default search action
Gilles Grimaud
Person information
- affiliation: LIFL Lille, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c47]Clément Boin, Tristan Groléat, Xavier Guillaume, Gilles Grimaud, Michaël Hauspie:
Scale matters: a Comparative Study of Datasets for DDoS Attack Detection in CSP Infrastructure. CloudNet 2023: 27-35 - [c46]Olivier Lourme, Gilles Grimaud, Michaël Hauspie:
ZBDS2023: A multi location Zigbee dataset to build innovative IoT Intrusion Detection Systems. WiMob 2023: 84-91 - [i3]Nicolas Dejon, Chrystel Gaber, Gilles Grimaud:
From MMU to MPU: adaptation of the Pip kernel to constrained devices. CoRR abs/2301.04546 (2023) - 2022
- [c45]Florian Vanhems, Vlad Rusu, David Nowak, Gilles Grimaud:
A Formal Correctness Proof for an EDF Scheduler Implementation. RTAS 2022: 281-292 - [i2]Clément Boin, Xavier Guillaume, Gilles Grimaud, Tristan Groléat, Michaël Hauspie:
One Year of DDoS Attacks Against a Cloud Provider: an Overview. CoRR abs/2208.14205 (2022) - 2021
- [c44]François Bouchaud, Thomas Vantroys, Gilles Grimaud:
Forensic analysis of IoT ecosystem. FiCloud 2021: 115-122 - [c43]Nicolas Dejon, Chrystel Gaber, Gilles Grimaud:
Nested compartmentalisation for constrained devices. FiCloud 2021: 334-341 - 2020
- [j7]Vlad Rusu, Gilles Grimaud, Michaël Hauspie:
Proving partial-correctness and invariance properties of transition-system models. Sci. Comput. Program. 186 (2020) - [c42]François Bouchaud, Thomas Vantroys, Gilles Grimaud, Pierrick Buret:
Discovering Connected Objects in the Criminal Investigations. COINS 2020: 1-6 - [c41]Étienne Helluy-Lafont, Alexandre Boé, Gilles Grimaud, Michaël Hauspie:
Bluetooth devices fingerprinting using low cost SDR. FMEC 2020: 289-294 - [c40]François Bouchaud, Thomas Vantroys, Gilles Grimaud:
Evidence Gathering in IoT Criminal Investigation. ICDF2C 2020: 44-61
2010 – 2019
- 2019
- [j6]François Bouchaud, Gilles Grimaud, Thomas Vantroys, Pierrick Buret:
Digital Investigation of IoT Devices in the Criminal Scene. J. Univers. Comput. Sci. 25(9): 1199-1218 (2019) - 2018
- [j5]Narjes Jomaa, Paolo Torrini, David Nowak, Gilles Grimaud, Samuel Hym:
Proof-Oriented Design of a Separation Kernel with Minimal Trusted Computing Base. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 76 (2018) - [j4]Narjes Jomaa, David Nowak, Gilles Grimaud, Samuel Hym:
Formal proof of dynamic memory isolation based on MMU. Sci. Comput. Program. 162: 76-92 (2018) - [c39]François Bouchaud, Gilles Grimaud, Thomas Vantroys:
IoT Forensic: identification and classification of evidence in criminal investigations. ARES 2018: 60:1-60:9 - [c38]Quentin Bergougnoux, Julien Cartigny, Gilles Grimaud:
Porting the Pip Proto-Kernel's Model to Multi-core Environments. DASC/PiCom/DataCom/CyberSciTech 2018: 584-591 - [c37]Nadir Cherifi, Alexandre Boe, Thomas Vantroys, Colombe Herault, Gilles Grimaud:
A low-cost energy consumption measurement platform. INTESA@ESWEEK 2018: 7-12 - [c36]Christophe Bacara, Damien Deville, Michaël Hauspie, Gilles Grimaud:
Challenges for the design of a privacy-preserving, multi-domain telemetry system for widely-spread network security appliances. P2DS@EuroSys 2018: 4:1-4:6 - [c35]Mahieddine Yaker, Chrystel Gaber, Gilles Grimaud, Jean-Philippe Wary, Julien Cartigny, Xiao Han, Vicente Sanchez-Leighton:
Ensuring IoT Security with an Architecture Based on a Separation Kernel. FiCloud 2018: 120-127 - [c34]Vlad Rusu, Gilles Grimaud, Michaël Hauspie:
Proving Partial-Correctness and Invariance Properties of Transition-System Models. TASE 2018: 60-67 - 2017
- [c33]Nadir Cherifi, Thomas Vantroys, Alexandre Boe, Colombe Herault, Gilles Grimaud:
Automatic Inference of Energy Models for Peripheral Components in Embedded Systems. FiCloud 2017: 120-127 - [c32]Valentin Lefils, Gilles Grimaud, Julien Iguchi-Cartigny:
EE-CFI: Externalized Control Flow Integrity for Embedded Devices. IMIS 2017: 321-329 - 2016
- [c31]Nadir Cherifi, Gilles Grimaud, Alexandre Boe, Thomas Vantroys:
Toward Energy Profiling of Connected Embedded Systems. NTMS 2016: 1-4 - [c30]Narjes Jomaa, David Nowak, Gilles Grimaud, Samuel Hym:
Formal Proof of Dynamic Memory Isolation Based on MMU. TASE 2016: 73-80 - 2015
- [c29]Nadir Cherifi, Gilles Grimaud, Thomas Vantroys, Alexandre Boe:
Energy Consumption of Networked Embedded Systems. FiCloud 2015: 639-644 - [c28]Christophe Bacara, Valentin Lefils, Julien Iguchi-Cartigny, Gilles Grimaud, Jean-Philippe Wary:
Virtual Keyboard Logging Counter-Measures Using Human Vision Properties. HPCC/CSS/ICESS 2015: 1230-1235 - 2012
- [c27]Damien Riquet, Gilles Grimaud, Michaël Hauspie:
Large-Scale Coordinated attacks: Impact on the Cloud Security. IMIS 2012: 558-563 - 2010
- [j3]Alexandre Courbot, Gilles Grimaud, Jean-Jacques Vandewalle:
Efficient off-board deployment and customization of virtual machine-based embedded systems. ACM Trans. Embed. Comput. Syst. 9(3): 21:1-21:53 (2010) - [c26]Geoffroy Cogniaux, Gilles Grimaud:
Key-Study to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale. CARDIS 2010: 102-117 - [c25]Geoffroy Cogniaux, Gilles Grimaud:
Impact of Pages Sizes to Execute Code Using Demand Paging and NAND Flash at Smart Card Scale. CISIS 2010: 794-799 - [c24]Simon Duquennoy, Gilles Grimaud:
Efficient Web Requests Scheduling Considering Resources Sharing. MASCOTS 2010: 410-412
2000 – 2009
- 2009
- [c23]Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vandewalle:
Smews: Smart and Mobile Embedded Web Server. CISIS 2009: 571-576 - [c22]Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vandewalle:
Serving embedded content via web applications: model, design and experimentation. EMSOFT 2009: 117-126 - [c21]Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vandewalle:
The Web of Things: Interconnecting Devices with High Usability and Performance. ICESS 2009: 323-330 - [c20]Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vandewalle:
Consistency and scalability in event notification for embedded Web applications. WSE 2009: 89-98 - [p1]Kevin Marquet, Gilles Grimaud:
Object Memory Management for Constrained Devices with Heterogeneous Memories. Intelligent Technical Systems 2009: 219-232 - 2008
- [e1]Gilles Grimaud, François-Xavier Standaert:
Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings. Lecture Notes in Computer Science 5189, Springer 2008, ISBN 978-3-540-85892-8 [contents] - 2007
- [j2]Gilles Grimaud, Yann Hodique, Isabelle Simplot-Ryl:
On the use of metatypes for safe embedded operating system extension. Int. J. Parallel Emergent Distributed Syst. 22(1): 1-13 (2007) - [c19]Gilles Grimaud, Yann Hodique, Isabelle Simplot-Ryl:
A Verifiable Lightweight Escape Analysis Supporting Creational Design Patterns. AINA Workshops (2) 2007: 440-447 - [c18]Kevin Marquet, Gilles Grimaud:
A DSL approach for object memory management of small devices. PPPJ 2007: 155-164 - [c17]Nadia Bel Hadj Aissa, Gilles Grimaud, Vincent Bénony:
Bringing Worst Case Execution Time Awareness to an Open Smart Card OS. RTCSA 2007: 497-503 - [c16]Kevin Marquet, Gilles Grimaud:
A DSL approach for object memory management of small devices. PLOS@SOSP 2007: 4:1-4:5 - [c15]Kevin Marquet, Gilles Grimaud:
An object memory management solution for small devices with heterogeneous memories. WISES 2007: 227-237 - [c14]Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl:
An Information Flow Verifier for Small Embedded Systems. WISTP 2007: 189-201 - 2006
- [c13]Gilles Grimaud, Antoine Honore, Hervé Meunier, David Simplot-Ryl:
Efficient Packet Scheduler For Wireless Ad Hoc Networks With Switched Beam Antennas. AINA (1) 2006: 523-527 - [c12]Alexandre Courbot, Mariela Pavlova, Gilles Grimaud, Jean-Jacques Vandewalle:
A Low-Footprint Java-to-Native Compilation Scheme Using Formal Methods. CARDIS 2006: 329-344 - [c11]Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl, Yanguo Liu, Issa Traoré:
Integrated Security Verification and Validation: Case Study. LCN 2006: 1000-1007 - [c10]Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl:
Embedding verifiable information flow analysis. PST 2006: 39 - [i1]Christophe Rippert, Alexandre Courbot, Gilles Grimaud:
A Low-Footprint Class Loading Mechanism for Embedded Java Virtual Machines. CoRR abs/cs/0611055 (2006) - 2005
- [c9]Alexandre Courbot, Gilles Grimaud, Jean-Jacques Vandewalle:
Romization: Early Deployment and Customization of Java Systems for Constrained Devices. CASSIS 2005: 57-76 - [c8]Alexandre Courbot, Gilles Grimaud, Jean-Jacques Vandewalle, David Simplot-Ryl:
Application-Driven Customization of an Embedded Java Virtual Machine. EUC Workshops 2005: 81-90 - [c7]Kevin Marquet, Alexandre Courbot, Gilles Grimaud:
Ahead of Time Deployment in ROM of a Java-OS. ICESS 2005: 63-70 - [c6]Gilles Grimaud, Yann Hodique, Isabelle Simplot-Ryl:
Secure extensible type system for efficient embedded operating system by using metatypes. ICPADS (2) 2005: 83-87 - 2004
- [c5]Christophe Rippert, Alexandre Courbot, Gilles Grimaud:
A low-footprint class loading mechanism for embedded Java virtual machines. PPPJ 2004: 75-82 - 2002
- [j1]Gilles Grimaud, Sébastien Jean:
Code mobile et carte à puce. Tech. Sci. Informatiques 21(6): 797-822 (2002) - [c4]Damien Deville, Gilles Grimaud:
Building an "Impossible" Verifier on a Java Card. WIESS 2002: 16-24 - 2000
- [c3]Antoine Requet, Ludovic Casset, Gilles Grimaud:
Application of the B formal method to the proof of a type verification algorithm. HASE 2000: 115-124
1990 – 1999
- 1999
- [c2]Gilles Grimaud, Jean-Louis Lanet, Jean-Jacques Vandewalle:
FACADE: A Typed Intermediate Language Dedicated to Smart Cards. ESEC / SIGSOFT FSE 1999: 476-493 - 1998
- [c1]Didier Donsez, Gilles Grimaud, Sylvain Lecomte:
Recoverable Persistent Memory for SmartCard. CARDIS 1998: 134-140
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-29 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint