Aurélien Francillon
Aurélien Francillon
Assistant Professor, EURECOM
Email verificata su eurecom.fr - Home page
TitoloCitata daAnno
Relay attacks on passive keyless entry and start systems in modern cars
A Francillon, B Danev, S Capkun
NDSS 2011, Proceedings of the Network and Distributed System Security Symposium, 2011
3422011
Code injection attacks on Harvard-architecture devices
A Francillon, C Castelluccia
Proceedings of the 15th ACM conference on Computer and communications …, 2008
2602008
A Large-Scale Analysis of the Security of Embedded Firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti
USENIX Security Symposium, 95-110, 2014
2232014
Analysis of the communication between colluding applications on modern smartphones
C Marforio, H Ritzdorf, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 51-60, 2012
221*2012
SMART: Secure and Minimal Architecture for (establishing a dynamic) Root of Trust
K El Defrawy, A Francillon, D Perito, G Tsudik
Proceedings of the Network & Distributed System Security Symposium (NDSS …, 2012
2182012
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1792009
Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
A Costin, A Francillon
Black Hat USA, 1-12, 2012
1642012
AVATAR: A framework to support dynamic security analysis of embedded systems' firmwares
J Zaddach, L Bruno, A Francillon, D Balzarotti
NDSS 2014, Proceedings of the Network and Distributed System Security Symposium, 2014
1262014
Reverse engineering Intel last-level cache complex addressing using performance counters
C Maurice, N Le Scouarnec, C Neumann, O Heen, A Francillon
International Symposium on Recent Advances in Intrusion Detection, 48-65, 2015
1012015
Defending embedded systems against control flow attacks
A Francillon, D Perito, C Castelluccia
Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009
942009
A minimalist approach to remote attestation
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
Proceedings of Design, Automation and Test in Europe (DATE), Dresden, Germany, 2014
882014
EphPub: Toward Robust Ephemeral Publishing
C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar
19th International Conference on Network Protocols (ICNP),, 2011
772011
TinyRNG: A cryptographic random number generator for wireless sensors network nodes
A Francillon, C Castelluccia
Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and …, 2007
762007
Implementation and Implications of a Stealth Hard-Drive Backdoor
J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ...
29th Annual Computer Security Applications Conference (ACSAC) , New Orleans, 2013
642013
Automated dynamic firmware analysis at scale: a case study on embedded web interfaces
A Costin, A Zarras, A Francillon
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
632016
The role of web hosting providers in detecting compromised websites
D Canali, D Balzarotti, A Francillon
22nd International World Wide Web Conference (WWW 2013), 2013
562013
C5: Cross-Cores Cache Covert Channel
C Maurice, C Neumann, O Heen, A Francillon
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015
542015
Confidentiality issues on a GPU in a virtualized environment
C Maurice, C Neumann, O Heen, A Francillon
International Conference on Financial Cryptography and Data Security, 119-135, 2014
362014
Inside the SCAM jungle: A closer look at 419 scam email operations
J Isacenkova, O Thonnard, A Costin, D Balzarotti, A Francillon
IWCC 2013, International Workshop on Cyber Crime, 2013
362013
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission
JP Achara, M Cunche, V Roca, A Francillon
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
272014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20