Guillaume Hiet

Guillaume.Hiet [at] centralesupelec.fr

Résumé :

  • Professor

Mots clés :

  • Cybersecurity, intrusion detection, security of software/hardware interfaces

Publications :

  • Communication dans un congrès - 30 documents
    • Nicolas Bellec, Guillaume Hiet, Simon Rokicki, Frédéric Tronel, Isabelle Puaut. RT-DFI: Optimizing Data-Flow Integrity for Real-Time Systems, 2022-07-05. (https://hal.inria.fr/hal-03641576)
    • Camille Le Bon, Erven Rohou, Frédéric Tronel, Guillaume Hiet. DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification, 2021-09-06. (https://hal.science/hal-03340008)
    • Ronny Chevalier, David Plaquin, Chris Dalton, Guillaume Hiet. Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems, 2019-12-09. (https://hal.inria.fr/hal-02289315v2)
    • Kévin Le Bon, Byron Hawkins, Erven Rohou, Guillaume Hiet, Frédéric Tronel. Plateforme de protection de binaires configurable et dynamiquement adaptative, 2019-05-15. (https://hal.inria.fr/hal-02385216)
    • Jean-François Lalande, Valérie Viet Triem Tong, Pierre Graux, Guillaume Hiet, Wojciech Mazurczyk, Habiba Chaoui, Pascal Berthomé. Teaching Android Mobile Security, 2019-02-27. (https://hal-centralesupelec.archives-ouvertes.fr/hal-01940652)
    • Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, Gogniat Guy, Arnab Kumar Biswas. A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components, 2018-12-17. (https://hal.science/hal-01911621)
    • Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Arnab Kumar Biswas, Vianney Lapotre, Gogniat Guy. A small and adaptive coprocessor for information flow tracking in ARM SoCs, 2018-12-03. (https://hal.science/hal-01911619)
    • Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, Frédéric Majorczyk. Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems, 2018-08-29. (https://hal.science/hal-01877109)
    • Thomas Letan, Yann Régis-Gianas, Pierre Chifflier, Guillaume Hiet. Modular Verification of Programs with Effects and Effect Handlers in Coq, 2018-07-15. (https://hal.inria.fr/hal-01799712)
    • Ronny Chevalier, David Plaquin, Guillaume Hiet. Intrusion Survivability for Commodity Operating Systems and Services: A Work in Progress, 2018-05-23. (https://hal.inria.fr/hal-02280376)
    • Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet. Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode, 2017-12-04. (https://hal.inria.fr/hal-01634566)
    • Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, Guy Gogniat. ARMHEx: A hardware extension for DIFT on ARM-based SoCs, 2017-09-04. (https://hal.science/hal-01558473)
    • Muhammad Abdul – Wahab, Pascal Cotret, Mounir – Nasr Allah, Guillaume – Hiet, Vianney Lapotre, Guy Gogniat. ARMHEx: embedded security through hardware-enhanced information flow tracking, 2017-05-17. (https://hal.science/hal-01558155)
    • Thomas Letan, Pierre Chifflier, Guillaume Hiet, Pierre Néron, Benjamin Morin. SpecCert: Specifying and Verifying Hardware-based Software Enforcement, 2016-11-09. (https://hal.inria.fr/hal-01361422)
    • Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, Frédéric Majorczyk. Detecting Process-Aware Attacks in Sequential Control Systems, 2016-11-02. (https://hal.inria.fr/hal-01361081)
    • Deepak Subramanian, Guillaume Hiet, Christophe Bidan. A self-correcting information flow control model for the web-browser, 2016-10-24. (https://hal.inria.fr/hal-01398192)
    • Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, Guy Gogniat. Towards a hardware-assisted information flow tracking ecosystem for ARM processors, 2016-08-29. (https://hal.science/hal-01337579)
    • Deepak Subramanian, Guillaume Hiet, Christophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses, 2016-07-20. (https://hal.inria.fr/hal-01344565)
    • Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, Guy Gogniat. A portable approach for SoC-based Dynamic Information Flow Tracking implementations, 2016-06-09. (https://hal-centralesupelec.archives-ouvertes.fr/hal-01311045)
    • Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, Frédéric Majorczyk. Classification des approches de détection d'intrusions dans les systèmes de contrôle industriels et axes d'amélioration, 2016-05-10. (https://hal.science/hal-01587915)
    • Guillaume Hiet, Hervé Debar, Sélim Ménouar, Vérène Houdebine. Etude comparative des formats d’alertes, 2015-11-23. (https://hal.science/hal-01242786)
    • Georges Bossert, Frédéric Guihéry, Guillaume Hiet. Towards Automated Protocol Reverse Engineering Using Semantic Information, 2014-06-04. (https://hal-supelec.archives-ouvertes.fr/hal-01009283)
    • Deepak Subramanian, Guillaume Hiet, Christophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses, 2014-05-13. (https://hal.inria.fr/hal-01344563)
    • Georges Bossert, Frédéric Guihéry, Guillaume Hiet. Netzob : un outil pour la rétro-conception de protocoles de communication, 2012-06-06. (https://hal-supelec.archives-ouvertes.fr/hal-00763751)
    • Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frédéric Tronel, Valérie Viet Triem Tong. From SSIR to CIDre: a New Security Research Group in Rennes, 2011-07-06. (https://hal-supelec.archives-ouvertes.fr/hal-00656940)
    • Georges Bossert, Guillaume Hiet, Thibaut Henin. Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems, 2011-05-18. (https://hal-supelec.archives-ouvertes.fr/hal-00658396)
    • Guillaume Hiet, Frédéric Guihéry, Goulven Guiheux, David Pichardie, Christian Brunette. Sécurité de la plate-forme d'exécution Java : limites et propositions d'améliorations, 2010. (https://hal.inria.fr/inria-00537820)
    • Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin. Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows, 2008-10-28. (https://hal-supelec.archives-ouvertes.fr/hal-00353000)
    • Guillaume Hiet, Ludovic Mé, Benjamin Morin, Valérie Viet Triem Tong. Monitoring both OS and program level information flows to detect intrusions against network servers, 2007-11. (https://hal-supelec.archives-ouvertes.fr/hal-00268408)
    • Guillaume Hiet, Ludovic Mé, Jacob Zimmermann, Christophe Bidan, Benjamin Morin, Valérie Viet Triem Tong. Détection fiable et pertinente de flux d'information illégaux, 2007-06. (https://hal-supelec.archives-ouvertes.fr/hal-00268422)
  • Article dans une revue - 6 documents
  • HDR - 1 document
  • PROCEEDINGS - 1 document
    • Guillaume Hiet, Frédéric Tronel, Jean-Louis Lanet. Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020), 2020. (https://hal.science/hal-03136790)
  • POSTER - 4 documents
  • Rapport - 1 document
    • Thomas Letan, Pierre Chifflier, Guillaume Hiet, Pierre Néron, Benjamin Morin. SpecCert: Specifying and Verifying Hardware-based Security Enforcement, 2016. (https://hal.inria.fr/hal-01356690)
  • Thèse - 1 document
    • Guillaume Hiet. Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications : mise en œuvre sous Linux pour les programmes Java, 2008-12-19. (https://theses.hal.science/tel-00355089)