Laurent Mounier

Orcid: 0000-0001-9925-098X

According to our database1, Laurent Mounier authored at least 77 papers between 1990 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Function Synthesis for Maximizing Model Counting.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2024

2023
[artifact50] Function synthesis for maximising model counting.
Dataset, September, 2023

[artifact50] Function synthesis for maximising model counting.
Dataset, September, 2023

A tool assisted methodology to harden programs against multi-faults injections.
CoRR, 2023

A Compositional Methodology to Harden Programs Against Multi-Fault Attacks.
Proceedings of the Workshop on Fault Detection and Tolerance in Cryptography, 2023

2022
BaxMC: a CEGAR approach to Max#SAT.
Proceedings of the 22nd Formal Methods in Computer-Aided Design, 2022

2021
Output-sensitive Information flow analysis.
Log. Methods Comput. Sci., 2021

RUSTInA: Automatically Checking and Patching Inline Assembly Interface Compliance (Artifact Evaluation): Accepted submission #992 - "Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine".
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
Countermeasures Optimization in Multiple Fault-Injection Context.
Proceedings of the 17th Workshop on Fault Detection and Tolerance in Cryptography, 2020

2019
Get rid of inline assembly through trustable verification-oriented lifting.
CoRR, 2019

Get Rid of Inline Assembly through Verification-Oriented Lifting.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

2018
Compositional Verification in Action.
Proceedings of the Formal Methods for Industrial Critical Systems, 2018

2017
scat: Learning from a single execution of a binary.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Metrics for runtime detection of allocators in binaries.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

2016
BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information.
Proceedings of the Software Engineering and Formal Methods - 14th International Conference, 2016

Specification of concretization and symbolization policies in symbolic execution.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Toward Large-Scale Vulnerability Discovery using Machine Learning.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
Lightweight heuristics to retrieve parameter associations from binaries.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2014
Statically detecting use after free on binary code.
J. Comput. Virol. Hacking Tech., 2014

Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

On the Expressiveness of some Runtime Validation Techniques.
Proceedings of the HOWARD-60: A Festschrift on the Occasion of Howard Barringer's 60th Birthday, 2014

LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Synchronous programming of device drivers for global resource control in embedded operating systems.
ACM Trans. Embed. Comput. Syst., 2013

Combining Static and Dynamic Analysis for Vulnerability Detection
CoRR, 2013

A Stack Model for Symbolic Buffer Overflow Exploitability Analysis.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Predictive Taint Analysis for Extended Testing of Parallel Executions.
Proceedings of the Hardware and Software: Verification and Testing, 2013

2012
Politiques de gestion de protections pour l'implémentation de sections critiques.
Tech. Sci. Informatiques, 2012

What can you verify and enforce at runtime?
Int. J. Softw. Tools Technol. Transf., 2012

More testable properties.
Int. J. Softw. Tools Technol. Transf., 2012

Finding Buffer Overflow Inducing Loops in Binary Executables.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Dynamic Information-Flow Analysis for Multi-threaded Applications.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012

A Taint Based Approach for Smart Fuzzing.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

2011
Runtime enforcement monitors: composition, synthesis, and enforcement abilities.
Formal Methods Syst. Des., 2011

Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Finding Software Vulnerabilities by Smart Fuzzing.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

2010
Taint Dependency Sequences: A Characterization of Insecure Execution Paths Based on Input-Sensitive Cause Sequences.
Proceedings of the Third International Conference on Software Testing, 2010

2009
Enforcement monitoring wrt. the safety-progress classification of properties.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Runtime Verification of Safety-Progress Properties.
Proceedings of the Runtime Verification, 9th International Workshop, 2009

2008
j-POST: a Java Toolchain for Property-Oriented Software Testing.
Proceedings of the Fourth Workshop on Model Based Testing, 2008

Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties.
Proceedings of the Information Systems Security, 4th International Conference, 2008

2007
The ARESA Project: Facilitating Research, Development and Commercialization of WSNs.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

A Compositional Testing Framework Driven by Partial Specifications.
Proceedings of the Testing of Software and Communicating Systems, 2007

Worst-case lifetime computation of a wireless sensor network by model-checking.
Proceedings of the 4th ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2007

Using BIP for Modeling and Verification of Networked Systems -- A Case Study on TinyOS-based Networks.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Test Generation from Security Policies Specified in Or-BAC.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Test Generation for Network Security Rules.
Proceedings of the Testing of Communicating Systems, 2006

Confirmation of deadlock potentials detected by runtime analysis.
Proceedings of the 4th Workshop on Parallel and Distributed Systems: Testing, 2006

GLONEMO: global and accurate formal models for the analysis of ad-hoc sensor networks.
Proceedings of the First International Conference in Integrated Internet Ad Hoc and Sensor Networks, 2006

A Test Calculus Framework Applied to Network Security Policies.
Proceedings of the Formal Approaches to Software Testing and Runtime Verification, 2006

2005
A Model-Based Approach for Robustness Testing.
Proceedings of the Testing of Communicating Systems, 2005

2004
IF Validation Environment Tutorial.
Proceedings of the Model Checking Software, 2004

2003
Validation of asynchronous circuit specifications using IF/CADP.
Proceedings of the IFIP VLSI-SoC 2003, 2003

Property Oriented Test Case Generation.
Proceedings of the Formal Approaches to Software Testing, 2003

2002
IF-2.0: A Validation Environment for Component-Based Real-Time Systems.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
Automated validation of distributed software using the IF environment.
Proceedings of the Workshop on Software Model Checking 2001, 2001

Timed Extensions for SDL.
Proceedings of the SDL 2001: Meeting UML, 2001

2000
Verification and test generation for the SSCOP protocol.
Sci. Comput. Program., 2000

Compositional State Space Generation with Partial Order Reductions for Asynchronous Communicating Systems.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 2000

SDL for Real-Time: What is Missing?
Proceedings of the SAM 2000, 2000

IF: A Validation Environment for Timed Asynchronous Systems.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000

1999
IF: An intermediate representation for SDL and its applications.
Proceedings of the SDL '99 The Next Millennium, 1999

IF: An Intermediate Representation and Validation Environment for Timed Asynchronous Systems.
Proceedings of the FM'99 - Formal Methods, 1999

1997
Protocol Verification with the ALDÉBARAN Toolset.
Int. J. Softw. Tools Technol. Transf., 1997

Specification and Verification of Various Distributed Leader Election Algorithms for Unidirectional Ring Networks.
Sci. Comput. Program., 1997

Compositional State Space Generation from Lotos Programs.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1997

1996
Specification and Verification of the PowerScale<sup>TM</sup> Bus Arbitration Protocol: An Industrial Experiment with LOTOS.
Proceedings of the Formal Description Techniques IX: Theory, 1996

CADP - A Protocol Validation and Verification Toolbox.
Proceedings of the Computer Aided Verification, 8th International Conference, 1996

1993
Symbolic Equivalence Checking.
Proceedings of the Computer Aided Verification, 5th International Conference, 1993

1992
Méthodes de vérification de spécifications comportementales : étude et mise en œuvre. (Verification methods for behavioural specifications).
PhD thesis, 1992

On-the-fly Verification of Finite Transition Systems.
Formal Methods Syst. Des., 1992

A Toolbox for the Verification of LOTOS Programs.
Proceedings of the 14th International Conference on Software Engineering, 1992

1991
A Tool Set for deciding Behavioral Equivalences.
Proceedings of the CONCUR '91, 1991

"On the Fly" Verification of Behavioural Equivalences and Preorders.
Proceedings of the Computer Aided Verification, 3rd International Workshop, 1991

1990
Verifying Bisimulations "On the Fly".
Proceedings of the Formal Description Techniques, 1990


  Loading...