


default search action
Marie-Laure Potet
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c47]Basile Pesin
, Sylvain Boulmé
, David Monniaux
, Marie-Laure Potet
:
Formally Verified Hardening of C Programs against Hardware Fault Injection. CPP 2025: 140-155 - 2024
- [j10]Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet:
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities. J. Cryptogr. Eng. 14(1): 147-164 (2024) - 2023
- [j9]Vincent Werner, Laurent Maingault, Marie-Laure Potet:
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers. J. Cryptogr. Eng. 13(2): 149-165 (2023) - [c46]Soline Ducousso, Sébastien Bardin, Marie-Laure Potet:
Adversarial Reachability for Program-level Security Analysis. ESOP 2023: 59-89 - [c45]Etienne Boespflug, Laurent Mounier, Marie-Laure Potet, Abderrahmane Bouguern:
A Compositional Methodology to Harden Programs Against Multi-Fault Attacks. FDTC 2023: 24-35 - [i11]Etienne Boespflug, Abderrahmane Bouguern, Laurent Mounier, Marie-Laure Potet:
A tool assisted methodology to harden programs against multi-faults injections. CoRR abs/2303.01885 (2023) - [i10]Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet:
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities. CoRR abs/2303.03999 (2023) - 2022
- [c44]Thomas Vigouroux, Cristian Ene, David Monniaux, Laurent Mounier, Marie-Laure Potet:
BaxMC: a CEGAR approach to Max#SAT. FMCAD 2022: 170-178 - [i9]Thomas Vigouroux, Cristian Ene, David Monniaux, Laurent Mounier, Marie-Laure Potet:
BAXMC: a CEGAR approach to Max\#SAT. CoRR abs/2211.00973 (2022) - 2021
- [j8]Cristian Ene, Laurent Mounier, Marie-Laure Potet:
Output-sensitive Information flow analysis. Log. Methods Comput. Sci. 17(1) (2021) - [c43]Vincent Werner, Laurent Maingault
, Marie-Laure Potet:
Fast Calibration of Fault Injection Equipment with Hyperparameter Optimization Techniques. CARDIS 2021: 121-138 - [c42]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet:
RUSTInA: Automatically Checking and Patching Inline Assembly Interface Compliance (Artifact Evaluation): Accepted submission #992 - "Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine". ICSE (Companion Volume) 2021: 201-202 - [c41]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet:
Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine. ICSE 2021: 1236-1247 - [i8]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet:
Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine. CoRR abs/2102.07485 (2021) - 2020
- [c40]Vincent Werner, Laurent Maingault
, Marie-Laure Potet:
An End-to-End Approach for Multi-Fault Attack Vulnerability Assessment. FDTC 2020: 10-17 - [c39]Etienne Boespflug, Cristian Ene, Laurent Mounier, Marie-Laure Potet:
Countermeasures Optimization in Multiple Fault-Injection Context. FDTC 2020: 26-34
2010 – 2019
- 2019
- [j7]Jannik Dreier
, Maxime Puys
, Marie-Laure Potet, Pascal Lafourcade
, Jean-Louis Roch:
Formally and practically verifying flow properties in industrial systems. Comput. Secur. 86: 453-470 (2019) - [c38]Mohamad Kaouk, Jean-Marie Flaus, Marie-Laure Potet, Roland Groz:
A Review of Intrusion Detection Systems for Industrial Control Systems. CoDIT 2019: 1699-1704 - [c37]Cristian Ene
, Laurent Mounier
, Marie-Laure Potet
:
Output-Sensitive Information Flow Analysis. FORTE 2019: 93-110 - [c36]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Laurent Mounier, Marie-Laure Potet:
Get Rid of Inline Assembly through Verification-Oriented Lifting. ASE 2019: 577-589 - [i7]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Laurent Mounier, Marie-Laure Potet:
Get rid of inline assembly through trustable verification-oriented lifting. CoRR abs/1903.06407 (2019) - [i6]Cristian Ene, Laurent Mounier, Marie-Laure Potet:
Output-sensitive Information flow analysis. CoRR abs/1909.09567 (2019) - 2018
- [c35]Benjamin Farinier, Sébastien Bardin, Richard Bonichon, Marie-Laure Potet:
Model Generation for Quantified Formulas: A Taint-Based Approach. CAV (2) 2018: 294-313 - [c34]Jonathan Salwan, Sébastien Bardin, Marie-Laure Potet:
Symbolic Deobfuscation: From Virtualized Code Back to the Original. DIMVA 2018: 372-392 - [i5]Benjamin Farinier, Sébastien Bardin, Richard Bonichon, Marie-Laure Potet:
Model Generation for Quantified Formulas: A Taint-Based Approach. CoRR abs/1802.05616 (2018) - 2017
- [c33]Maxime Puys
, Marie-Laure Potet, Abdelaziz Khaled:
Generation of Applicative Attacks Scenarios Against Industrial Systems. FPS 2017: 127-143 - [c32]Jannik Dreier, Maxime Puys
, Marie-Laure Potet, Pascal Lafourcade
, Jean-Louis Roch:
Formally Verifying Flow Properties in Industrial Systems. SECRYPT 2017: 55-66 - 2016
- [c31]Josselin Feist, Laurent Mounier, Sébastien Bardin, Robin David, Marie-Laure Potet:
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free. SSPREW@ACSAC 2016: 2:1-2:12 - [c30]Maxime Puys
, Jean-Louis Roch, Marie-Laure Potet:
Domain Specific Stateful Filtering with Worst-Case Bandwidth. CRITIS 2016: 321-327 - [c29]Robin David, Sébastien Bardin, Josselin Feist, Laurent Mounier, Marie-Laure Potet, Thanh Dinh Ta, Jean-Yves Marion:
Specification of concretization and symbolization policies in symbolic execution. ISSTA 2016: 36-46 - [c28]Louis Dureuil, Guillaume Petiot, Marie-Laure Potet, Thanh-Ha Le, Aude Crohen, Philippe de Choudens:
FISSC: A Fault Injection and Simulation Secure Collection. SAFECOMP 2016: 3-11 - [c27]Maxime Puys
, Marie-Laure Potet, Pascal Lafourcade
:
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. SAFECOMP 2016: 67-75 - [c26]Josselin Feist, Laurent Mounier, Marie-Laure Potet:
Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information. SEFM 2016: 76-81 - [c25]Robin David, Sébastien Bardin, Thanh Dinh Ta, Laurent Mounier, Josselin Feist, Marie-Laure Potet, Jean-Yves Marion:
BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis. SANER 2016: 653-656 - 2015
- [c24]Louis Dureuil, Marie-Laure Potet, Philippe de Choudens, Cécile Dumas
, Jessy Clédière
:
From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference. CARDIS 2015: 107-124 - 2014
- [j6]Gregor Gößler, Daniel Le Métayer, Eduardo Mazza, Marie-Laure Potet, Lacramioara Astefanoaei:
Apport des méthodes formelles pour l'exploitation de logs informatiques dans un contexte contractuel. Tech. Sci. Informatiques 33(1-2): 63-84 (2014) - [j5]Josselin Feist, Laurent Mounier, Marie-Laure Potet:
Statically detecting use after free on binary code. J. Comput. Virol. Hacking Tech. 10(3): 211-217 (2014) - [c23]Sanjay Rawat, Laurent Mounier, Marie-Laure Potet:
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis. ARES 2014: 498-505 - [c22]Lionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne
, Maxime Puys
:
Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks. FPS 2014: 92-111 - [c21]Marie-Laure Potet, Laurent Mounier, Maxime Puys
, Louis Dureuil:
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections. ICST 2014: 213-222 - 2013
- [c20]Gustavo Grieco, Laurent Mounier, Marie-Laure Potet, Sanjay Rawat:
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. ICST Workshops 2013: 216-217 - [i4]Sanjay Rawat, Dumitru Ceara, Laurent Mounier, Marie-Laure Potet:
Combining Static and Dynamic Analysis for Vulnerability Detection. CoRR abs/1305.3883 (2013) - 2011
- [j4]Daniel Le Métayer, Manuel Maarek
, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin:
Liability issues in software engineering: the use of formal methods to reduce legal uncertainties. Commun. ACM 54(4): 99-106 (2011) - [c19]Marie-Laure Potet, Helen Treharne:
Preface. B@FM 2011: 1-2 - [e1]Marie-Laure Potet, Helen Treharne:
Proceedings of the B 2011 Workshop, a satellite event of the 17th International Symposium on Formal Methods, FM 2011, Limerick, Ireland, June 21, 2011. Electronic Notes in Theoretical Computer Science 280, Elsevier 2011 [contents] - 2010
- [c18]Daniel Le Métayer, Manuel Maarek
, Valérie Viet Triem Tong, Eduardo Mazza, Marie-Laure Potet, Nicolas Craipeau, Stéphane Frénot, Ronan Hardouin:
Liability in software engineering: overview of the LISE approach and illustration on a case study. ICSE (1) 2010: 135-144 - [c17]Dumitru Ceara, Laurent Mounier, Marie-Laure Potet:
Taint Dependency Sequences: A Characterization of Insecure Execution Paths Based on Input-Sensitive Cause Sequences. ICST Workshops 2010: 371-380 - [c16]Eduardo Mazza, Marie-Laure Potet, Daniel Le Métayer:
A Formal Framework for Specifying and Analyzing Logs as Electronic Evidence. SBMF 2010: 194-209 - [c15]Daniel Le Métayer, Eduardo Mazza, Marie-Laure Potet:
Designing Log Architectures for Legal Evidence. SEFM 2010: 156-165 - [i3]Nicolas Stouls
, Marie-Laure Potet:
Security Policy Enforcement Through Refinement Process. CoRR abs/1004.1460 (2010) - [i2]Didier Bert, Marie-Laure Potet, Nicolas Stouls
:
GeneSyst: a Tool to Reason about Behavioral Aspects of B Event Specifications. Application to Security Properties. CoRR abs/1004.1472 (2010) - [i1]Xavier Morselli, Marie-Laure Potet, Nicolas Stouls
:
GénéSyst : Génération d'un système de transitions étiquetées à partir d'une spécification B événementiel. CoRR abs/1004.2178 (2010)
2000 – 2009
- 2009
- [c14]Sylvain Boulmé, Marie-Laure Potet:
Relaxing Restrictions on Invariant Composition in the B Method by Ownership Control a laSpec#. Rigorous Methods for Software Construction and Analysis 2009: 1-16 - 2008
- [c13]Frédéric Dadeau, Julien Lamboley, Thierry Moutet, Marie-Laure Potet:
A Verifiable Conformance Relationship between Smart Card Applets and B Security Models. ABZ 2008: 237-250 - [c12]Frédéric Dadeau, Marie-Laure Potet, Régis Tissot:
A B Formal Framework for Security Developments in the Domain of Smart Card Applications. SEC 2008: 141-155 - 2007
- [c11]Sylvain Boulmé, Marie-Laure Potet:
Interpreting Invariant Composition in the B Method Using the Spec# Ownership Relation: A Way to Explain and Relax B Restrictions. B 2007: 4-18 - [c10]Nicolas Stouls, Marie-Laure Potet:
Security Policy Enforcement Through Refinement Process. B 2007: 216-231 - 2005
- [c9]Didier Bert, Marie-Laure Potet, Nicolas Stouls:
GeneSyst: A Tool to Reason About Behavioral Aspects of B Event Specifications. Application to Security Properties. ZB 2005: 299-318 - 2004
- [j3]Frédéric Badeau, Didier Bert, Sylvain Boulmé, Christophe Métayer, Marie-Laure Potet, Nicolas Stouls
, Laurent Voisin:
Adaptabilité et validation de la traduction de B vers C. Points de vue et résultats du projet BOM. Tech. Sci. Informatiques 23(7): 879-903 (2004) - [j2]Pierre Bontron, Marie-Laure Potet:
Stratégie de couverture de test à un haut niveau d'abstraction. Tech. Sci. Informatiques 23(7): 905-928 (2004) - 2003
- [j1]Marie-Laure Potet:
Spécifications et développements structurés dans la méthode B. Tech. Sci. Informatiques 22(1): 61-88 (2003) - [c8]Didier Bert, Sylvain Boulmé, Marie-Laure Potet, Antoine Requet, Laurent Voisin:
Adaptable Translator of B Specifications to Embedded C Programs. FME 2003: 94-113 - 2002
- [b2]Marie-Laure Potet:
Spécifications et développements formels : Etude des aspects compositionnels dans la méthode B. (Formal specifications and developments: a study of compositional aspects in the B-method). Grenoble Institute of Technology, France, 2002 - 2001
- [c7]Yves Ledru, Lydie du Bousquet, Pierre Bontron, Olivier Maury, Catherine Oriat, Marie-Laure Potet:
Test Purposes: Adapting the Notion of Specification to Testing. ASE 2001: 127-134 - 2000
- [c6]Pierre Bontron, Marie-Laure Potet:
Automatic Construction of Validated B Components from Structured Developments. ZB 2000: 127-147
1990 – 1999
- 1998
- [c5]Marie-Laure Potet, Yann Rouzaud:
Composition and Refinement in the B-Method. B 1998: 46-65 - 1995
- [c4]Yves Ledru, Marie-Laure Potet:
A VDM Specification of the Steam-Boiler Problem. Formal Methods for Industrial Applications 1995: 283-317 - 1991
- [c3]Rachid Echahed, Paul Jacquet, Marie-Laure Potet, Sadik Sebbar:
Equational Reasonning and the Completion Procedure. A Comparative Study in Program Transformation. JTASPEFT/WSA 1991: 53-61
1980 – 1989
- 1988
- [b1]Marie-Laure Potet:
Preuves et stratégies pour la synthèse déductive de programmes. (Proofs and strategies for deductive program synthesis). Grenoble Institute of Technology, France, 1988 - 1986
- [c2]Paul Jacquet, Marie-Laure Potet:
Program Synthesis = Proof Method + Knowledge (Example about Recursive Function Synthesis). ECAI 1986: 345-356 - 1984
- [c1]Ramon Brena, Ricardo Caferra, Bertram Fronhöfer, Christian Gresse, Philippe Jacquet, Marie-Laure Potet:
Program Synthesis Through Problem Splitting: A Method for Subproblem Characterization. AIMSA 1984: 113-120
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint