List of published papers

Wookey: The USB battlefront warrior

_images/video.png
Paper infos  
Authors
  1. Benadjila, A. Michelizza, M. Renard, P. Thierry, P. Trebuchet
Conference Embedded recipes
Year 2018
Speakers
  1. Benadjila, M. Renard

Wookey: USB Devices strikes back

_images/pdf.png
Paper infos  
Authors
  1. Benadjila, J. Lefaure, A. Michelizza, M. Renard, P. Thierry, P. Trebuchet
Conference SSTIC
Year 2018

First paper about the Wookey project (see project part), describing the general Wookey project architecture.

KVM: focus sur l’implémentation d’un hyperviseur dans Linux

ed-diamond
Paper infos  
Authors
  1. Thierry
Journal GNU/Linux Magazine France HS 87
Year 2016

A framework for a secure embedded filtering connector for multi-criticality systronic systems

_images/pdf.png
Paper infos  
Authors
  1. Thierry, L. George, J.M Lacroix
Conference ETFA
Year 2013

Thesis paper on military vehicle on-board secure and real-time gateway architecture.

Relaxing Mixed-Criticality Scheduling Strictness for Task Sets Scheduled with FP

_images/pdf.png
Paper infos  
Authors
  1. Santy, L. George, P. Thierry, J. Goossens
Conference ECRTS
Year 2012

Thesis paper about mixed-criticality and criticality reduction state detection.

Toward the integration of GRSecurity in embedded Android operating system

_images/pdf.png
Paper infos  
Authors
  1. Leroy, P. Thierry
Conference ELCE
Year 2011

First attempt to include high level of hardening on Android kernel, some months before SEAndroid was made public.

Real-time scheduling analysis for ARINC-based virtualized systems

_images/pdf.png
Paper infos  
Authors
  1. Thierry, L. George, J-F Hermant
Conference MAPSP
Year 2011

Thesis paper on highly constraints TDM+EDF based hierarchical scheduling.

Toward a predictable and secure data cache algorithm: a cross-layer approach

_images/pdf.png
Paper infos  
Authors
  1. Thierry, L. George, J-F Hermant, F. Germain, D. Ragot, J-M Lacroix
Conference ISPS
Year 2011

Thesis paper on the impact of the cache algorithms and the various way to include security constraints in the cache controller behavior.