Pierre Wilke

Publications :

  • Article in a review - 5 documents
    • Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. OATs’inside : Retrieving Object Behaviors From Native-based Obfuscated Android Applications, 2023-08-10. (https://centralesupelec.hal.science/hal-04279351)
    • Tomás Concepción Miranda, Pierre-Francois Gimenez, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. Debiasing Android Malware Datasets: How Can I Trust Your Results If Your Dataset Is Biased?, 2022-06-03. (https://inria.hal.science/hal-03700082)
    • Frédéric Besson, Sandrine Blazy, Pierre Wilke. CompCertS: A Memory-Aware Verified C Compiler using a Pointer as Integer Semantics, 2019-08. (https://inria.hal.science/hal-02401182)
    • Frédéric Besson, Sandrine Blazy, Pierre Wilke. A Verified CompCert Front-End for a Memory Model Supporting Pointer Arithmetic and Uninitialised Data, 2019-04. (https://inria.hal.science/hal-01656895)
    • Yuting Wang, Pierre Wilke, Zhong Shao. An abstract stack based approach to verified compositional compilation to machine code, 2019-01. (https://hal.science/hal-02018168)
  • Communication on a congress - 12 documents
    • Matthieu Baty, Pierre Wilke, Guillaume Hiet, Arnaud Fontaine, Alix Trieu. A generic framework to develop and verify security mechanisms at the microarchitectural level: application to control-flow integrity, 2023-07-09. (https://inria.hal.science/hal-04118645)
    • Tomás Concepción Miranda, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. DaViz: Visualization for Android Malware Datasets, 2022-05-10. (https://inria.hal.science/hal-03709062)
    • Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. Preventing Serialization Vulnerabilities through Transient Field Detection, 2021-03-22. (https://inria.hal.science/hal-03066847)
    • Cédric Herzog, Valérie Viet Triem Tong, Pierre Wilke, Jean-Louis Lanet. Malware Windows Evasifs : Impact sur les Antivirus et Possible Contre-mesure, 2020-12-14. (https://inria.hal.science/hal-03139240)
    • Yuting Wang, Xiangzhen Xu, Pierre Wilke, Zhong Shao. CompCertELF: Verified Separate Compilation of C Programs into ELF Object Files, 2020-11-16. (https://hal.science/hal-03114583)
    • Pierre Graux, Jean-François Lalande, Pierre Wilke, Valérie Viet Triem Tong. Abusing Android Runtime for Application Obfuscation, 2020-09-11. (https://centralesupelec.hal.science/hal-02877815)
    • Cédric Herzog, Valérie Viet Triem Tong, Pierre Wilke, Arnaud van Straaten, Jean-Louis Lanet. Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures, 2020-07-08. (https://hal.science/hal-02949067)
    • Valérie Viet Triem Tong, Cédric Herzog, Tomás Concepción Miranda, Pierre Graux, Jean-François Lalande, Pierre Wilke. Isolating malicious code in Android malware in the wild, 2019-10-01. (https://centralesupelec.hal.science/hal-02288116)
    • Frédéric Besson, Sandrine Blazy, Alexandre Dang, Thomas Jensen, Pierre Wilke. Compiling Sandboxes: Formally Verified Software Fault Isolation, 2019-04-06. (https://inria.hal.science/hal-02316189)
    • Frédéric Besson, Sandrine Blazy, Pierre Wilke. CompCertS: A Memory-Aware Verified C Compiler using Pointer as Integer Semantics, 2017-09-26. (https://inria.hal.science/hal-01656875)
    • Frédéric Besson, Sandrine Blazy, Pierre Wilke. A Concrete Memory Model for CompCert, 2015-08-24. (https://inria.hal.science/hal-01194549)
    • Frédéric Besson, Sandrine Blazy, Pierre Wilke. A Precise and Abstract Memory Model for C Using Symbolic Values, 2014. (https://inria.hal.science/hal-01093312)
  • MEM - 1 document