An abstract stack based approach to verified compositional compilation to machine code Y Wang, P Wilke, Z Shao Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019 | 40 | 2019 |
A precise and abstract memory model for C using symbolic values F Besson, S Blazy, P Wilke Asian Symposium on Programming Languages and Systems, 449-468, 2014 | 39 | 2014 |
CompCertS: A Memory-Aware Verified C Compiler Using a Pointer as Integer Semantics F Besson, S Blazy, P Wilke Journal of Automated Reasoning 63, 369-392, 2019 | 37 | 2019 |
A concrete memory model for CompCert F Besson, S Blazy, P Wilke Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing …, 2015 | 32 | 2015 |
Compiling sandboxes: Formally verified software fault isolation F Besson, S Blazy, A Dang, T Jensen, P Wilke Programming Languages and Systems: 28th European Symposium on Programming …, 2019 | 16 | 2019 |
CompCertELF: verified separate compilation of C programs into ELF object files Y Wang, X Xu, P Wilke, Z Shao Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-28, 2020 | 14 | 2020 |
A verified CompCert front-end for a memory model supporting pointer arithmetic and uninitialised data F Besson, S Blazy, P Wilke Journal of Automated Reasoning 62 (4), 433-480, 2019 | 14 | 2019 |
Debiasing android malware datasets: How can i trust your results if your dataset is biased? TC Miranda, PF Gimenez, JF Lalande, VVT Tong, P Wilke IEEE Transactions on Information Forensics and Security 17, 2182-2197, 2022 | 10 | 2022 |
Abusing android runtime for application obfuscation P Graux, JF Lalande, P Wilke, VVT Tong 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020 | 6 | 2020 |
Isolating malicious code in Android malware in the wild VVT Tong, C Herzog, TC Miranda, P Graux, JF Lalande, P Wilke MALCON 2019-14th International Conference on Malicious and Unwanted Software, 2019 | 4 | 2019 |
A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity M Baty, P Wilke, G Hiet, A Fontaine, A Trieu 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 372-387, 2023 | 3 | 2023 |
Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections N Gaudin, JL Hatchikian-Houdot, F Besson, P Cotret, G Gogniat, G Hiet, ... 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023 | 1 | 2023 |
DaViz: Visualization for Android Malware Datasets TC Miranda, JF Lalande, VVT Tong, P Wilke RESSI 2022-Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité …, 2022 | 1 | 2022 |
Preventing serialization vulnerabilities through transient field detection P Graux, JF Lalande, VVT Tong, P Wilke Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1598-1606, 2021 | 1 | 2021 |
Formally verified compilation of low-level C code P Wilke Université de Rennes, 2016 | 1 | 2016 |
OATs’inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications P Graux, JF Lalande, V Viet Triem Tong, P Wilke Digital Threats: Research and Practice 4 (2), 1-27, 2023 | | 2023 |
OATs’inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications P Graux, JF Lalande, V Viet Triem Tong, P Wilke Digital Threats: Research and Practice 4 (2), 1-27, 2023 | | 2023 |
Malware Windows Evasifs: Impact sur les Antivirus et Possible Contre-mesure C Herzog, VVT Tong, P Wilke, JL Lanet C&ESAR 2020-Computer & Electronics Security Applications Rendez-vous, 2020 | | 2020 |
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures C Herzog, VVT Tong, P Wilke, A Van Straaten, JL Lanet arXiv preprint arXiv:2009.12204, 2020 | | 2020 |
Compilation formellement vérifiée de code C de bas-niveau P Wilke Rennes 1, 2016 | | 2016 |