default search action
Frédéric Besson
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Shenghao Yuan, Frédéric Besson, Jean-Pierre Talpin:
End-to-End Mechanized Proof of a JIT-Accelerated eBPF Virtual Machine for IoT. CAV (1) 2024: 325-347 - [c36]Clément Chavanon, Frédéric Besson, Tristan Ninet:
PfComp: A Verified Compiler for Packet Filtering Leveraging Binary Decision Diagrams. CPP 2024: 89-102 - [c35]Jean-Loup Hatchikian-Houdot, Pierre Wilke, Frédéric Besson, Guillaume Hiet:
Formal Hardware/Software Models for Cache Locking Enabling Fast and Secure Code. ESORICS (3) 2024: 153-173 - [i4]Frédéric Besson, Célia Le Du, Pierre Wilke:
Side-Channel Resistant Applications through Co-designed Hardware/ Software: the SCRATCHS Project. ERCIM News 139(138) (2024) - 2023
- [c34]Nicolas Gaudin, Jean-Loup Hatchikian-Houdot, Frédéric Besson, Pascal Cotret, Guy Gogniat, Guillaume Hiet, Vianney Lapotre, Pierre Wilke:
Work in Progress: Thwarting Timing Attacks in Microcontrollers using Fine-grained Hardware Protections. EuroS&P Workshops 2023: 304-310 - [c33]Gautier Raimondi, Frédéric Besson, Thomas P. Jensen:
Type-directed Program Transformation for Constant-Time Enforcement. PPDP 2023: 6:1-6:13 - [c32]Shenghao Yuan, Benjamin Lion, Frédéric Besson, Jean-Pierre Talpin:
Making an eBPF Virtual Machine Faster on Microcontrollers: Verified Optimization and Proof Simplification. SETTA 2023: 385-401 - 2022
- [c31]Shenghao Yuan, Frédéric Besson, Jean-Pierre Talpin, Samuel Hym, Koen Zandberg, Emmanuel Baccelli:
End-to-End Mechanized Proof of an eBPF Virtual Machine for Micro-controllers. CAV (2) 2022: 293-316 - [c30]Koen Zandberg, Emmanuel Baccelli, Shenghao Yuan, Frédéric Besson, Jean-Pierre Talpin:
Femto-containers: lightweight virtualization and fault isolation for small software functions on low-power IoT microcontrollers. Middleware 2022: 161-173 - [i3]Koen Zandberg, Emmanuel Baccelli, Shenghao Yuan, Frédéric Besson, Jean-Pierre Talpin:
Femto-Containers: Lightweight Virtualization and Fault Isolation For Small Software Functions on Low-Power IoT Microcontrollers. CoRR abs/2210.03432 (2022) - 2021
- [c29]Frédéric Besson:
Itauto: An Extensible Intuitionistic SAT Solver. ITP 2021: 9:1-9:18
2010 – 2019
- 2019
- [j6]Frédéric Besson, Sandrine Blazy, Pierre Wilke:
A Verified CompCert Front-End for a Memory Model Supporting Pointer Arithmetic and Uninitialised Data. J. Autom. Reason. 62(4): 433-480 (2019) - [j5]Frédéric Besson, Sandrine Blazy, Pierre Wilke:
CompCertS: A Memory-Aware Verified C Compiler Using a Pointer as Integer Semantics. J. Autom. Reason. 63(2): 369-392 (2019) - [c28]Frédéric Besson, Alexandre Dang, Thomas P. Jensen:
Information-Flow Preservation in Compiler Optimisations. CSF 2019: 230-242 - [c27]Frédéric Besson, Sandrine Blazy, Alexandre Dang, Thomas P. Jensen, Pierre Wilke:
Compiling Sandboxes: Formally Verified Software Fault Isolation. ESOP 2019: 499-524 - 2018
- [c26]Frédéric Besson, Alexandre Dang, Thomas P. Jensen:
Securing Compilation Against Memory Probing. PLAS@CCS 2018: 29-40 - [c25]Frédéric Besson, Thomas P. Jensen, Julien Lepiller:
Modular Software Fault Isolation as Abstract Interpretation. SAS 2018: 166-186 - 2017
- [c24]Frédéric Besson, Sandrine Blazy, Pierre Wilke:
CompCertS: A Memory-Aware Verified C Compiler Using Pointer as Integer Semantics. ITP 2017: 81-97 - 2016
- [c23]Frédéric Besson, Nataliia Bielova, Thomas P. Jensen:
Hybrid Monitoring of Attacker Knowledge. CSF 2016: 225-238 - [i2]Nataliia Bielova, Frédéric Besson, Thomas P. Jensen:
Using JavaScript Monitoring to Prevent Device Fingerprinting. ERCIM News 2016(106) (2016) - 2015
- [c22]Frédéric Besson, Sandrine Blazy, Pierre Wilke:
A Concrete Memory Model for CompCert. ITP 2015: 67-83 - 2014
- [c21]Frédéric Besson, Sandrine Blazy, Pierre Wilke:
A Precise and Abstract Memory Model for C Using Symbolic Values. APLAS 2014: 449-468 - [c20]Frédéric Besson, Nataliia Bielova, Thomas P. Jensen:
Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach. NordSec 2014: 181-196 - [c19]Frédéric Besson, Thomas P. Jensen, Pierre Vittet:
SawjaCard: A Static Analysis Tool for Certifying Java Card Applications. SAS 2014: 51-67 - 2013
- [c18]Frédéric Besson, Nataliia Bielova, Thomas P. Jensen:
Hybrid Information Flow Monitoring against Web Tracking. CSF 2013: 240-254 - [c17]Frédéric Besson, Pierre-Emmanuel Cornilleau, Thomas P. Jensen:
Result Certification of Static Program Analysers with Automated Theorem Provers. VSTTE 2013: 304-325 - 2012
- [c16]Frédéric Besson, Pierre-Emmanuel Cornilleau, Ronan Saillard:
Walking through the Forest: Fast EUF Proof-Checking Algorithms. PxTP 2012: 58-64 - 2011
- [c15]Frédéric Besson, Pierre-Emmanuel Cornilleau, David Pichardie:
Modular SMT Proofs for Fast Reflexive Checking Inside Coq. CPP 2011: 151-166 - [c14]Frédéric Besson, Pierre-Emmanuel Cornilleau, David Pichardie:
A Nelson-Oppen based Proof System using Theory Specific Proof Systems. PxTP 2011: 1-14 - [c13]Frédéric Besson, Pascal Fontaine, Laurent Théry:
A Flexible Proof Format for SMT: a Proposal. PxTP 2011: 15-26 - 2010
- [j4]Frédéric Besson, Guillaume Dufay, Thomas P. Jensen, David Pichardie:
Verifying resource access control on mobile interactive devices. J. Comput. Secur. 18(6): 971-998 (2010) - [c12]Laurent Hubert, Nicolas Barré, Frédéric Besson, Delphine Demange, Thomas P. Jensen, Vincent Monfort, David Pichardie, Tiphaine Turpin:
Sawja: Static Analysis Workshop for Java. FoVeOOS 2010: 92-106 - [c11]Frédéric Besson, Thomas P. Jensen, David Pichardie, Tiphaine Turpin:
Certified Result Checking for Polyhedral Analysis of Bytecode Programs. TGC 2010: 253-267 - [i1]Laurent Hubert, Nicolas Barré, Frédéric Besson, Delphine Demange, Thomas P. Jensen, Vincent Monfort, David Pichardie, Tiphaine Turpin:
Sawja: Static Analysis Workshop for Java. CoRR abs/1007.3353 (2010)
2000 – 2009
- 2009
- [c10]Frédéric Besson:
CPA beats ∞-CFA. FTfJP@ECOOP 2009: 7:1-7:6 - [c9]Frédéric Besson, David Cachera, Thomas P. Jensen, David Pichardie:
Certified Static Analysis by Abstract Interpretation. FOSAD 2009: 223-257 - 2008
- [c8]Frédéric Besson, Thomas P. Jensen, Tiphaine Turpin:
Computing Stack Maps with Interfaces. ECOOP 2008: 642-666 - 2007
- [c7]Frédéric Besson, Thomas P. Jensen, Tiphaine Turpin:
Small Witnesses for Abstract Interpretation-Based Proofs. ESOP 2007: 268-283 - 2006
- [j3]Frédéric Besson, Thomas P. Jensen, David Pichardie:
Proof-carrying code from certified abstract interpretation and fixpoint compression. Theor. Comput. Sci. 364(3): 273-291 (2006) - [c6]Frédéric Besson, Guillaume Dufay, Thomas P. Jensen:
A Formal Model of Access Control for Mobile Interactive Devices. ESORICS 2006: 110-126 - [c5]Frédéric Besson:
Fast Reflexive Arithmetic Tactics the Linear Case and Beyond. TYPES 2006: 48-62 - 2005
- [j2]Frédéric Besson, Thomas de Grenier de Latour, Thomas P. Jensen:
Interfaces for stack inspection. J. Funct. Program. 15(2): 179-217 (2005) - 2004
- [c4]Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon:
From Stack Inspection to Access Control: A Security Analysis for Libraries. CSFW 2004: 61- - 2003
- [c3]Frédéric Besson, Thomas P. Jensen:
Modular Class Analysis with DATALOG. SAS 2003: 19-36 - 2002
- [c2]Frédéric Besson, Thomas de Grenier de Latour, Thomas P. Jensen:
Secure calling contexts for stack inspection. PPDP 2002: 76-87 - 2001
- [j1]Frédéric Besson, Thomas P. Jensen, Daniel Le Métayer:
Model Checking Security Properties of Control Flow Graphs. J. Comput. Secur. 9(3): 217-250 (2001)
1990 – 1999
- 1999
- [c1]Frédéric Besson, Thomas P. Jensen, Jean-Pierre Talpin:
Polyhedral Analysis for Synchronous Languages. SAS 1999: 51-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint