Publications

Journals

Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, and Frédéric Majorczyk. Cross-domain Alert Correlation methodology for Industrial Control Systems. Computers and Security, 2022.

Ronny Chevalier, David Plaquin, Chris Dalton, and Guillaume Hiet. Intrusion Survivability for Commodity Operating Systems. Digital Threats: Research and Practice, 1(4):1–30, December 2020. (PDF) (doi:10.1145/3419471)

Thomas Letan, Yann Régis-Gianas, Pierre Chifflier, and Guillaume Hiet. Modular verification of programs with effects and effects handlers. Formal Aspects of Computing, December 2020. (doi:10.1007/s00165-020-00523-2)

Mathieu Jaume, Valérie Viet Triem Tong, and Guillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux. Technique et Science Informatiques, 31(6):713–742, 2012. (doi:10.3166/tsi.31.713-742)

Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, and Benjamin Morin. Policy-based intrusion detection in web applications by monitoring Java information flows. International Journal of Information and Computer Security, Vol.3(No. 3/4):15 pages, 2009.

Christophe Bidan, Guillaume Hiet, Ludovic Mé, Benjamin Morin, and Jacob Zimmermann. Vers une détection d'intrusions à fiabilité et pertinence prouvables. La Revue de l'Electricité et de l'Electronique, (9):13 pages, October 2006.

Conference

Nicolas Bellec, Guillaume Hiet, Simon Rokicki, Frédéric Tronel, and Isabelle Puaut. RT-DFI: Optimizing Data-Flow Integrity for Real-Time Systems. In Martina Maggio, editor, 34rd Euromicro Conference on Real-Time Systems, ECRTS 2022, LIPIcs. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022.

Camille Le Bon, Erven Rohou, Frédéric Tronel, and Guillaume Hiet. DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification. In Workshop on the Security of Software / Hardware Interfaces (SILM 2021), digital event, France, September 2021. (PDF)

Ronny Chevalier, David Plaquin, Chris Dalton, and Guillaume Hiet. Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems. In ACSAC 2019 - 35th Annual Computer Security Applications Conference, volume 2019 of Proceedings of the 35th Annual Computer Security Applications Conference, San Juan, Puerto Rico, December 2019. (PDF) (doi:10.1145/3359789.3359792)

Jean-François Lalande, Valérie Viet Triem Tong, Pierre Graux, Guillaume Hiet, Wojciech Mazurczyk, Habiba Chaoui, and Pascal Berthomé. Teaching Android Mobile Security. In SIGCSE '19 - 50th ACM Technical Symposium on Computer Science Education, Proceedings of the 50th ACM Technical Symposium on Computer Science Education, pages 232–238, Minneapolis, United States, February 2019. ACM Press. (PDF) (doi:10.1145/3287324.3287406)

Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Arnab Kumar Biswas, Vianney Lapotre, and Gogniat Guy. A small and adaptive coprocessor for information flow tracking in ARM SoCs. In ReConFig 2018 - International Conference on Reconfigurable Computing and FPGAs, Proceedings of the 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pages 1–17, Cancun, Mexico, December 2018. (PDF) (doi:10.1109/reconfig.2018.8641695)

Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, Gogniat Guy, and Arnab Kumar Biswas. A novel lightweight hardware-assisted static instrumentation approach for ARM SoC using debug components. In AsianHOST 2018 - Asian Hardware Oriented Security and Trust Symposium, Proceedings of the 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pages 1–13, Hong Kong, China, December 2018. (PDF) (doi:10.1109/asianhost.2018.8607177)

Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, and Frédéric Majorczyk. Efficient Mining of Temporal Safety Properties for Intrusion Detection in Industrial Control Systems. In 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS'18), pages 1–8, Warsaw, Poland, August 2018. (PDF)

Thomas Letan, Yann Régis-Gianas, Pierre Chifflier, and Guillaume Hiet. Modular Verification of Programs with Effects and Effect Handlers in Coq. In FM 2018 - 22nd International Symposium on Formal Methods, volume 10951 of LNCS, pages 338–354, Oxford, United Kingdom, July 2018. Springer. (PDF) (doi:10.1007/978-3-319-95582-7_20)

Ronny Chevalier, David Plaquin, and Guillaume Hiet. Intrusion Survivability for Commodity Operating Systems and Services: A Work in Progress. In RESSI 2018 - Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Nancy / La Bresse, France, May 2018. (PDF)

Ronny Chevalier, Maugan Villatel, David Plaquin, and Guillaume Hiet. Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode. In ACSAC 2017 - 33rd Annual Computer Security Applications Conference, volume 2017 of Proceedings of the 33rd Annual Computer Security Applications Conference, pages 399–411, Orlando, United States, December 2017. ACM. (PDF) (doi:10.1145/3134600.3134622)

Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, and Guy Gogniat. ARMHEx: a framework for efficient DIFT in real-world SoCs. In Field Programmable Logic (FPL), Ghent, Belgium, September 2017. (PDF)

Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, and Guy Gogniat. ARMHEx: A hardware extension for DIFT on ARM-based SoCs. In Field Programmable Logic (FPL), Ghent, Belgium, September 2017. (PDF)

Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, and Guy Gogniat. ARMHEx: embedded security through hardware-enhanced information flow tracking. In RESSI 2017 : Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Grenoble (Autrans), France, May 2017. (PDF)

Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, and Frédéric Majorczyk. Detecting Process-Aware Attacks in Sequential Control Systems. In 21st Nordic Conference on Secure IT Systems (NordSec 2016), Oulu, Finland, November 2016.

Thomas Letan, Pierre Chifflier, Guillaume Hiet, Pierre Néron, and Benjamin Morin. SpecCert: Specifying and Verifying Hardware-based Software Enforcement. In 21st International Symposium on Formal Methods (FM 2016), 21st International Symposium on Formal Methods (FM 2016), Limassol, Cyprus, November 2016. Springer. (PDF)

Deepak Subramanian, Guillaume Hiet, and Christophe Bidan. A self-correcting information flow control model for the web-browser. In FPS 2016 - The 9th International Symposium on Foundations & Practice of Security, volume 10128 of Lecture Notes in Computer Science, pages 285–301, Québec City, Canada, October 2016. (PDF)

Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, and Guy Gogniat. Towards a hardware-assisted information flow tracking ecosystem for ARM processors. In 26th International Conference on Field-Programmable Logic and Applications (FPL 2016), Lausanne, Switzerland, August 2016. (PDF)

Deepak Subramanian, Guillaume Hiet, and Christophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses. In 9th International Conference on Security of Information and Networks (SIN 2016), Rutgers University, New Jersey, United States, July 2016.

Muhammad Abdul Wahab, Pascal Cotret, Mounir Nasr Allah, Guillaume Hiet, Vianney Lapotre, and Guy Gogniat. A portable approach for SoC-based Dynamic Information Flow Tracking implementations. In 11ème Colloque du GDR SoC/SiP, Nantes, France, June 2016. (PDF)

Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, and Frédéric Majorczyk. Classification des approches de détection d'intrusions dans les systèmes de contrôle industriels et axes d'amélioration. In Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2016), Toulouse, France, May 2016.

Guillaume Hiet, Hervé DEBAR, Sélim Ménouar, and Vérène Houdebine. Etude comparative des formats d'alertes. In C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015, Actes de la conférence C&ESAR (Computer & Electronics Security Applications Rendez-vous) 2015, pages 125–148, Rennes, France, November 2015.

Georges Bossert, Frédéric Guihéry, and Guillaume Hiet. Towards Automated Protocol Reverse Engineering Using Semantic Information. In ASIA CCS '14, pages 51–62, Kyoto, Japan, June 2014. 12 pages. (doi:10.1145/2590296.2590346)

Deepak Subramanian, Guillaume Hiet, and Christophe Bidan. Preventive Information Flow Control through a Mechanism of Split Addresses. In 9ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information, Saint-Germain-Au-Mont-d'Or, France, May 2014.

Georges Bossert, Frédéric Guihéry, and Guillaume Hiet. Netzob : un outil pour la rétro-conception de protocoles de communication. In SSTIC 2012, page 43, Rennes, France, June 2012.

Emmanuelle Anceaume, Christophe Bidan, Sébastien Gambs, Guillaume Hiet, Michel Hurfin, Ludovic Mé, Guillaume Piolle, Nicolas Prigent, Eric Totel, Frédéric Tronel, and Valérie Viet Triem Tong. From SSIR to CIDre: a New Security Research Group in Rennes. In 1st SysSec Workshop, Amsterdam, Netherlands, July 2011.

Georges Bossert, Guillaume Hiet, and Thibaut Henin. Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems. In SAR-SSI 2011, pages 1–8, La Rochelle, France, May 2011. (doi:10.1109/SAR-SSI.2011.5931397)

Guillaume Hiet, Frédéric Guihéry, Goulven Guiheux, David Pichardie, and Christian Brunette. Sécurité de la plate-forme d'exécution Java : limites et propositions d'améliorations. In Symposium sur la sécurité des technologies de l'information et des communications (SSTIC), Rennes, France, 2010. (PDF)

Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, and Benjamin Morin. Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows. In CRiSIS 2008, page 8 pages, Tozeur, Tunisia, October 2008.

Guillaume Hiet, Ludovic Mé, Benjamin Morin, and Valérie Viet Triem Tong. Monitoring both OS and program level information flows to detect intrusions against network servers. In IEEE Workshop on Monitoring, Attack Detection and Mitigation, page unknown, Toulouse, France, November 2007.

Guillaume Hiet, Ludovic Mé, Jacob Zimmermann, Christophe Bidan, Benjamin Morin, and Valérie Viet Triem Tong. Détection fiable et pertinente de flux d'information illégaux. In Sixth Conference on Security and Network Architectures (SARSSI), page unknown, France, June 2007.

Posters

Pascal Cotret, Guillaume Hiet, Guy Gogniat, and Vianney Lapotre. HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processors. In CHES 2015 - Workshop on Cryptographic Hardware and Embedded Systems, Saint-Malo, France, September 2015. (PDF)

Mounir Nasr Allah, Guillaume Hiet, Muhammad Abdul Wahab, Pascal Cotret, Guy Gogniat, and Vianney Lapotre. HardBlare: a Hardware-Assisted Approach for Dynamic Information Flow Tracking. Séminaire des doctorantes et doctorants en informatique de la Société Informatique de France, April 2016. Poster. (PDF)

Pascal Cotret, Guillaume Hiet, and Guy Gogniat. HardBlare: an efficient hardware-assisted DIFC for non-modified embedded processors. HiPEAC, January 2016. Poster.

Thesis

Guillaume Hiet. Security at the Hardware/Software Interface. Habilitation à diriger des recherches, Université de Rennes 1, December 2021. (PDF)

Guillaume Hiet. Détection d'intrusions paramétrée par la politique de sécurité grâce au contrôle collaboratif des flux d'informations au sein du système d'exploitation et des applications : mise en œuvre sous Linux pour les programmes Java. Theses, Université Rennes 1, December 2008. (PDF)