Aurélien Francillon
Aurélien Francillon
Assistant Professor, EURECOM
Bestätigte E-Mail-Adresse bei eurecom.fr - Startseite
TitelZitiert vonJahr
Relay attacks on passive keyless entry and start systems in modern cars
A Francillon, B Danev, S Capkun
NDSS 2011, Proceedings of the Network and Distributed System Security Symposium, 2011
3432011
Code injection attacks on Harvard-architecture devices
A Francillon, C Castelluccia
Proceedings of the 15th ACM conference on Computer and communications …, 2008
2622008
A Large-Scale Analysis of the Security of Embedded Firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti
USENIX Security Symposium, 95-110, 2014
2272014
Analysis of the communication between colluding applications on modern smartphones
C Marforio, H Ritzdorf, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 51-60, 2012
221*2012
SMART: Secure and Minimal Architecture for (establishing a dynamic) Root of Trust
K El Defrawy, A Francillon, D Perito, G Tsudik
Proceedings of the Network & Distributed System Security Symposium (NDSS …, 2012
2202012
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1822009
Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
A Costin, A Francillon
Black Hat USA, 1-12, 2012
1672012
AVATAR: A framework to support dynamic security analysis of embedded systems' firmwares
J Zaddach, L Bruno, A Francillon, D Balzarotti
NDSS 2014, Proceedings of the Network and Distributed System Security Symposium, 2014
1292014
Reverse engineering Intel last-level cache complex addressing using performance counters
C Maurice, N Le Scouarnec, C Neumann, O Heen, A Francillon
International Symposium on Recent Advances in Intrusion Detection, 48-65, 2015
1022015
Defending embedded systems against control flow attacks
A Francillon, D Perito, C Castelluccia
Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009
942009
A minimalist approach to remote attestation
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
Proceedings of Design, Automation and Test in Europe (DATE), Dresden, Germany, 2014
912014
EphPub: Toward Robust Ephemeral Publishing
C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar
19th International Conference on Network Protocols (ICNP),, 2011
782011
TinyRNG: A cryptographic random number generator for wireless sensors network nodes
A Francillon, C Castelluccia
Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and …, 2007
762007
Automated dynamic firmware analysis at scale: a case study on embedded web interfaces
A Costin, A Zarras, A Francillon
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
652016
Implementation and Implications of a Stealth Hard-Drive Backdoor
J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ...
29th Annual Computer Security Applications Conference (ACSAC) , New Orleans, 2013
652013
The role of web hosting providers in detecting compromised websites
D Canali, D Balzarotti, A Francillon
22nd International World Wide Web Conference (WWW 2013), 2013
572013
C5: Cross-Cores Cache Covert Channel
C Maurice, C Neumann, O Heen, A Francillon
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015
542015
Confidentiality issues on a GPU in a virtualized environment
C Maurice, C Neumann, O Heen, A Francillon
International Conference on Financial Cryptography and Data Security, 119-135, 2014
362014
Inside the SCAM jungle: A closer look at 419 scam email operations
J Isacenkova, O Thonnard, A Costin, D Balzarotti, A Francillon
IWCC 2013, International Workshop on Cyber Crime, 2013
362013
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission
JP Achara, M Cunche, V Roca, A Francillon
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
272014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20