default search action
Laurent Mounier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c64]Thomas Vigouroux, Marius Bozga, Cristian Ene, Laurent Mounier:
Function Synthesis for Maximizing Model Counting. VMCAI (1) 2024: 258-279 - 2023
- [c63]Etienne Boespflug, Laurent Mounier, Marie-Laure Potet, Abderrahmane Bouguern:
A Compositional Methodology to Harden Programs Against Multi-Fault Attacks. FDTC 2023: 24-35 - [e2]Guy-Vincent Jourdan, Laurent Mounier, Carlisle M. Adams, Florence Sèdes, Joaquín García-Alfaro:
Foundations and Practice of Security - 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13877, Springer 2023, ISBN 978-3-031-30121-6 [contents] - [d2]Thomas Vigouroux, Marius Bozga, Cristian Ene, Laurent Mounier:
[artifact50] Function synthesis for maximising model counting. Zenodo, 2023 - [d1]Thomas Vigouroux, Marius Bozga, Cristian Ene, Laurent Mounier:
[artifact50] Function synthesis for maximising model counting. Zenodo, 2023 - [i7]Etienne Boespflug, Abderrahmane Bouguern, Laurent Mounier, Marie-Laure Potet:
A tool assisted methodology to harden programs against multi-faults injections. CoRR abs/2303.01885 (2023) - [i6]Thomas Vigouroux, Marius Bozga, Cristian Ene, Laurent Mounier:
Function synthesis for maximizing model counting. CoRR abs/2305.10003 (2023) - 2022
- [c62]Thomas Vigouroux, Cristian Ene, David Monniaux, Laurent Mounier, Marie-Laure Potet:
BaxMC: a CEGAR approach to Max#SAT. FMCAD 2022: 170-178 - [i5]Thomas Vigouroux, Cristian Ene, David Monniaux, Laurent Mounier, Marie-Laure Potet:
BAXMC: a CEGAR approach to Max\#SAT. CoRR abs/2211.00973 (2022) - 2021
- [j11]Cristian Ene, Laurent Mounier, Marie-Laure Potet:
Output-sensitive Information flow analysis. Log. Methods Comput. Sci. 17(1) (2021) - [c61]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet:
RUSTInA: Automatically Checking and Patching Inline Assembly Interface Compliance (Artifact Evaluation): Accepted submission #992 - "Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine". ICSE (Companion Volume) 2021: 201-202 - [c60]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet:
Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine. ICSE 2021: 1236-1247 - [i4]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet:
Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine. CoRR abs/2102.07485 (2021) - 2020
- [c59]Etienne Boespflug, Cristian Ene, Laurent Mounier, Marie-Laure Potet:
Countermeasures Optimization in Multiple Fault-Injection Context. FDTC 2020: 26-34
2010 – 2019
- 2019
- [c58]Cristian Ene, Laurent Mounier, Marie-Laure Potet:
Output-Sensitive Information Flow Analysis. FORTE 2019: 93-110 - [c57]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Laurent Mounier, Marie-Laure Potet:
Get Rid of Inline Assembly through Verification-Oriented Lifting. ASE 2019: 577-589 - [i3]Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Laurent Mounier, Marie-Laure Potet:
Get rid of inline assembly through trustable verification-oriented lifting. CoRR abs/1903.06407 (2019) - [i2]Cristian Ene, Laurent Mounier, Marie-Laure Potet:
Output-sensitive Information flow analysis. CoRR abs/1909.09567 (2019) - 2018
- [c56]Hubert Garavel, Frédéric Lang, Laurent Mounier:
Compositional Verification in Action. FMICS 2018: 189-210 - 2017
- [c55]Franck de Goër, Roland Groz, Laurent Mounier:
Metrics for runtime detection of allocators in binaries. CSET @ USENIX Security Symposium 2017 - [c54]Franck de Goër, Christopher Ferreira, Laurent Mounier:
scat: Learning from a single execution of a binary. SANER 2017: 492-496 - 2016
- [c53]Josselin Feist, Laurent Mounier, Sébastien Bardin, Robin David, Marie-Laure Potet:
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free. SSPREW@ACSAC 2016: 2:1-2:12 - [c52]Gustavo Grieco, Guillermo Luis Grinblat, Lucas C. Uzal, Sanjay Rawat, Josselin Feist, Laurent Mounier:
Toward Large-Scale Vulnerability Discovery using Machine Learning. CODASPY 2016: 85-96 - [c51]Robin David, Sébastien Bardin, Josselin Feist, Laurent Mounier, Marie-Laure Potet, Thanh Dinh Ta, Jean-Yves Marion:
Specification of concretization and symbolization policies in symbolic execution. ISSTA 2016: 36-46 - [c50]Josselin Feist, Laurent Mounier, Marie-Laure Potet:
Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information. SEFM 2016: 76-81 - [c49]Robin David, Sébastien Bardin, Thanh Dinh Ta, Laurent Mounier, Josselin Feist, Marie-Laure Potet, Jean-Yves Marion:
BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis. SANER 2016: 653-656 - 2015
- [c48]Franck de Goër, Roland Groz, Laurent Mounier:
Lightweight heuristics to retrieve parameter associations from binaries. PPREW@ACSAC 2015: 5:1-5:12 - 2014
- [j10]Josselin Feist, Laurent Mounier, Marie-Laure Potet:
Statically detecting use after free on binary code. J. Comput. Virol. Hacking Tech. 10(3): 211-217 (2014) - [c47]Sanjay Rawat, Laurent Mounier, Marie-Laure Potet:
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis. ARES 2014: 498-505 - [c46]Marie-Laure Potet, Laurent Mounier, Maxime Puys, Louis Dureuil:
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections. ICST 2014: 213-222 - [p1]Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier:
On the Expressiveness of some Runtime Validation Techniques. HOWARD-60 2014: 112-123 - 2013
- [j9]Nicolas Berthier, Florence Maraninchi, Laurent Mounier:
Synchronous programming of device drivers for global resource control in embedded operating systems. ACM Trans. Embed. Comput. Syst. 12(1s): 39:1-39:26 (2013) - [c45]Emmanuel Sifakis, Laurent Mounier:
Predictive Taint Analysis for Extended Testing of Parallel Executions. Haifa Verification Conference 2013: 129-144 - [c44]Gustavo Grieco, Laurent Mounier, Marie-Laure Potet, Sanjay Rawat:
A Stack Model for Symbolic Buffer Overflow Exploitability Analysis. ICST Workshops 2013: 216-217 - [i1]Sanjay Rawat, Dumitru Ceara, Laurent Mounier, Marie-Laure Potet:
Combining Static and Dynamic Analysis for Vulnerability Detection. CoRR abs/1305.3883 (2013) - 2012
- [j8]Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier:
What can you verify and enforce at runtime? Int. J. Softw. Tools Technol. Transf. 14(3): 349-382 (2012) - [j7]Yliès Falcone, Jean-Claude Fernandez, Thierry Jéron, Hervé Marchand, Laurent Mounier:
More testable properties. Int. J. Softw. Tools Technol. Transf. 14(4): 407-437 (2012) - [j6]Emmanuel Sifakis, Laurent Mounier:
Politiques de gestion de protections pour l'implémentation de sections critiques. Tech. Sci. Informatiques 31(8-10): 1153-1181 (2012) - [c43]Sofia Bekrar, Chaouki Bekrar, Roland Groz, Laurent Mounier:
A Taint Based Approach for Smart Fuzzing. ICST 2012: 818-825 - [c42]Laurent Mounier, Emmanuel Sifakis:
Dynamic Information-Flow Analysis for Multi-threaded Applications. ISoLA (1) 2012: 358-371 - [c41]Sanjay Rawat, Laurent Mounier:
Finding Buffer Overflow Inducing Loops in Binary Executables. SERE 2012: 177-186 - 2011
- [j5]Yliès Falcone, Laurent Mounier, Jean-Claude Fernandez, Jean-Luc Richier:
Runtime enforcement monitors: composition, synthesis, and enforcement abilities. Formal Methods Syst. Des. 38(3): 223-262 (2011) - [c40]Sofia Bekrar, Chaouki Bekrar, Roland Groz, Laurent Mounier:
Finding Software Vulnerabilities by Smart Fuzzing. ICST 2011: 427-430 - [c39]Sanjay Rawat, Laurent Mounier:
Offset-Aware Mutation Based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results. ICST Workshops 2011: 531-533 - [c38]Nicolas Berthier, Florence Maraninchi, Laurent Mounier:
Synchronous programming of device drivers for global resource control in embedded operating systems. LCTES 2011: 81-90 - 2010
- [c37]Dumitru Ceara, Laurent Mounier, Marie-Laure Potet:
Taint Dependency Sequences: A Characterization of Insecure Execution Paths Based on Input-Sensitive Cause Sequences. ICST Workshops 2010: 371-380 - [c36]Yliès Falcone, Jean-Claude Fernandez, Thierry Jéron, Hervé Marchand, Laurent Mounier:
More Testable Properties. ICTSS 2010: 30-46
2000 – 2009
- 2009
- [c35]Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier:
Runtime Verification of Safety-Progress Properties. RV 2009: 40-59 - [c34]Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier:
Enforcement monitoring wrt. the safety-progress classification of properties. SAC 2009: 593-600 - 2008
- [c33]Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier:
Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties. ICISS 2008: 41-55 - [c32]Yliès Falcone, Laurent Mounier, Jean-Claude Fernandez, Jean-Luc Richier:
j-POST: a Java Toolchain for Property-Oriented Software Testing. MBT@ETAPS 2008: 29-41 - 2007
- [c31]Keqin Li, Laurent Mounier, Roland Groz:
Test Generation from Security Policies Specified in Or-BAC. COMPSAC (2) 2007: 255-260 - [c30]Ananda Basu, Laurent Mounier, Marc Poulhiès, Jacques Pulou, Joseph Sifakis:
Using BIP for Modeling and Verification of Networked Systems -- A Case Study on TinyOS-based Networks. NCA 2007: 257-260 - [c29]Laurent Mounier, Ludovic Samper, Wassim Znaidi:
Worst-case lifetime computation of a wireless sensor network by model-checking. PE-WASUN 2007: 1-8 - [c28]Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier, Jean-Luc Richier:
A Compositional Testing Framework Driven by Partial Specifications. TestCom/FATES 2007: 107-122 - [c27]Mischa Dohler, Dominique Barthel, Florence Maraninchi, Laurent Mounier, Stephane Aubert, Christophe Dugas, Aurélien Buhrig, Franck Paugnat, Marc Renaudin, Andrzej Duda, Martin Heusse, Fabrice Valois:
The ARESA Project: Facilitating Research, Development and Commercialization of WSNs. SECON 2007: 590-599 - 2006
- [c26]Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier, Jean-Luc Richier:
A Test Calculus Framework Applied to Network Security Policies. FATES/RV 2006: 55-69 - [c25]Ludovic Samper, Florence Maraninchi, Laurent Mounier, Louis Mandel:
GLONEMO: global and accurate formal models for the analysis of ad-hoc sensor networks. InterSense 2006: 3 - [c24]Saddek Bensalem, Jean-Claude Fernandez, Klaus Havelund, Laurent Mounier:
Confirmation of deadlock potentials detected by runtime analysis. PADTAD 2006: 41-50 - [c23]Vianney Darmaillacq, Jean-Claude Fernandez, Roland Groz, Laurent Mounier, Jean-Luc Richier:
Test Generation for Network Security Rules. TestCom 2006: 341-356 - 2005
- [c22]Jean-Claude Fernandez, Laurent Mounier, Cyril Pachon:
A Model-Based Approach for Robustness Testing. TestCom 2005: 333-348 - 2004
- [c21]Marius Bozga, Susanne Graf, Laurent Mounier, Iulian Ober:
IF Validation Environment Tutorial. SPIN 2004: 306-307 - [e1]Susanne Graf, Laurent Mounier:
Model Checking Software, 11th International SPIN Workshop, Barcelona, Spain, April 1-3, 2004, Proceedings. Lecture Notes in Computer Science 2989, Springer 2004, ISBN 3-540-21314-7 [contents] - 2003
- [c20]Jean-Claude Fernandez, Laurent Mounier, Cyril Pachon:
Property Oriented Test Case Generation. FATES 2003: 147-163 - [c19]Dominique Borrione, Menouer Boubekeur, Laurent Mounier, Marc Renaudin, Antoine Siriani:
Validation of Asynchronous Circuit Specifications Using IF/CADP. VLSI-SoC (Selected Papers) 2003: 85-100 - [c18]Dominique Borrione, Menouer Boubekeur, Laurent Mounier, Marc Renaudin, Antoine Siriani:
Validation of asynchronous circuit specifications using IF/CADP. VLSI-SOC 2003: 86-91 - 2002
- [c17]Marius Bozga, Susanne Graf, Laurent Mounier:
IF-2.0: A Validation Environment for Component-Based Real-Time Systems. CAV 2002: 343-348 - 2001
- [c16]Marius Bozga, Susanne Graf, Laurent Mounier:
Automated Validation of Distributed Software Using the IF Environment. NCA 2001: 268-275 - [c15]Marius Bozga, Susanne Graf, Laurent Mounier, Iulian Ober, Jean-Luc Roux, Daniel Vincent:
Timed Extensions for SDL. SDL Forum 2001: 223-240 - [c14]Marius Bozga, Susanne Graf, Laurent Mounier:
Automated validation of distributed software using the IF environment. Workshop on Software Model Checking @ CAV 2001: 370-381 - 2000
- [j4]Marius Bozga, Jean-Claude Fernandez, Lucian Ghirvu, Claude Jard, Thierry Jéron, Alain Kerbrat, Pierre Morel, Laurent Mounier:
Verification and test generation for the SSCOP protocol. Sci. Comput. Program. 36(1): 27-52 (2000) - [c13]Marius Bozga, Jean-Claude Fernandez, Lucian Ghirvu, Susanne Graf, Jean-Pierre Krimm, Laurent Mounier:
IF: A Validation Environment for Timed Asynchronous Systems. CAV 2000: 543-547 - [c12]Marius Bozga, Susanne Graf, Alain Kerbrat, Laurent Mounier, Iulian Ober, Daniel Vincent:
SDL for Real-Time: What is Missing? SAM 2000: 108- - [c11]Jean-Pierre Krimm, Laurent Mounier:
Compositional State Space Generation with Partial Order Reductions for Asynchronous Communicating Systems. TACAS 2000: 266-282
1990 – 1999
- 1999
- [c10]Marius Bozga, Jean-Claude Fernandez, Lucian Ghirvu, Susanne Graf, Jean-Pierre Krimm, Laurent Mounier:
IF: An Intermediate Representation and Validation Environment for Timed Asynchronous Systems. World Congress on Formal Methods 1999: 307-327 - [c9]Marius Bozga, Jean-Claude Fernandez, Lucian Ghirvu, Susanne Graf, Jean-Pierre Krimm, Laurent Mounier, Joseph Sifakis:
IF: An intermediate representation for SDL and its applications. SDL Forum 1999: 423-440 - 1997
- [j3]Hubert Garavel, Laurent Mounier:
Specification and Verification of Various Distributed Leader Election Algorithms for Unidirectional Ring Networks. Sci. Comput. Program. 29(1-2): 171-197 (1997) - [j2]Marius Bozga, Jean-Claude Fernandez, Alain Kerbrat, Laurent Mounier:
Protocol Verification with the ALDÉBARAN Toolset. Int. J. Softw. Tools Technol. Transf. 1(1-2): 166-184 (1997) - [c8]Jean-Pierre Krimm, Laurent Mounier:
Compositional State Space Generation from Lotos Programs. TACAS 1997: 239-258 - 1996
- [c7]Jean-Claude Fernandez, Hubert Garavel, Alain Kerbrat, Laurent Mounier, Radu Mateescu, Mihaela Sighireanu:
CADP - A Protocol Validation and Verification Toolbox. CAV 1996: 437-440 - [c6]Ghassan Chehaibar, Hubert Garavel, Laurent Mounier, Nadia Tawbi, Ferruccio Zulian:
Specification and Verification of the PowerScaleTM Bus Arbitration Protocol: An Industrial Experiment with LOTOS. FORTE 1996: 435-450 - 1993
- [c5]Jean-Claude Fernandez, Alain Kerbrat, Laurent Mounier:
Symbolic Equivalence Checking. CAV 1993: 85-96 - 1992
- [b1]Laurent Mounier:
Méthodes de vérification de spécifications comportementales : étude et mise en œuvre. (Verification methods for behavioural specifications). Joseph Fourier University, Grenoble, France, 1992 - [j1]Jean-Claude Fernandez, Laurent Mounier, Claude Jard, Thierry Jéron:
On-the-fly Verification of Finite Transition Systems. Formal Methods Syst. Des. 1(2/3): 251-273 (1992) - [c4]Jean-Claude Fernandez, Hubert Garavel, Laurent Mounier, Anne Rasse, Carlos Rodriguez, Joseph Sifakis:
A Toolbox for the Verification of LOTOS Programs. ICSE 1992: 246-259 - 1991
- [c3]Jean-Claude Fernandez, Laurent Mounier:
"On the Fly" Verification of Behavioural Equivalences and Preorders. CAV 1991: 181-191 - [c2]Jean-Claude Fernandez, Laurent Mounier:
A Tool Set for deciding Behavioral Equivalences. CONCUR 1991: 23-42 - 1990
- [c1]Jean-Claude Fernandez, Laurent Mounier:
Verifying Bisimulations "On the Fly". FORTE 1990: 95-110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint