Maxime Puys

Orcid: 0000-0001-6127-9816

According to our database1, Maxime Puys authored at least 25 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles.
Proceedings of the Information Security - 27th International Conference, 2024

2023
A Hybrid Solution for Constrained Devices to Detect Microarchitectural Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Automated ICS template for STRIDE Microsoft Threat Modeling Tool.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

PLC Logic-Based Cybersecurity Risks Identification for ICS.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

An Introduction to Tools for Formal Analysis of Cryptographic Protocols.
Proceedings of the Handbook of Formal Analysis and Verification in Cryptography, 2023

2022
A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms.
ACM Trans. Design Autom. Electr. Syst., 2022

SCADA Cybersecurity Awareness and Teaching with Hardware-In-The-Loop Platforms.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems.
J. Internet Serv. Inf. Secur., 2022

Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.
Proceedings of the Secure IT Systems, 2022

2021
Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities.
Proceedings of the 19th IEEE International New Circuits and Systems Conference, 2021

MaDMAN: Detection of Software Attacks Targeting Hardware Vulnerabilities.
Proceedings of the 24th Euromicro Conference on Digital System Design, 2021

Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2019
Formally and practically verifying flow properties in industrial systems.
Comput. Secur., 2019

Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm.
Proceedings of the Advances in Information and Computer Security, 2019

2018
Sécurité des systèmes industriels : filtrage applicatif et recherche de scénarios d'attaques. (Cybersecurity of Industrial Systems : Applicative Filtering and Generation of Attack Scenarios).
PhD thesis, 2018

2017
Dual protocols for private multi-party matrix multiplication and trust computations.
Comput. Secur., 2017

Formally Verifying Flow Properties in Industrial Systems.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Generation of Applicative Attacks Scenarios Against Industrial Systems.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
Private Multi-party Matrix Multiplication and Trust Computations.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Formal Analysis of Security Properties on the OPC-UA SCADA Protocol.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Domain Specific Stateful Filtering with Worst-Case Bandwidth.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

2014
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection Attacks.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

High-Level Simulation for Multiple Fault Injection Evaluation.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014


  Loading...