Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marie-Laure Potet is active.

Publication


Featured researches published by Marie-Laure Potet.


formal methods | 2003

Adaptable Translator of B Specifications to Embedded C Programs

Didier Bert; Sylvain Boulmé; Marie-Laure Potet; Antoine Requet; Laurent Voisin

This paper presents the results of the RNTL BOM project, which aimed to develop an approach to generate efficient code from B formal developments. The target domain is smart card applications, in which memory and code size is an important factor. The results detailed in this paper are a new architecture of the translation process, a way to adapt the B0 language in order to include types of the target language and a set of validated optimizations. An assessment of the proposed approach is given through a case study, relative to the development of a Java Card Virtual Machine environment.


Lecture Notes in Computer Science | 2005

GeneSyst: a tool to reason about behavioral aspects of B event specifications. application to security properties

Didier Bert; Marie-Laure Potet; Nicolas Stouls

In this paper, we present a method and a tool to build symbolic labelled transition systems from B specifications. The tool, called GeneSyst, can take into account refinement levels and can visualize the decomposition of abstract states in concrete hierarchical states. The resulting symbolic transition system represents all the behaviors of the initial B event system. So, it can be used to reason about them. We illustrate the use of GeneSyst to check security properties on a model of electronic purse.


Journal of Computer Virology and Hacking Techniques | 2014

Statically Detecting Use After Free on Binary Code

Josselin Feist; Laurent Mounier; Marie-Laure Potet

We present GUEB a static tool detecting Use after Free vulnerabilities on disassembled code. This tool has been evaluated on a real vulnerability in the ProFTPD application (CVE-2011-4130).


international conference on software testing verification and validation | 2014

Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections

Marie-Laure Potet; Laurent Mounier; Maxime Puys; Louis Dureuil

In the domain of smart cards, secured devices must be protected against high level attack potential [1]. According to norms such as the Common Criteria [2], the vulnerability analysis must cover the current state-of-the-art in term of attacks. Nowadays, a very classical type of attack is fault injection, conducted by means of laser based techniques. We propose a global approach, called Lazart, to evaluate code robustness against fault injections targeting control flow modifications. The originality of Lazart is two folds. First, we encompass the evaluation process as a whole: starting from a fault model, we produce (or establish the absence of) attacks, taking into consideration software countermeasures. Furthermore, according to the near state-of-the-art, our methodology takes into account multiple transient fault injections and their combinatory. The proposed approach is supported by an effective tool suite based on the LLVM format [3] and the KLEE symbolic test generator [4].


software engineering and formal methods | 2010

Designing Log Architectures for Legal Evidence

Daniel Le Métayer; Eduardo Mazza; Marie-Laure Potet

Establishing contractual liabilities in case of litigation is generally a delicate matter. It becomes even more challenging when IT systems are involved. At the core of the problem lies the issue of the evidence provided by the opposing parties. We believe that the means to constitute evidence that could be used in case of conflict should be considered from the onset of IT projects and be part of the requirements for the design of IT systems. This paper proposes criteria for acceptable log architectures depending on the features of the system and the potential claims between the parties. We establish properties guaranteed by acceptable architectures and illustrate our framework with a travel booking system.


Lecture Notes in Computer Science | 2007

Security policy enforcement through refinement process

Nicolas Stouls; Marie-Laure Potet

In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT project [9], based on the research of network testing methods from a high-level security policy.


international conference on software engineering | 2010

Liability in software engineering: overview of the LISE approach and illustration on a case study

Daniel Le Métayer; Manuel Maarek; Valérie Viet Triem Tong; Eduardo Mazza; Marie-Laure Potet; Nicolas Craipeau; Stéphane Frénot; Ronan Hardouin

LISE is a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools to (1) define software liability in a precise and unambiguous way and (2) establish such liability in case of incident. This paper provides an overview of the overall approach taken in the project based on a case study. The case study illustrates a situation where, in order to reduce legal uncertainties, the parties to a contract wish to include in the agreement specific clauses to define as precisely as possible the share of liabilities between them for the main types of failures of the system.


ieee international conference on software analysis, evolution, and reengineering | 2016

BINSEC/SE: A Dynamic Symbolic Execution Toolkit for Binary-level Analysis

Robin David; Sébastien Bardin; Thanh Dinh Ta; Laurent Mounier; Josselin Feist; Marie-Laure Potet; Jean-Yves Marion

When it comes to software analysis, several approaches exist from heuristic techniques to formal methods, which are helpful at solving different kinds ofproblems. Unfortunately very few initiative seek to aggregate this techniques in the same platform. BINSEC intend to fulfill this lack of binary analysis platform by allowing to perform modular analysis. This work focusses on BINSEC/SE, the new dynamic symbolic execution engine (DSE) implemented in BINSEC. We will highlight the novelties of the engine, especially in terms of interactions between concrete and symbolic execution or optimization of formula generation. Finally, two reverse engineering applications are shown in order to emphasize the tool effectiveness.


Lecture Notes in Computer Science | 2007

Interpreting invariant composition in the b method using the spec# ownership relation: a way to explain and relax b restrictions

Sylvain Boulmé; Marie-Laure Potet

In the B method, the invariant of a component cannot be violated outside its own operations. This approach has a great advantage: the users of a component can assume its invariant without having to prove it. But, B users must deal with important architecture restrictions that ensure the soundness of reasonings involving invariants. Moreover, understanding how these restrictions ensure soundness is not trivial. This paper studies a meta-model of invariant composition, inspired from the Spec# approach. Basically, in this model, invariant violations are monitored using ghost variables. The consistency of assumptions about invariants is controlled by very simple proof obligations. Hence, this model provides a simple framework to understand B composition rules and to study some conservative extensions of B authorizing more architectures and providing more control on components initialization.


smart card research and advanced application conference | 2015

From Code Review to Fault Injection Attacks: Filling the Gap Using Fault Model Inference

Louis Dureuil; Marie-Laure Potet; Philippe de Choudens; Cécile Dumas; Jessy Clédière

We propose an end-to-end approach to evaluate the robustness of smartcard embedded applications against perturbation attacks. Key to this approach is the fault model inference phase, a method to determine a precise fault model according to the attacked hardware and to the attackers equipment, taking into account the probability of occurrence of the faults. Together with a fault injection simulator, it allows to compute a predictive metrics, the vulnerability rate, which gives a first estimation of the robustness of the application. Our approach is backed up by experiments and tools that validate its potential for prediction.

Collaboration


Dive into the Marie-Laure Potet's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Maxime Puys

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Robin David

Université Paris-Saclay

View shared research outputs
Top Co-Authors

Avatar

Stéphane Frénot

Institut national des sciences Appliquées de Lyon

View shared research outputs
Top Co-Authors

Avatar

Sanjay Rawat

University of Hyderabad

View shared research outputs
Researchain Logo
Decentralizing Knowledge