdf} } [3] N.-F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IoT/IIoT devices, and their detection mechanisms. ACM Transactions on Design Automation of Electronic Systems (Rank Sciamago Q2), 27(1):1--35, 2021. [bib] [pdf] @article{PTPB21a, author = {Polychronou, Nikolaos-Foivos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, title = {A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in {IoT/IIoT} Devices, and Their Detection Mechanisms}, journal = {ACM Transactions on Design Automation of Electronic Systems (Rank Sciamago Q2)}, volume = {27}, number = {1}, pages = {1--35}, year = {2021}, url = {https://maxime.puys.name/publications/pdf/PTPB21a.pdf} } [2] J. Dreier, M. Puys, M.-L. Potet, P. Lafourcade, and J.-L. Roch. Formally and practically verifying flow properties in industrial systems. Computers & Security, Elsevier (Rank Sciamago Q1), 86(1):453--470, 2019. [bib] [pdf] @article{DPPLR19, author = {Dreier, Jannik and Puys, Maxime and Potet, Marie-Laure and Lafourcade, Pascal and Roch, Jean-Louis}, title = {Formally and practically verifying flow properties in industrial systems}, journal = {Computers \& Security, Elsevier (Rank Sciamago Q1)}, volume = {86}, number = {1}, pages = {453--470}, year = {2019}, url = {https://maxime.puys.name/publications/pdf/DPPLR18.pdf} } [1] J.-G. Dumas, P. Lafourcade, J.-B. Orfila, and M. Puys. Dual protocols for private multi-party matrix multiplication and trust computations. Computers & Security, Elsevier (Rank Sciamago Q1), 71(1):51--70, 2017. [bib] [pdf] @article{DLOP17, author = {Dumas, Jean-Guillaume and Lafourcade, Pascal and Orfila, Jean-Baptiste and Puys, Maxime}, title = {Dual protocols for private multi-party matrix multiplication and trust computations}, journal = {Computers \& Security, Elsevier (Rank Sciamago Q1)}, volume = {71}, number = {1}, pages = {51--70}, year = {2017}, url = {https://maxime.puys.name/publications/pdf/DLOP17.pdf} } International Peer-Reviewed Conferences with Proceedings [21] S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, M. Puys, and K. Sakiyama. Secure voting protocol using balance scale. Foundations and Practice of Security - 17th International Symposium, FPS 2024, Montreal, Canada, December 9-11, 2024, Revised Selected Papers, Montreal, Canada [bib] [pdf] @inproceedings{KLMMPS24b, title = {Secure Voting Protocol Using Balance Scale}, author = {Kaneko, Shohei and Lafourcade, Pascal and Mallordy, Lola-Baie and Miyahara, Daiki and Puys, Maxime and Sakiyama, Kazuo}, booktitle = {Foundations and Practice of Security - 17th International Symposium, FPS 2024, Montreal, Canada, December 9-11, 2024, Revised Selected Papers}, address = {Montreal, Canada}, year = {2024}, url = {https://maxime.puys.name/publications/pdf/KLMMPS24b.pdf} } [20] S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, M. Puys, and K. Sakiyama. Balance-based zkp protocols for pencil-and-paper puzzles. Information Security Conference, 2024 [bib] [pdf] @inproceedings{KLMMPS24a, title = {Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles}, author = {Kaneko, Shohei and Lafourcade, Pascal and Mallordy, Lola-Baie and Miyahara, Daiki and Puys, Maxime and Sakiyama, Kazuo}, booktitle = {Information Security Conference}, year = {2024}, url = {https://maxime.puys.name/publications/pdf/KLMMPS24a.pdf} } [19] M. Da Silva, M. Puys, P.-H. Thevenon, and S. Mocanu. Plc logic-based cybersecurity risks identification for ics. The 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B), 2023 [bib] [pdf] @inproceedings{DPTM23, title = {PLC Logic-Based Cybersecurity Risks Identification for ICS}, author = {Da Silva, Mike and Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane}, booktitle = {The 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B)}, year = {2023}, url = {https://maxime.puys.name/publications/pdf/DPTM23.pdf} } [18] M. Da Silva, M. Puys, P.-H. Thevenon, S. Mocanu, and N. Nkawa. Automated ics template for stride microsoft threat modeling tool. The 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B), 2023 [bib] [pdf] @inproceedings{DPTMN23, title = {Automated ICS template for STRIDE Microsoft Threat Modeling Tool}, author = {Da Silva, Mike and Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane and Nkawa, Nelson}, booktitle = {The 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B)}, year = {2023}, url = {https://maxime.puys.name/publications/pdf/DPTMN23.pdf} } [17] N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. A hybrid solution for constraint devices to detect microarchitectural attacks. IEEE European Symposium on Security and Privacy (EuroS&P 2023) - Workshops, Delft, Netherlands, July 3-7, 2023, 2023 [bib] [pdf] @inproceedings{PTPB23, title = {A Hybrid Solution for Constraint Devices to Detect Microarchitectural Attacks}, author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, booktitle = {IEEE European Symposium on Security and Privacy (EuroS\&P 2023) - Workshops, Delft, Netherlands, July 3-7, 2023}, year = {2023}, url = {https://maxime.puys.name/publications/pdf/PTPB23.pdf} } [16] C. Sivelle, L. Debbah, M. Puys, P. Lafourcade, and T. Franco-Rondisson. Automatic implementations synthesis of secure protocols and attacks from abstract models. 27th Nordic Conference on Secure IT Systems (NordSec), Reykjavik, Iceland, Nov. 30 -- Dec. 2, 2022 (Rank ERA C), 2022 [bib] [pdf] @inproceedings{SDPLF22, title = {Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models}, author = {Sivelle, Camille and Debbah, Lorys and Puys, Maxime and Lafourcade, Pascal and Franco-Rondisson, Thibault}, booktitle = {27th Nordic Conference on Secure IT Systems (NordSec), Reykjavik, Iceland, Nov. 30 -- Dec. 2, 2022 (Rank ERA C)}, year = {2022}, url = {https://maxime.puys.name/publications/pdf/SDPLF22.pdf} } [15] N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. MaDMAN: Detection of software attacks targeting hardware vulnerabilities. 24th IEEE Euromicro Conference on Digital System Design (DSD), Palermo, Italy, Sept, 1-3, 2021 (Rank Qualis B1), pages 355--362, 2021 [bib] [pdf] @inproceedings{PTPB21b, title = {{MaDMAN}: Detection of Software Attacks Targeting Hardware Vulnerabilities}, author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, booktitle = {24th IEEE Euromicro Conference on Digital System Design (DSD), Palermo, Italy, Sept, 1-3, 2021 (Rank Qualis B1)}, pages = {355-362}, year = {2021}, url = {https://maxime.puys.name/publications/pdf/PTPB21b.pdf} } [14] N. F. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. Securing IoI/IIoT from software attacks targeting hardware vulnerabilities. 2021 19th IEEE International New Circuits and Systems Conference (NEWCAS), Toulon, France, June 13-16, 2021 (Rank Qualis B4), pages 1--4, 2021 [bib] [pdf] @inproceedings{PTPB21c, title = {Securing {IoI}/{IIoT} from Software Attacks Targeting Hardware Vulnerabilities}, author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, booktitle = {2021 19th {IEEE} International New Circuits and Systems Conference ({NEWCAS}), Toulon, France, June 13-16, 2021 (Rank Qualis B4)}, pages = {1--4}, year = {2021}, url = {https://maxime.puys.name/publications/pdf/PTPB21c.pdf} } [13] M. Puys, P.-H. Thevenon, and S. Mocanu. Hardware-in-the-loop labs for scada cybersecurity awareness and training. The 16th International Conference on Availability, Reliability and Security, ARES 2021, Vienna, Austria, August 17-20, 2021 (Rank Core B), pages 1--10, 2021 [bib] [pdf] @inproceedings{PTM21, title = {Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training}, author = {Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane}, booktitle = {The 16th International Conference on Availability, Reliability and Security, {ARES} 2021, Vienna, Austria, August 17-20, 2021 (Rank Core B)}, pages = {1--10}, year = {2021}, url = {https://maxime.puys.name/publications/pdf/PTM21.pdf} } [12] M. Puys, J.-P. Krimm, and R. Collado. Towards cybersecurity act: A survey on iot evaluation frameworks. SECURWARE 2020-The Fourteenth International Conference on Emerging Security Information, Systems and Technologies (Rank Qualis B3), pages 69--74, 2020 [bib] [pdf] @inproceedings{PKC20, title = {Towards Cybersecurity Act: A Survey on IoT Evaluation Frameworks}, author = {Puys, Maxime and Krimm, Jean-Pierre and Collado, Rapha{\"e}l}, booktitle = {{SECURWARE} 2020-The Fourteenth International Conference on Emerging Security Information, Systems and Technologies (Rank Qualis B3)}, pages = {69--74}, year = {2020}, url = {https://maxime.puys.name/publications/pdf/PKC20.pdf} } [11] J. Dumas, P. Lafourcade, J. López Fenner, D. Lucas, J. Orfila, C. Pernet, and M. Puys. Secure multiparty matrix multiplication based on strassen-winograd algorithm. Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings (Rank Core B), pages 67--88, 2019 [bib] [pdf] @inproceedings{DLFLPP19, author = {Dumas, Jean{-}Guillaume and Lafourcade, Pascal and L{\'{o}}pez Fenner, Julio and Lucas, David and Orfila, Jean{-}Baptiste and Pernet, Cl{\'{e}}ment and Puys, Maxime}, title = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings (Rank Core B)}, pages = {67--88}, year = {2019}, url = {https://maxime.puys.name/publications/pdf/DLFLPP19.pdf} } [10] B. Badrignans, V. Danjean, J. Dumas, P. Elbaz-Vincent, S. Machenaud, J. Orfila, F. Pebay-Peyroula, F. Pebay-Peyroula, M. Potet, M. Puys, J. Richier, and R. Jean-Louis. Security Architecture for Embedded Point-to-Points Splitting Protocols. WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security, 2017 [bib] [pdf] @inproceedings{BDDEOPPPRR17, author = {Badrignans, Benoit and Danjean, Vincent and Dumas, Jean{-}Guillaume and Elbaz{-}Vincent, Philippe and Machenaud, Sabine and Orfila, Jean{-}Baptiste and Pebay{-}Peyroula, Florian and Pebay{-}Peyroula, François and Potet, Marie{-}Laure and Puys, Maxime and Richier, Jean{-}Luc and Jean{-}Louis, Roch}, title = {{Security Architecture for Embedded Point-to-Points Splitting Protocols}}, booktitle = {{WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security}}, year = {2017}, url = {https://maxime.puys.name/publications/pdf/BDDEOPPPRR17.pdf} } [9] M. Puys, M. Potet, and A. Khaled. Generation of applicative attacks scenarios against industrial systems. Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers, pages 127--143, 2017 [bib] [pdf] @inproceedings{PPK17, author = {Puys, Maxime and Potet, Marie{-}Laure and Khaled, Abdelaziz}, title = {Generation of Applicative Attacks Scenarios Against Industrial Systems}, booktitle = {Foundations and Practice of Security - 10th International Symposium, {FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers}, pages = {127--143}, year = {2017}, url = {https://maxime.puys.name/publications/pdf/PPK17.pdf} } [8] J. Dreier, M. Puys, M. Potet, P. Lafourcade, and J. Roch. Formally verifying flow integrity properties in industrial systems. Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE) 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017 (Rank Core B), pages 55--66, Best Student Paper Award, 2017 [bib] [pdf] @inproceedings{DPPLR17, author = {Dreier, Jannik and Puys, Maxime and Potet, Marie{-}Laure and Lafourcade, Pascal and Roch, Jean{-}Louis}, title = {Formally Verifying Flow Integrity Properties in Industrial Systems}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE)} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017 (Rank Core B)}, pages = {55--66}, year = {2017}, note = {Best Student Paper Award}, url = {https://maxime.puys.name/publications/pdf/DPPLR17.pdf} } [7] M. Puys, J. Roch, and M. Potet. Domain specific stateful filtering with worst-case bandwidth. Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers (Rank Core C), pages 321--327, 2016 [bib] [pdf] @inproceedings{PRP16, author = {Puys, Maxime and Roch, Jean{-}Louis and Potet, Marie{-}Laure}, title = {Domain Specific Stateful Filtering with Worst{-}Case Bandwidth}, booktitle = {Critical Information Infrastructures Security - 11th International Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised Selected Papers (Rank Core C)}, pages = {321--327}, year = {2016}, url = {https://maxime.puys.name/publications/pdf/PRP16.pdf} } [6] M. Puys, M. Potet, and P. Lafourcade. Formal analysis of security properties on the OPC-UA SCADA protocol. Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings (Rank Core B), pages 67--75, 2016 [bib] [pdf] @inproceedings{PPL16, author = {Puys, Maxime and Potet, Marie{-}Laure and Lafourcade, Pascal}, title = {Formal Analysis of Security Properties on the {OPC-UA} {SCADA} Protocol}, booktitle = {Computer Safety, Reliability, and Security - 35th International Conference, {SAFECOMP} 2016, Trondheim, Norway, September 21-23, 2016, Proceedings (Rank Core B)}, pages = {67--75}, year = {2016}, url = {https://maxime.puys.name/publications/pdf/PPL16.pdf} } [5] J. Dumas, P. Lafourcade, J. Orfila, and M. Puys. Private multi-party matrix multiplication and trust computations. Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016 (Rank Core B), pages 61--72, Best Paper Award, 2016 [bib] [pdf] @inproceedings{DLOP16, author = {Dumas, Jean{-}Guillaume and Lafourcade, Pascal and Orfila, Jean{-}Baptiste and Puys, Maxime}, title = {Private Multi-party Matrix Multiplication and Trust Computations}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications ({ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016 (Rank Core B)}, pages = {61--72}, year = {2016}, note = {Best Paper Award}, url = {https://maxime.puys.name/publications/pdf/DLOP16.pdf} } [4] P. Lafourcade and M. Puys. Performance evaluations of cryptographic protocols verification tools dealing with algebraic properties. Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers, pages 137--155, 2015 [bib] [pdf] @inproceedings{LP15, author = {Lafourcade, Pascal and Puys, Maxime}, title = {Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, pages = {137--155}, year = {2015}, url = {https://maxime.puys.name/publications/pdf/LP15.pdf} } [3] L. Rivière, M. Potet, T. Le, J. Bringer, H. Chabanne, and M. Puys. Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks. Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers, pages 92--111, 2014 [bib] [pdf] @inproceedings{RPLBCP14, author = {Rivi{\`{e}}re, Lionel and Potet, Marie{-}Laure and Le, Thanh{-}Ha and Bringer, Julien and Chabanne, Herv{\'{e}} and Puys, Maxime}, title = {Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, pages = {92--111}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/RPLBCP14.pdf} } [2] M. Puys, L. Rivière, J. Bringer, and T. Le. High-level simulation for multiple fault injection evaluation. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers, pages 293--308, 2014 [bib] [pdf] @inproceedings{PRBL14, author = {Puys, Maxime and Rivi{\`{e}}re, Lionel and Bringer, Julien and Le, Thanh{-}Ha}, title = {High-Level Simulation for Multiple Fault Injection Evaluation}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, pages = {293--308}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/PRBL14.pdf} } [1] M. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. Seventh IEEE International Conference on Software Testing, Verification and Validation, ICST 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, USA (Core Rank A), pages 213--222, 2014 [bib] [pdf] @inproceedings{PMPD14, author = {Potet, Marie{-}Laure and Mounier, Laurent and Puys, Maxime and Dureuil, Louis}, title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections}, booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, {USA} (Core Rank A)}, pages = {213--222}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf} } French Peer-Reviewed Conferences with Proceedings [8] M. Puys and P.-H. Thevenon. PULSE - cybersécurité des systèmes industriels. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2022, Chambon-sur-Lac, France, 2022 [bib] [pdf] @inproceedings{PT22, author = {Puys, Maxime and Thevenon, Pierre-Henri}, title = {{PULSE} - Cybersécurité des systèmes industriels}, booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2022, Chambon-sur-Lac, France}}, year = {2022}, url = {https://maxime.puys.name/publications/pdf/PT22.pdf} } [7] M. Gallissot, M. Puys, and P.-H. Thevenon. Wonder-Cloud, une plateforme pour l’analyse et l’émulation de micrologiciels ainsi que la composition de pots de miels. C&esar 2020 - Deceptive Security, Rennes, France, pages 1--8, 2020 [bib] [pdf] @inproceedings{GPT20, author = {Gallissot, Mathieu and Puys, Maxime and Thevenon, Pierre-Henri}, title = {{Wonder-Cloud, une plateforme pour l’analyse et l’{\'e}mulation de micrologiciels ainsi que la composition de pots de miels}}, booktitle = {{C\&esar 2020 - Deceptive Security, Rennes, France}}, pages = {1--8}, year = {2020}, url = {https://maxime.puys.name/publications/pdf/GPT20.pdf} } [6] S. Mocanu, M. Puys, and P.-H. Thevenon. An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems. C&esar 2019 - Virtualization and Cybersecurity, Rennes, France, pages 1--16, 2019 [bib] [pdf] @inproceedings{MPT19, author = {Mocanu, St{\'e}phane and Puys, Maxime and Thevenon, Pierre-Henri}, title = {{An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems}}, booktitle = {{C\&esar 2019 - Virtualization and Cybersecurity, Rennes, France}}, pages = {1-16}, year = {2019}, url = {https://maxime.puys.name/publications/pdf/MPT19.pdf} } [5] M. Puys and P.-H. Thevenon. Les défis posés par la sécurisation de l'iot industriel. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2019, Erquy, France, 2019 [bib] [pdf] @inproceedings{PT19, author = {Puys, Maxime and Thevenon, Pierre-Henri}, title = {Les d{\'e}fis pos{\'e}s par la s{\'e}curisation de l'IoT industriel}, booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2019, Erquy, France}}, year = {2019}, url = {https://maxime.puys.name/publications/pdf/PT19.pdf} } [4] M. Puys, M. Potet, and J. Roch. Filtrage et vérification de flux métiers dans les systèmes industriels. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2016, Toulouse, France, 2016 [bib] [pdf] @inproceedings{PPR16b, author = {Puys, Maxime and Potet, Marie{-}Laure and Roch, Jean{-}Louis}, title = {Filtrage et v{\'e}rification de flux m{\'e}tiers dans les syst{\`e}mes industriels}, booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2016, Toulouse, France}}, year = {2016}, url = {https://maxime.puys.name/publications/pdf/PPR16b.pdf} } [3] M. Puys, M. Potet, and J. Roch. Génération systématique de scénarios d'attaques contre des systèmes industriels. Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL 2016, Besançon, France, 2016 [bib] [pdf] @inproceedings{PPR16a, author = {Puys, Maxime and Potet, Marie{-}Laure and Roch, Jean{-}Louis}, title = {G{\'e}n{\'e}ration syst{\'e}matique de sc{\'e}narios d'attaques contre des syst{\`e}mes industriels}, booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de Logiciels, AFADL 2016, Besan{\c c}on, France}}, year = {2016}, url = {https://maxime.puys.name/publications/pdf/PPR16a.pdf} } [2] M. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. 1er Colloque sur la Confiance Numérique en Auvergne, Clermont-Ferrand, France, 2014 [bib] [pdf] @inproceedings{PMPD14b, author = {Potet, Marie{-}Laure and Mounier, Laurent and Puys, Maxime and Dureuil, Louis}, title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections}, booktitle = {{1er Colloque sur la Confiance Num{\'e}rique en Auvergne, Clermont-Ferrand, France}}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf} } [1] M. Potet, L. Mounier, M. Puys, and L. Dureuil. Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections. Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL 2014, Paris, France, 2014 [bib] [pdf] @inproceedings{PMPD14a, author = {Potet, Marie{-}Laure and Mounier, Laurent and Puys, Maxime and Dureuil, Louis}, title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections}, booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de Logiciels, AFADL 2014, Paris, France}}, year = {2014}, url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf} } Patents [2] M. Da Silva, P.-H. Thevenon, M. Puys, and S. Mocanu. Method and device for identifying risks of cyberattacks, Jun 2024 [bib] @misc{dasilva2024method, title = {Method and device for identifying risks of cyberattacks}, author = {Da Silva, Mike and Thevenon, Pierre-Henri and Puys, Maxime and Mocanu, St{\'e}phane}, year = {2024}, month = {Jun}, publisher = {US Patent App. 18/534,970} } [1] N. Polychronou, P.-H. Thevenon, M. Puys, and V. Beroulle. System for detecting malwares in a resources constrained device, Aug 2023 [bib] @misc{polychronou2023system, title = {System for detecting malwares in a resources constrained device}, author = {Polychronou, Nikolaos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent}, year = {2023}, month = {Aug}, publisher = {US Patent App. 18/109,815} }"/>
<meta property="og:locale" content="en_US"/>
<meta property="og:url" content="https://maxime.puys.name/publications.html"/>
<meta property="og:type" content="article"/>
<meta property="article:published_time" content="2017-07-25 21:40:00+02:00"/>
<meta property="article:modified_time" content=""/>
<meta property="article:author" content="https://maxime.puys.name/author/maxime-puys.html">
<meta property="article:section" content="30"/>
<meta property="og:image" content="https://maxime.puys.name/images/profile.png">
<title>Maxime Puys – Publications</title>
</head>
<body >
<aside>
<div>
<a href="https://maxime.puys.name/">
<img src="https://maxime.puys.name/images/profile.png" alt="Maxime Puys, Ph.D" title="Maxime Puys, Ph.D">
</a>
<h1>
<a href="https://maxime.puys.name/">Maxime Puys, Ph.D</a>
</h1>
<p>Maître de conférences / Associate Professor</p>
<nav>
<ul class="list">
<li>
<a target="_self" href="#me" >Me</a>
</li>
<li>
<a target="_self" href="#cv" >Curriculum Vitæ</a>
</li>
<li>
<a target="_self" href="#publications" >Publications</a>
</li>
<li>
<a target="_self" href="#links" >Links</a>
</li>
</ul>
</nav>
<ul class="social">
<li>
<a href="https://www.linkedin.com/in/maxime-puys">
<img src="images/linkedin.png" alt="linkedin"/>
</a>
</li>
<li>
<a href="https://www.researchgate.net/profile/Maxime_Puys">
<img src="images/researchgate.png" alt="researchgate"/>
</a>
</li>
<li>
<a href="https://scholar.google.fr/citations?user=nkNvw8wAAAAJ">
<img src="images/google-scholar.png" alt="google-scholar"/>
</a>
</li>
<li>
<a href="https://github.com/drakes00">
<img src="images/github.png" alt="github"/>
</a>
</li>
<li>
<a href="http://dblp.uni-trier.de/pers/hd/p/Puys:Maxime">
<img src="images/dblp.png" alt="dblp"/>
</a>
</li>
<li>
<a href="https://orcid.org/0000-0001-6127-9816">
<img src="images/orcid.png" alt="orcid"/>
</a>
</li>
</ul>
</div>
</aside>
<main>
<article class="single">
<header>
<h1 id="publications">Publications</h1>
</header>
<div>
<div id="publications">
<h3>Ph.D. Thesis</h3>
<table><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="phdThesisMaximePuys">1</a>]
</td><td class="bibtexitem"><u>M. Puys</u>. <b>Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques.</b> <em>PhD thesis, Communauté Université Grenoble-Alpes</em>, Feb. 2018. <a href="javascript:hideshow(document.getElementById('phdThesisMaximePuys'))" name="phdThesisMaximePuys">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/phdThesisMaximePuys.pdf">[pdf]</a> <a href="https://maxime.puys.name/publications/pdf/slidesPhdThesisMaximePuys.pdf">[slides]</a><pre id="phdThesisMaximePuys" style="display: none;">
@phdthesis{phdThesisMaximePuys,
author = {Maxime Puys},
title = {S{\'e}curit{\'e} des syst{\`e}mes industriels : filtrage applicatif et recherche de sc{\'e}narios d'attaques},
school = {Communaut{\'e} Universit{\'e} Grenoble{-}Alpes},
year = {2018},
month = {Feb.},
url = {https://maxime.puys.name/publications/pdf/phdThesisMaximePuys.pdf}
}
</pre>
</td></tr></table><h3>International Peer-Reviewed Journals</h3>
<table><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="TRDPPES22">5</a>]
</td><td class="bibtexitem">P.-H. Thevenon, S. Riou, D.-M. Tran, <u>M. Puys</u>, N. F. Polychronou, M. El Majihi, and C. Sivelle. <b>iMRC: integrated monitoring & recovery component, a solution to guarantee the security of embedded systems.</b> <em>Journal of Internet Services and Information Security (JISIS) (Rank Scimago Q3)</em>, 13(1):4--32, 2022. <a href="javascript:hideshow(document.getElementById('TRDPPES22'))" name="TRDPPES22">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/TRDPPES22.pdf">[pdf]</a><em></em><pre id="TRDPPES22" style="display: none;">
@article{TRDPPES22,
author = {Thevenon, Pierre-Henri and
Riou, Sebastien and
Tran, Duc-Minh and
Puys, Maxime and
Polychronou, Nikolaos Foivos and
El Majihi, Mustapha and
Sivelle, Camille},
title = {{iMRC:} Integrated Monitoring \& Recovery Component, a Solution
to Guarantee the Security of Embedded Systems},
journal = {Journal of Internet Services and Information Security (JISIS)
(Rank Scimago Q3)},
volume = {13},
number = {1},
pages = {4--32},
year = {2022},
url = {https://maxime.puys.name/publications/pdf/TRDPPES22.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PTMGS22">4</a>]
</td><td class="bibtexitem"><u>M. Puys</u>, P.-H. Thevenon, S. M. Mocanu, M. Gallissot, and C. Sivelle. <b>SCADA cybersecurity awareness and teaching with hardware-in-the-loop platforms.</b> <em>Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) (Rank Scimago Q2)</em>, 13(1):4--32, 2022. <a href="javascript:hideshow(document.getElementById('PTMGS22'))" name="PTMGS22">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PTMGS22.pdf">[pdf]</a><em></em><pre id="PTMGS22" style="display: none;">
@article{PTMGS22,
author = {Puys, Maxime and
Thevenon, Pierre-Henri and
Mocanu, St\'{e}phane Mocanu and
Gallissot, Mathieu and
Sivelle, Camille},
title = {{SCADA} Cybersecurity Awareness and Teaching with
Hardware-In-The-Loop Platforms},
journal = {Journal of Wireless Mobile Networks, Ubiquitous Computing, and
Dependable Applications (JoWUA) (Rank Scimago Q2)},
volume = {13},
number = {1},
pages = {4--32},
year = {2022},
url = {https://maxime.puys.name/publications/pdf/PTMGS22.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PTPB21a">3</a>]
</td><td class="bibtexitem">N.-F. Polychronou, P.-H. Thevenon, <u>M. Puys</u>, and V. Beroulle. <b>A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in IoT/IIoT devices, and their detection mechanisms.</b> <em>ACM Transactions on Design Automation of Electronic Systems (Rank Sciamago Q2)</em>, 27(1):1--35, 2021. <a href="javascript:hideshow(document.getElementById('PTPB21a'))" name="PTPB21a">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PTPB21a.pdf">[pdf]</a><em></em><pre id="PTPB21a" style="display: none;">
@article{PTPB21a,
author = {Polychronou, Nikolaos-Foivos and Thevenon, Pierre-Henri and
Puys, Maxime and Beroulle, Vincent},
title = {A Comprehensive Survey of Attacks without Physical Access
Targeting Hardware Vulnerabilities in {IoT/IIoT} Devices, and
Their Detection Mechanisms},
journal = {ACM Transactions on Design Automation of Electronic Systems
(Rank Sciamago Q2)},
volume = {27},
number = {1},
pages = {1--35},
year = {2021},
url = {https://maxime.puys.name/publications/pdf/PTPB21a.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="DPPLR19">2</a>]
</td><td class="bibtexitem">J. Dreier, <u>M. Puys</u>, M.-L. Potet, P. Lafourcade, and J.-L. Roch. <b>Formally and practically verifying flow properties in industrial systems.</b> <em>Computers & Security, Elsevier (Rank Sciamago Q1)</em>, 86(1):453--470, 2019. <a href="javascript:hideshow(document.getElementById('DPPLR19'))" name="DPPLR19">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/DPPLR18.pdf">[pdf]</a><em></em><pre id="DPPLR19" style="display: none;">
@article{DPPLR19,
author = {Dreier, Jannik and
Puys, Maxime and
Potet, Marie-Laure and
Lafourcade, Pascal and
Roch, Jean-Louis},
title = {Formally and practically verifying flow properties in industrial
systems},
journal = {Computers \& Security, Elsevier (Rank Sciamago Q1)},
volume = {86},
number = {1},
pages = {453--470},
year = {2019},
url = {https://maxime.puys.name/publications/pdf/DPPLR18.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="DLOP17">1</a>]
</td><td class="bibtexitem">J.-G. Dumas, P. Lafourcade, J.-B. Orfila, and <u>M. Puys</u>. <b>Dual protocols for private multi-party matrix multiplication and trust computations.</b> <em>Computers & Security, Elsevier (Rank Sciamago Q1)</em>, 71(1):51--70, 2017. <a href="javascript:hideshow(document.getElementById('DLOP17'))" name="DLOP17">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/DLOP17.pdf">[pdf]</a><em></em><pre id="DLOP17" style="display: none;">
@article{DLOP17,
author = {Dumas, Jean-Guillaume and
Lafourcade, Pascal and
Orfila, Jean-Baptiste and
Puys, Maxime},
title = {Dual protocols for private multi-party matrix multiplication and
trust computations},
journal = {Computers \& Security, Elsevier (Rank Sciamago Q1)},
volume = {71},
number = {1},
pages = {51--70},
year = {2017},
url = {https://maxime.puys.name/publications/pdf/DLOP17.pdf}
}
</pre>
</td></tr></table><h3>International Peer-Reviewed Conferences with Proceedings</h3>
<table><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="KLMMPS24b">21</a>]
</td><td class="bibtexitem">S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, <u>M. Puys</u>, and K. Sakiyama. <b>Secure voting protocol using balance scale.</b> <em>Foundations and Practice of Security - 17th International Symposium, FPS 2024, Montreal, Canada, December 9-11, 2024, Revised Selected Papers</em>, Montreal, Canada <a href="javascript:hideshow(document.getElementById('KLMMPS24b'))" name="KLMMPS24b">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/KLMMPS24b.pdf">[pdf]</a><pre id="KLMMPS24b" style="display: none;">
@inproceedings{KLMMPS24b,
title = {Secure Voting Protocol Using Balance Scale},
author = {Kaneko, Shohei and Lafourcade, Pascal and Mallordy, Lola-Baie and Miyahara, Daiki and Puys, Maxime and Sakiyama, Kazuo},
booktitle = {Foundations and Practice of Security - 17th International
Symposium, FPS 2024, Montreal, Canada, December 9-11, 2024,
Revised Selected Papers},
address = {Montreal, Canada},
year = {2024},
url = {https://maxime.puys.name/publications/pdf/KLMMPS24b.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="KLMMPS24a">20</a>]
</td><td class="bibtexitem">S. Kaneko, P. Lafourcade, L.-B. Mallordy, D. Miyahara, <u>M. Puys</u>, and K. Sakiyama. <b>Balance-based zkp protocols for pencil-and-paper puzzles.</b> <em>Information Security Conference</em>, 2024 <a href="javascript:hideshow(document.getElementById('KLMMPS24a'))" name="KLMMPS24a">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/KLMMPS24a.pdf">[pdf]</a><pre id="KLMMPS24a" style="display: none;">
@inproceedings{KLMMPS24a,
title = {Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles},
author = {Kaneko, Shohei and Lafourcade, Pascal and Mallordy, Lola-Baie and Miyahara, Daiki and Puys, Maxime and Sakiyama, Kazuo},
booktitle = {Information Security Conference},
year = {2024},
url = {https://maxime.puys.name/publications/pdf/KLMMPS24a.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="DPTM23">19</a>]
</td><td class="bibtexitem">M. Da Silva, <u>M. Puys</u>, P.-H. Thevenon, and S. Mocanu. <b>Plc logic-based cybersecurity risks identification for ics.</b> <em>The 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B)</em>, 2023 <a href="javascript:hideshow(document.getElementById('DPTM23'))" name="DPTM23">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/DPTM23.pdf">[pdf]</a><pre id="DPTM23" style="display: none;">
@inproceedings{DPTM23,
title = {PLC Logic-Based Cybersecurity Risks Identification for ICS},
author = {Da Silva, Mike and Puys, Maxime and Thevenon, Pierre-Henri and
Mocanu, St\'{e}phane},
booktitle = {The 18th International Conference on Availability, Reliability
and Security, {ARES} 2023, Benevento, Italy, Aug. 29 – Sept. 1,
2023 (Rank Core B)},
year = {2023},
url = {https://maxime.puys.name/publications/pdf/DPTM23.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="DPTMN23">18</a>]
</td><td class="bibtexitem">M. Da Silva, <u>M. Puys</u>, P.-H. Thevenon, S. Mocanu, and N. Nkawa. <b>Automated ics template for stride microsoft threat modeling tool.</b> <em>The 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, Aug. 29 – Sept. 1, 2023 (Rank Core B)</em>, 2023 <a href="javascript:hideshow(document.getElementById('DPTMN23'))" name="DPTMN23">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/DPTMN23.pdf">[pdf]</a><pre id="DPTMN23" style="display: none;">
@inproceedings{DPTMN23,
title = {Automated ICS template for STRIDE Microsoft Threat Modeling
Tool},
author = {Da Silva, Mike and Puys, Maxime and Thevenon, Pierre-Henri and
Mocanu, St\'{e}phane and Nkawa, Nelson},
booktitle = {The 18th International Conference on Availability, Reliability
and Security, {ARES} 2023, Benevento, Italy, Aug. 29 – Sept. 1,
2023 (Rank Core B)},
year = {2023},
url = {https://maxime.puys.name/publications/pdf/DPTMN23.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PTPB23">17</a>]
</td><td class="bibtexitem">N. F. Polychronou, P.-H. Thevenon, <u>M. Puys</u>, and V. Beroulle. <b>A hybrid solution for constraint devices to detect microarchitectural attacks.</b> <em>IEEE European Symposium on Security and Privacy (EuroS&P 2023) - Workshops, Delft, Netherlands, July 3-7, 2023</em>, 2023 <a href="javascript:hideshow(document.getElementById('PTPB23'))" name="PTPB23">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PTPB23.pdf">[pdf]</a><pre id="PTPB23" style="display: none;">
@inproceedings{PTPB23,
title = {A Hybrid Solution for Constraint Devices to Detect
Microarchitectural Attacks},
author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri
and Puys, Maxime and Beroulle, Vincent},
booktitle = {IEEE European Symposium on Security and Privacy (EuroS\&P 2023)
- Workshops, Delft, Netherlands, July 3-7, 2023},
year = {2023},
url = {https://maxime.puys.name/publications/pdf/PTPB23.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="SDPLF22">16</a>]
</td><td class="bibtexitem">C. Sivelle, L. Debbah, <u>M. Puys</u>, P. Lafourcade, and T. Franco-Rondisson. <b>Automatic implementations synthesis of secure protocols and attacks from abstract models.</b> <em>27th Nordic Conference on Secure IT Systems (NordSec), Reykjavik, Iceland, Nov. 30 -- Dec. 2, 2022 (Rank ERA C)</em>, 2022 <a href="javascript:hideshow(document.getElementById('SDPLF22'))" name="SDPLF22">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/SDPLF22.pdf">[pdf]</a><pre id="SDPLF22" style="display: none;">
@inproceedings{SDPLF22,
title = {Automatic Implementations Synthesis of Secure Protocols and
Attacks from Abstract Models},
author = {Sivelle, Camille and Debbah, Lorys and Puys, Maxime and Lafourcade,
Pascal and Franco-Rondisson, Thibault},
booktitle = {27th Nordic Conference on Secure IT Systems (NordSec), Reykjavik,
Iceland, Nov. 30 -- Dec. 2, 2022 (Rank ERA C)},
year = {2022},
url = {https://maxime.puys.name/publications/pdf/SDPLF22.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PTPB21b">15</a>]
</td><td class="bibtexitem">N. F. Polychronou, P.-H. Thevenon, <u>M. Puys</u>, and V. Beroulle. <b>MaDMAN: Detection of software attacks targeting hardware vulnerabilities.</b> <em>24th IEEE Euromicro Conference on Digital System Design (DSD), Palermo, Italy, Sept, 1-3, 2021 (Rank Qualis B1)</em>, pages 355--362, 2021 <a href="javascript:hideshow(document.getElementById('PTPB21b'))" name="PTPB21b">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PTPB21b.pdf">[pdf]</a><pre id="PTPB21b" style="display: none;">
@inproceedings{PTPB21b,
title = {{MaDMAN}: Detection of Software Attacks Targeting Hardware Vulnerabilities},
author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri
and Puys, Maxime and Beroulle, Vincent},
booktitle = {24th IEEE Euromicro Conference on Digital System Design (DSD),
Palermo, Italy, Sept, 1-3, 2021 (Rank Qualis B1)},
pages = {355-362},
year = {2021},
url = {https://maxime.puys.name/publications/pdf/PTPB21b.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PTPB21c">14</a>]
</td><td class="bibtexitem">N. F. Polychronou, P.-H. Thevenon, <u>M. Puys</u>, and V. Beroulle. <b>Securing IoI/IIoT from software attacks targeting hardware vulnerabilities.</b> <em>2021 19th IEEE International New Circuits and Systems Conference (NEWCAS), Toulon, France, June 13-16, 2021 (Rank Qualis B4)</em>, pages 1--4, 2021 <a href="javascript:hideshow(document.getElementById('PTPB21c'))" name="PTPB21c">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PTPB21c.pdf">[pdf]</a><pre id="PTPB21c" style="display: none;">
@inproceedings{PTPB21c,
title = {Securing {IoI}/{IIoT} from Software Attacks Targeting Hardware
Vulnerabilities},
author = {Polychronou, Nikolaos Foivos and Thevenon, Pierre-Henri and
Puys, Maxime and Beroulle, Vincent},
booktitle = {2021 19th {IEEE} International New Circuits and Systems
Conference ({NEWCAS}), Toulon, France, June 13-16, 2021 (Rank
Qualis B4)},
pages = {1--4},
year = {2021},
url = {https://maxime.puys.name/publications/pdf/PTPB21c.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PTM21">13</a>]
</td><td class="bibtexitem"><u>M. Puys</u>, P.-H. Thevenon, and S. Mocanu. <b>Hardware-in-the-loop labs for scada cybersecurity awareness and training.</b> <em>The 16th International Conference on Availability, Reliability and Security, ARES 2021, Vienna, Austria, August 17-20, 2021 (Rank Core B)</em>, pages 1--10, 2021 <a href="javascript:hideshow(document.getElementById('PTM21'))" name="PTM21">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PTM21.pdf">[pdf]</a><pre id="PTM21" style="display: none;">
@inproceedings{PTM21,
title = {Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training},
author = {Puys, Maxime and Thevenon, Pierre-Henri and Mocanu, St\'{e}phane},
booktitle = {The 16th International Conference on Availability, Reliability and Security,
{ARES} 2021, Vienna, Austria, August 17-20, 2021 (Rank Core B)},
pages = {1--10},
year = {2021},
url = {https://maxime.puys.name/publications/pdf/PTM21.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PKC20">12</a>]
</td><td class="bibtexitem"><u>M. Puys</u>, J.-P. Krimm, and R. Collado. <b>Towards cybersecurity act: A survey on iot evaluation frameworks.</b> <em>SECURWARE 2020-The Fourteenth International Conference on Emerging Security Information, Systems and Technologies (Rank Qualis B3)</em>, pages 69--74, 2020 <a href="javascript:hideshow(document.getElementById('PKC20'))" name="PKC20">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PKC20.pdf">[pdf]</a><pre id="PKC20" style="display: none;">
@inproceedings{PKC20,
title = {Towards Cybersecurity Act: A Survey on IoT Evaluation
Frameworks},
author = {Puys, Maxime and Krimm, Jean-Pierre and Collado, Rapha{\"e}l},
booktitle = {{SECURWARE} 2020-The Fourteenth International Conference on
Emerging Security Information, Systems and Technologies
(Rank Qualis B3)},
pages = {69--74},
year = {2020},
url = {https://maxime.puys.name/publications/pdf/PKC20.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="DLFLPP19">11</a>]
</td><td class="bibtexitem">J. Dumas, P. Lafourcade, J. López Fenner, D. Lucas, J. Orfila, C. Pernet, and <u>M. Puys</u>. <b>Secure multiparty matrix multiplication based on strassen-winograd algorithm.</b> <em>Advances in Information and Computer Security - 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings (Rank Core B)</em>, pages 67--88, 2019 <a href="javascript:hideshow(document.getElementById('DLFLPP19'))" name="DLFLPP19">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/DLFLPP19.pdf">[pdf]</a><pre id="DLFLPP19" style="display: none;">
@inproceedings{DLFLPP19,
author = {Dumas, Jean{-}Guillaume and
Lafourcade, Pascal and
L{\'{o}}pez Fenner, Julio and
Lucas, David and
Orfila, Jean{-}Baptiste and
Pernet, Cl{\'{e}}ment and
Puys, Maxime},
title = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd
Algorithm},
booktitle = {Advances in Information and Computer Security - 14th International
Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
Proceedings (Rank Core B)},
pages = {67--88},
year = {2019},
url = {https://maxime.puys.name/publications/pdf/DLFLPP19.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="BDDEOPPPRR17">10</a>]
</td><td class="bibtexitem">B. Badrignans, V. Danjean, J. Dumas, P. Elbaz-Vincent, S. Machenaud, J. Orfila, F. Pebay-Peyroula, F. Pebay-Peyroula, M. Potet, <u>M. Puys</u>, J. Richier, and R. Jean-Louis. <b>Security Architecture for Embedded Point-to-Points Splitting Protocols.</b> <em>WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security</em>, 2017 <a href="javascript:hideshow(document.getElementById('BDDEOPPPRR17'))" name="BDDEOPPPRR17">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/BDDEOPPPRR17.pdf">[pdf]</a><pre id="BDDEOPPPRR17" style="display: none;">
@inproceedings{BDDEOPPPRR17,
author = {Badrignans, Benoit and
Danjean, Vincent and
Dumas, Jean{-}Guillaume and
Elbaz{-}Vincent, Philippe and
Machenaud, Sabine and
Orfila, Jean{-}Baptiste and
Pebay{-}Peyroula, Florian and
Pebay{-}Peyroula, François and
Potet, Marie{-}Laure and
Puys, Maxime and
Richier, Jean{-}Luc and
Jean{-}Louis, Roch},
title = {{Security Architecture for Embedded Point-to-Points Splitting Protocols}},
booktitle = {{WCICSS 2017 - IEEE World Congress on Industrial Control Systems Security}},
year = {2017},
url = {https://maxime.puys.name/publications/pdf/BDDEOPPPRR17.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PPK17">9</a>]
</td><td class="bibtexitem"><u>M. Puys</u>, M. Potet, and A. Khaled. <b>Generation of applicative attacks scenarios against industrial systems.</b> <em>Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers</em>, pages 127--143, 2017 <a href="javascript:hideshow(document.getElementById('PPK17'))" name="PPK17">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PPK17.pdf">[pdf]</a><pre id="PPK17" style="display: none;">
@inproceedings{PPK17,
author = {Puys, Maxime and
Potet, Marie{-}Laure and
Khaled, Abdelaziz},
title = {Generation of Applicative Attacks Scenarios Against Industrial Systems},
booktitle = {Foundations and Practice of Security - 10th International Symposium,
{FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers},
pages = {127--143},
year = {2017},
url = {https://maxime.puys.name/publications/pdf/PPK17.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="DPPLR17">8</a>]
</td><td class="bibtexitem">J. Dreier, <u>M. Puys</u>, M. Potet, P. Lafourcade, and J. Roch. <b>Formally verifying flow integrity properties in industrial systems.</b> <em>Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE) 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017 (Rank Core B)</em>, pages 55--66, <b>Best Student Paper Award</b>, 2017 <a href="javascript:hideshow(document.getElementById('DPPLR17'))" name="DPPLR17">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/DPPLR17.pdf">[pdf]</a><pre id="DPPLR17" style="display: none;">
@inproceedings{DPPLR17,
author = {Dreier, Jannik and
Puys, Maxime and
Potet, Marie{-}Laure and
Lafourcade, Pascal and
Roch, Jean{-}Louis},
title = {Formally Verifying Flow Integrity Properties in Industrial Systems},
booktitle = {Proceedings of the 14th International Joint Conference on e-Business
and Telecommunications {(ICETE)} 2017) - Volume 4: SECRYPT, Madrid,
Spain, July 24-26, 2017 (Rank Core B)},
pages = {55--66},
year = {2017},
note = {Best Student Paper Award},
url = {https://maxime.puys.name/publications/pdf/DPPLR17.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PRP16">7</a>]
</td><td class="bibtexitem"><u>M. Puys</u>, J. Roch, and M. Potet. <b>Domain specific stateful filtering with worst-case bandwidth.</b> <em>Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Paris, France, October 10-12, 2016, Revised Selected Papers (Rank Core C)</em>, pages 321--327, 2016 <a href="javascript:hideshow(document.getElementById('PRP16'))" name="PRP16">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PRP16.pdf">[pdf]</a><pre id="PRP16" style="display: none;">
@inproceedings{PRP16,
author = {Puys, Maxime and
Roch, Jean{-}Louis and
Potet, Marie{-}Laure},
title = {Domain Specific Stateful Filtering with Worst{-}Case Bandwidth},
booktitle = {Critical Information Infrastructures Security - 11th International
Conference, {CRITIS} 2016, Paris, France, October 10-12, 2016, Revised
Selected Papers (Rank Core C)},
pages = {321--327},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PRP16.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PPL16">6</a>]
</td><td class="bibtexitem"><u>M. Puys</u>, M. Potet, and P. Lafourcade. <b>Formal analysis of security properties on the OPC-UA SCADA protocol.</b> <em>Computer Safety, Reliability, and Security - 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings (Rank Core B)</em>, pages 67--75, 2016 <a href="javascript:hideshow(document.getElementById('PPL16'))" name="PPL16">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PPL16.pdf">[pdf]</a><pre id="PPL16" style="display: none;">
@inproceedings{PPL16,
author = {Puys, Maxime and
Potet, Marie{-}Laure and
Lafourcade, Pascal},
title = {Formal Analysis of Security Properties on the {OPC-UA} {SCADA} Protocol},
booktitle = {Computer Safety, Reliability, and Security - 35th International Conference,
{SAFECOMP} 2016, Trondheim, Norway, September 21-23, 2016, Proceedings (Rank Core B)},
pages = {67--75},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PPL16.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="DLOP16">5</a>]
</td><td class="bibtexitem">J. Dumas, P. Lafourcade, J. Orfila, and <u>M. Puys</u>. <b>Private multi-party matrix multiplication and trust computations.</b> <em>Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016 (Rank Core B)</em>, pages 61--72, <b>Best Paper Award</b>, 2016 <a href="javascript:hideshow(document.getElementById('DLOP16'))" name="DLOP16">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/DLOP16.pdf">[pdf]</a><pre id="DLOP16" style="display: none;">
@inproceedings{DLOP16,
author = {Dumas, Jean{-}Guillaume and
Lafourcade, Pascal and
Orfila, Jean{-}Baptiste and
Puys, Maxime},
title = {Private Multi-party Matrix Multiplication and Trust Computations},
booktitle = {Proceedings of the 13th International Joint Conference on e-Business
and Telecommunications ({ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
Portugal, July 26-28, 2016 (Rank Core B)},
pages = {61--72},
year = {2016},
note = {Best Paper Award},
url = {https://maxime.puys.name/publications/pdf/DLOP16.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="LP15">4</a>]
</td><td class="bibtexitem">P. Lafourcade and <u>M. Puys</u>. <b>Performance evaluations of cryptographic protocols verification tools dealing with algebraic properties.</b> <em>Foundations and Practice of Security - 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers</em>, pages 137--155, 2015 <a href="javascript:hideshow(document.getElementById('LP15'))" name="LP15">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/LP15.pdf">[pdf]</a><pre id="LP15" style="display: none;">
@inproceedings{LP15,
author = {Lafourcade, Pascal and
Puys, Maxime},
title = {Performance Evaluations of Cryptographic Protocols Verification Tools
Dealing with Algebraic Properties},
booktitle = {Foundations and Practice of Security - 8th International Symposium,
{FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
Selected Papers},
pages = {137--155},
year = {2015},
url = {https://maxime.puys.name/publications/pdf/LP15.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="RPLBCP14">3</a>]
</td><td class="bibtexitem">L. Rivière, M. Potet, T. Le, J. Bringer, H. Chabanne, and <u>M. Puys</u>. <b>Combining high-level and low-level approaches to evaluate software implementations robustness against multiple fault injection attacks.</b> <em>Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers</em>, pages 92--111, 2014 <a href="javascript:hideshow(document.getElementById('RPLBCP14'))" name="RPLBCP14">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/RPLBCP14.pdf">[pdf]</a><pre id="RPLBCP14" style="display: none;">
@inproceedings{RPLBCP14,
author = {Rivi{\`{e}}re, Lionel and
Potet, Marie{-}Laure and
Le, Thanh{-}Ha and
Bringer, Julien and
Chabanne, Herv{\'{e}} and
Puys, Maxime},
title = {Combining High-Level and Low-Level Approaches to Evaluate Software
Implementations Robustness Against Multiple Fault Injection Attacks},
booktitle = {Foundations and Practice of Security - 7th International Symposium,
{FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
Papers},
pages = {92--111},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/RPLBCP14.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PRBL14">2</a>]
</td><td class="bibtexitem"><u>M. Puys</u>, L. Rivière, J. Bringer, and T. Le. <b>High-level simulation for multiple fault injection evaluation.</b> <em>Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers</em>, pages 293--308, 2014 <a href="javascript:hideshow(document.getElementById('PRBL14'))" name="PRBL14">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PRBL14.pdf">[pdf]</a><pre id="PRBL14" style="display: none;">
@inproceedings{PRBL14,
author = {Puys, Maxime and
Rivi{\`{e}}re, Lionel and
Bringer, Julien and
Le, Thanh{-}Ha},
title = {High-Level Simulation for Multiple Fault Injection Evaluation},
booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security
Assurance - 9th International Workshop, {DPM} 2014, 7th International
Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
pages = {293--308},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PRBL14.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PMPD14">1</a>]
</td><td class="bibtexitem">M. Potet, L. Mounier, <u>M. Puys</u>, and L. Dureuil. <b>Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections.</b> <em>Seventh IEEE International Conference on Software Testing, Verification and Validation, ICST 2014, March 31 2014-April 4, 2014, Cleveland, Ohio, USA (Core Rank A)</em>, pages 213--222, 2014 <a href="javascript:hideshow(document.getElementById('PMPD14'))" name="PMPD14">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PMPD14.pdf">[pdf]</a><pre id="PMPD14" style="display: none;">
@inproceedings{PMPD14,
author = {Potet, Marie{-}Laure and
Mounier, Laurent and
Puys, Maxime and
Dureuil, Louis},
title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of
Secured Codes against Control Flow Injections},
booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification
and Validation, {ICST} 2014, March 31 2014-April 4, 2014, Cleveland,
Ohio, {USA} (Core Rank A)},
pages = {213--222},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf}
}
</pre>
</td></tr></table><h3>French Peer-Reviewed Conferences with Proceedings</h3>
<table><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PT22">8</a>]
</td><td class="bibtexitem"><u>M. Puys</u> and P.-H. Thevenon. <b>PULSE - cybersécurité des systèmes industriels.</b> <em>Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2022, Chambon-sur-Lac, France</em>, 2022 <a href="javascript:hideshow(document.getElementById('PT22'))" name="PT22">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PT22.pdf">[pdf]</a><pre id="PT22" style="display: none;">
@inproceedings{PT22,
author = {Puys, Maxime and
Thevenon, Pierre-Henri},
title = {{PULSE} - Cybersécurité des systèmes industriels},
booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la
S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2022,
Chambon-sur-Lac, France}},
year = {2022},
url = {https://maxime.puys.name/publications/pdf/PT22.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="GPT20">7</a>]
</td><td class="bibtexitem">M. Gallissot, <u>M. Puys</u>, and P.-H. Thevenon. <b>Wonder-Cloud, une plateforme pour l’analyse et l’émulation de micrologiciels ainsi que la composition de pots de miels.</b> <em>C&esar 2020 - Deceptive Security, Rennes, France</em>, pages 1--8, 2020 <a href="javascript:hideshow(document.getElementById('GPT20'))" name="GPT20">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/GPT20.pdf">[pdf]</a><pre id="GPT20" style="display: none;">
@inproceedings{GPT20,
author = {Gallissot, Mathieu and Puys, Maxime and Thevenon, Pierre-Henri},
title = {{Wonder-Cloud, une plateforme pour l’analyse et l’{\'e}mulation
de micrologiciels ainsi que la composition de pots de miels}},
booktitle = {{C\&esar 2020 - Deceptive Security, Rennes, France}},
pages = {1--8},
year = {2020},
url = {https://maxime.puys.name/publications/pdf/GPT20.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="MPT19">6</a>]
</td><td class="bibtexitem">S. Mocanu, <u>M. Puys</u>, and P.-H. Thevenon. <b>An Open-Source Hardware-In-The-Loop Virtualization System for Cybersecurity Studies of SCADA Systems.</b> <em>C&esar 2019 - Virtualization and Cybersecurity, Rennes, France</em>, pages 1--16, 2019 <a href="javascript:hideshow(document.getElementById('MPT19'))" name="MPT19">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/MPT19.pdf">[pdf]</a><pre id="MPT19" style="display: none;">
@inproceedings{MPT19,
author = {Mocanu, St{\'e}phane and
Puys, Maxime and
Thevenon, Pierre-Henri},
title = {{An Open-Source Hardware-In-The-Loop Virtualization System for
Cybersecurity Studies of SCADA Systems}},
booktitle = {{C\&esar 2019 - Virtualization and Cybersecurity, Rennes, France}},
pages = {1-16},
year = {2019},
url = {https://maxime.puys.name/publications/pdf/MPT19.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PT19">5</a>]
</td><td class="bibtexitem"><u>M. Puys</u> and P.-H. Thevenon. <b>Les défis posés par la sécurisation de l'iot industriel.</b> <em>Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2019, Erquy, France</em>, 2019 <a href="javascript:hideshow(document.getElementById('PT19'))" name="PT19">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PT19.pdf">[pdf]</a><pre id="PT19" style="display: none;">
@inproceedings{PT19,
author = {Puys, Maxime and
Thevenon, Pierre-Henri},
title = {Les d{\'e}fis pos{\'e}s par la s{\'e}curisation de l'IoT industriel},
booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la
S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2019,
Erquy, France}},
year = {2019},
url = {https://maxime.puys.name/publications/pdf/PT19.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PPR16b">4</a>]
</td><td class="bibtexitem"><u>M. Puys</u>, M. Potet, and J. Roch. <b>Filtrage et vérification de flux métiers dans les systèmes industriels.</b> <em>Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, RESSI 2016, Toulouse, France</em>, 2016 <a href="javascript:hideshow(document.getElementById('PPR16b'))" name="PPR16b">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PPR16b.pdf">[pdf]</a><pre id="PPR16b" style="display: none;">
@inproceedings{PPR16b,
author = {Puys, Maxime and
Potet, Marie{-}Laure and
Roch, Jean{-}Louis},
title = {Filtrage et v{\'e}rification de flux m{\'e}tiers dans les
syst{\`e}mes industriels},
booktitle = {{Rendez-Vous de la Recherche et de l'Enseignement de la
S{\'e}curit{\'e} des Syst{\`e}mes d'Information, RESSI 2016,
Toulouse, France}},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PPR16b.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PPR16a">3</a>]
</td><td class="bibtexitem"><u>M. Puys</u>, M. Potet, and J. Roch. <b>Génération systématique de scénarios d'attaques contre des systèmes industriels.</b> <em>Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL 2016, Besançon, France</em>, 2016 <a href="javascript:hideshow(document.getElementById('PPR16a'))" name="PPR16a">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PPR16a.pdf">[pdf]</a><pre id="PPR16a" style="display: none;">
@inproceedings{PPR16a,
author = {Puys, Maxime and
Potet, Marie{-}Laure and
Roch, Jean{-}Louis},
title = {G{\'e}n{\'e}ration syst{\'e}matique de sc{\'e}narios d'attaques
contre des syst{\`e}mes industriels},
booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de
Logiciels, AFADL 2016, Besan{\c c}on, France}},
year = {2016},
url = {https://maxime.puys.name/publications/pdf/PPR16a.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PMPD14b">2</a>]
</td><td class="bibtexitem">M. Potet, L. Mounier, <u>M. Puys</u>, and L. Dureuil. <b>Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections.</b> <em>1er Colloque sur la Confiance Numérique en Auvergne, Clermont-Ferrand, France</em>, 2014 <a href="javascript:hideshow(document.getElementById('PMPD14b'))" name="PMPD14b">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PMPD14.pdf">[pdf]</a><pre id="PMPD14b" style="display: none;">
@inproceedings{PMPD14b,
author = {Potet, Marie{-}Laure and
Mounier, Laurent and
Puys, Maxime and
Dureuil, Louis},
title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of
Secured Codes against Control Flow Injections},
booktitle = {{1er Colloque sur la Confiance Num{\'e}rique en Auvergne,
Clermont-Ferrand, France}},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="PMPD14a">1</a>]
</td><td class="bibtexitem">M. Potet, L. Mounier, <u>M. Puys</u>, and L. Dureuil. <b>Lazart: A symbolic approach for evaluation the robustness of secured codes against control flow injections.</b> <em>Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL 2014, Paris, France</em>, 2014 <a href="javascript:hideshow(document.getElementById('PMPD14a'))" name="PMPD14a">[bib]</a> <a href="https://maxime.puys.name/publications/pdf/PMPD14.pdf">[pdf]</a><pre id="PMPD14a" style="display: none;">
@inproceedings{PMPD14a,
author = {Potet, Marie{-}Laure and
Mounier, Laurent and
Puys, Maxime and
Dureuil, Louis},
title = {Lazart: {A} Symbolic Approach for Evaluation the Robustness of
Secured Codes against Control Flow Injections},
booktitle = {{Approches Formelles dans l'Assistance au D{\'e}veloppement de
Logiciels, AFADL 2014, Paris, France}},
year = {2014},
url = {https://maxime.puys.name/publications/pdf/PMPD14.pdf}
}
</pre>
</td></tr></table><h3>Patents</h3>
<table><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="dasilva2024method">2</a>]
</td><td class="bibtexitem">M. Da Silva, P.-H. Thevenon, <u>M. Puys</u>, and S. Mocanu. <b>Method and device for identifying risks of cyberattacks</b>, Jun 2024 <a href="javascript:hideshow(document.getElementById('dasilva2024method'))" name="dasilva2024method">[bib]</a><pre id="dasilva2024method" style="display: none;">
@misc{dasilva2024method,
title = {Method and device for identifying risks of cyberattacks},
author = {Da Silva, Mike and Thevenon, Pierre-Henri and Puys, Maxime and Mocanu, St{\'e}phane},
year = {2024},
month = {Jun},
publisher = {US Patent App. 18/534,970}
}
</pre>
</td></tr><tr valign="top">
<td align="right" class="bibtexnumber">
[<a name="polychronou2023system">1</a>]
</td><td class="bibtexitem">N. Polychronou, P.-H. Thevenon, <u>M. Puys</u>, and V. Beroulle. <b>System for detecting malwares in a resources constrained device</b>, Aug 2023 <a href="javascript:hideshow(document.getElementById('polychronou2023system'))" name="polychronou2023system">[bib]</a><pre id="polychronou2023system" style="display: none;">
@misc{polychronou2023system,
title = {System for detecting malwares in a resources constrained device},
author = {Polychronou, Nikolaos and Thevenon, Pierre-Henri and Puys, Maxime and Beroulle, Vincent},
year = {2023},
month = {Aug},
publisher = {US Patent App. 18/109,815}
}
</pre>
</td></tr></table>
</div>
</div>
</article>
<footer>
<p>
© 2024 - This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by-sa/4.0/deed.en_US" target="_blank">Creative Commons Attribution-ShareAlike 4.0 International License</a>
</p>
<p>
Built with <a href="http://getpelican.com" target="_blank">Pelican</a> using <a href="http://bit.ly/flex-pelican" target="_blank">Flex</a> theme
<span class="footer-separator">|</span>
Switch to the <a href="javascript:void(0)" onclick="theme.switch(`dark`)">dark</a> | <a href="javascript:void(0)" onclick="theme.switch(`light`)">light</a> | <a href="javascript:void(0)" onclick="theme.switch(`browser`)">browser</a> theme
<script id="dark-theme-script"
src="https://maxime.puys.name/theme/dark-theme/dark-theme.min.js"
data-enable-auto-detect-theme="True"
data-default-theme="light"
type="text/javascript">
</script>
</p><p>
<a rel="license"
href="http://creativecommons.org/licenses/by-sa/4.0/"
target="_blank">
<img alt="Creative Commons License"
title="Creative Commons License"
style="border-width:0"
src="https://i.creativecommons.org/l/by-sa/4.0/80x15.png"
width="80"
height="15"/>
</a>
</p> </footer>
</main>
<script type="text/javascript" src="//s7.addthis.com/js/300/addthis_widget.js#pubid=ra-55adbb025d4f7e55" async="async"></script>
<script type="application/ld+json">
{
"@context" : "http://schema.org",
"@type" : "Blog",
"name": " Maxime Puys ",
"url" : "https://maxime.puys.name",
"image": "https://maxime.puys.name/images/profile.png",
"description": "Maxime Puys, Associate Professor"
}
</script>
<script src="js/jquery.min.js"></script>
<script src="js/jquery.scrolly.min.js"></script>
<script src="js/jquery.scrollzer.min.js"></script>
<script src="js/publications.js"></script>
<!--<script src="js/enforce-tls.js"></script>-->
<script src="js/main.js"></script>
</body>
</html>