Follow
Pierre WILKE
Title
Cited by
Cited by
Year
An abstract stack based approach to verified compositional compilation to machine code
Y Wang, P Wilke, Z Shao
Proceedings of the ACM on Programming Languages 3 (POPL), 1-30, 2019
392019
A precise and abstract memory model for C using symbolic values
F Besson, S Blazy, P Wilke
Asian Symposium on Programming Languages and Systems, 449-468, 2014
392014
CompCertS: A Memory-Aware Verified C Compiler Using a Pointer as Integer Semantics
F Besson, S Blazy, P Wilke
Journal of Automated Reasoning 63, 369-392, 2019
372019
A concrete memory model for CompCert
F Besson, S Blazy, P Wilke
Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing …, 2015
322015
Compiling sandboxes: Formally verified software fault isolation
F Besson, S Blazy, A Dang, T Jensen, P Wilke
Programming Languages and Systems: 28th European Symposium on Programming …, 2019
162019
CompCertELF: verified separate compilation of C programs into ELF object files
Y Wang, X Xu, P Wilke, Z Shao
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-28, 2020
142020
A verified CompCert front-end for a memory model supporting pointer arithmetic and uninitialised data
F Besson, S Blazy, P Wilke
Journal of Automated Reasoning 62 (4), 433-480, 2019
142019
Debiasing android malware datasets: How can i trust your results if your dataset is biased?
TC Miranda, PF Gimenez, JF Lalande, VVT Tong, P Wilke
IEEE Transactions on Information Forensics and Security 17, 2182-2197, 2022
102022
Abusing android runtime for application obfuscation
P Graux, JF Lalande, P Wilke, VVT Tong
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
62020
Isolating malicious code in Android malware in the wild
VVT Tong, C Herzog, TC Miranda, P Graux, JF Lalande, P Wilke
MALCON 2019-14th International Conference on Malicious and Unwanted Software, 2019
42019
A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity
M Baty, P Wilke, G Hiet, A Fontaine, A Trieu
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 372-387, 2023
32023
Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections
N Gaudin, JL Hatchikian-Houdot, F Besson, P Cotret, G Gogniat, G Hiet, ...
2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2023
12023
DaViz: Visualization for Android Malware Datasets
TC Miranda, JF Lalande, VVT Tong, P Wilke
RESSI 2022-Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité …, 2022
12022
Preventing serialization vulnerabilities through transient field detection
P Graux, JF Lalande, VVT Tong, P Wilke
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 1598-1606, 2021
12021
Formally verified compilation of low-level C code
P Wilke
Université de Rennes, 2016
12016
OATs’inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications
P Graux, JF Lalande, V Viet Triem Tong, P Wilke
Digital Threats: Research and Practice 4 (2), 1-27, 2023
2023
OATs’inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications
P Graux, JF Lalande, V Viet Triem Tong, P Wilke
Digital Threats: Research and Practice 4 (2), 1-27, 2023
2023
Malware Windows Evasifs: Impact sur les Antivirus et Possible Contre-mesure
C Herzog, VVT Tong, P Wilke, JL Lanet
C&ESAR 2020-Computer & Electronics Security Applications Rendez-vous, 2020
2020
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures
C Herzog, VVT Tong, P Wilke, A Van Straaten, JL Lanet
arXiv preprint arXiv:2009.12204, 2020
2020
Compilation formellement vérifiée de code C de bas-niveau
P Wilke
Rennes 1, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20