Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Samuel Hym is active.

Publication


Featured researches published by Samuel Hym.


Science of Computer Programming | 2014

Summary-based inference of quantitative bounds of live heap objects

Víctor A. Braberman; Diego Garbervetsky; Samuel Hym; Sergio Yovine

Abstract This article presents a symbolic static analysis for computing parametric upper bounds of the number of simultaneously live objects of sequential Java-like programs. Inferring the peak amount of irreclaimable objects is the cornerstone for analyzing potential heap-memory consumption of stand-alone applications or libraries. The analysis builds method-level summaries quantifying the peak number of live objects and the number of escaping objects. Summaries are built by resorting to summaries of their callees. The usability, scalability and precision of the technique is validated by successfully predicting the object heap usage of a medium-size, real-life application which is significantly larger than other previously reported case-studies.


theoretical aspects of software engineering | 2016

Formal Proof of Dynamic Memory Isolation Based on MMU

Narjes Jomaa; David Nowak; Gilles Grimaud; Samuel Hym

For security and safety reasons, it is essential to ensure memory isolation between processes. The memory manager is thus a critical part of the kernel of an operating system. It is common for kernels to ensure memory isolation through a piece of hardware called memory management unit (MMU). However an MMU by itself does not provide memory isolation. It is only a tool the kernel can use to ensure this property. In this paper we show how a proof assistant such as Coq can be used to model a hardware architecture with an MMU, and an abstract model of microkernel supporting preemptive scheduling and memory manager. We proceed by making formally explicit the consistency properties that must be preserved in order for memory isolation to be preserved.


international conference on engineering secure software and systems | 2011

On-device control flow verification for Java programs

Arnaud Fontaine; Samuel Hym; Isabelle Simplot-Ryl

While mobile devices have become ubiquitous and generally multi-application capable, their operating systems provide few high level mechanisms to protect services offered by application vendors against potentially hostile applications coexisting on the device. In this paper, we tackle the issue of controlling application interactions including collusion in Java-based systems running on open, constrained devices such as smart cards or mobile phones. We present a model specially designed to be embedded in constrained devices to verify on-device at loading-time that interactions between applications abide by the security policies of each involved application without resulting in run-time computation overheads; this model deals with application (un)installations and policy changes in an incremental fashion. We sketch the application of our approach and its security enhancements on a multi-application use case for GlobalPlatform/Java Card smart cards.


formal aspects in security and trust | 2011

Verifiable control flow policies for java bytecode

Arnaud Fontaine; Samuel Hym; Isabelle Simplot-Ryl

This paper presents the enforcement of control flow policies for Java bytecode dedicated to open and constrained devices. On-device enforcement of security policies mostly relies on run-time monitoring or inline checking code, which is not appropriate for strongly constrained devices such as mobile phones and smart-cards. We present a proof-carrying code approach with on-device lightweight verification of control flow policies statically at loading-time. Our approach is suitable for evolving, open and constrained Java-based systems as it is compositional, to avoid re-verification of already verified bytecode upon loading of new bytecode, and it is regressive, to cleanly support bytecode unloading.


certified programs and proofs | 2018

Formal proof of polynomial-time complexity with quasi-interpretations

Hugo Férée; Samuel Hym; Micaela Mayero; Jean-Yves Moyen; David Nowak

We present a Coq library that allows for readily proving that a function is computable in polynomial time. It is based on quasi-interpretations that, in combination with termination ordering, provide a characterisation of the class fp of functions computable in polynomial time. At the heart of this formalisation is a proof of soundness and extensional completeness. Compared to the original paper proof, we had to fill a lot of not so trivial details that were left to the reader and fix a few glitches. To demonstrate the usability of our library, we apply it to the modular exponentiation.


international workshop automated verification critical systems | 2018

Proof-Oriented Design of a Separation Kernel with Minimal Trusted Computing Base

Narjes Jomaa; Paolo Torrini; David Nowak; Gilles Grimaud; Samuel Hym


Archive | 2011

Lightweight verification of control flow policies on Java bytecode

Arnaud Fontaine; Samuel Hym; Isabelle Simplot-Ryl


Archive | 2009

Contracts and Grants with Industry - FP7-ICT “Security Engineering for lifelong Evolvable Systems” (SecureChange) (2009-2011)

Donia El Kateb; Samuel Hym; Isabelle Simplot-Ryl


Archive | 2009

New Results - Sound Information Flow

Arnaud Fontaine; Dorina Ghindici; Samuel Hym; Isabelle Simplot-Ryl


Archive | 2009

Contracts and Grants with Industry - ANR SESUR 2007 “Securing Flow of INformation for Computing pervasive Systems” (SFINCS) (2008-2010)

Arnaud Fontaine; Dorina Ghindici; Gilles Grimaud; Samuel Hym; Isabelle Simplot-Ryl

Collaboration


Dive into the Samuel Hym's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gilles Grimaud

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dorina Ghindici

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Gilles Grimaud

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sergio Yovine

University of Buenos Aires

View shared research outputs
Researchain Logo
Decentralizing Knowledge