Seguir
Aurélien Francillon
Aurélien Francillon
Professor, EURECOM
Dirección de correo verificada de eurecom.fr - Página principal
Título
Citado por
Citado por
Año
Smashing the stack protector for fun and profit
B Bierbaumer, J Kirsch, T Kittel, A Francillon, A Zarras
ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International …, 2018
15832018
A Large-Scale Analysis of the Security of Embedded Firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti
USENIX Security Symposium, 95-110, 2014
6052014
Relay attacks on passive keyless entry and start systems in modern cars
A Francillon, B Danev, S Capkun
NDSS 2011, Proceedings of the Network and Distributed System Security Symposium, 2011
5882011
SMART: Secure and Minimal Architecture for (establishing a dynamic) Root of Trust
K El Defrawy, A Francillon, D Perito, G Tsudik
Proceedings of the Network & Distributed System Security Symposium (NDSS …, 2012
4862012
AVATAR: A framework to support dynamic security analysis of embedded systems' firmwares
J Zaddach, L Bruno, A Francillon, D Balzarotti
NDSS 2014, Proceedings of the Network and Distributed System Security Symposium, 2014
4522014
Code injection attacks on Harvard-architecture devices
A Francillon, C Castelluccia
Proceedings of the 15th ACM conference on Computer and communications …, 2008
3922008
Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
A Costin, A Francillon
black hat USA 1, 1-12, 2012
3382012
Analysis of the communication between colluding applications on modern smartphones
C Marforio, H Ritzdorf, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 51-60, 2012
328*2012
EphPub: Toward Robust Ephemeral Publishing
C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar
19th International Conference on Network Protocols (ICNP),, 2011
3002011
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2932009
Automated dynamic firmware analysis at scale: a case study on embedded web interfaces
A Costin, A Zarras, A Francillon
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
2792016
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices
M Muench, J Stijohann, F Kargl, A Francillon, D Balzarotti
Network and Distributed System Security Symposium (NDSS'18), 2018
2612018
Reverse engineering Intel last-level cache complex addressing using performance counters
C Maurice, N Le Scouarnec, C Neumann, O Heen, A Francillon
International Symposium on Recent Advances in Intrusion Detection, 48-65, 2015
2522015
Screaming channels: When electromagnetic side channels meet radio transceivers
G Camurati, S Poeplau, M Muench, T Hayes, A Francillon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1862018
A minimalist approach to remote attestation
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
Proceedings of Design, Automation and Test in Europe (DATE), Dresden, Germany, 2014
1782014
Symbolic execution with SymCC: Don't interpret, compile!
S Poeplau, A Francillon
29th USENIX Security Symposium (USENIX Security 20), 181-198, 2020
1702020
Avatar²: A Multi-target Orchestration Platform
M Muench, D Nisi, A Francillon, D Balzarotti
Workshop on Binary Analysis Research (BAR) 2018 (co-located with NDSS 18), 2018
1642018
C5: Cross-Cores Cache Covert Channel
C Maurice, C Neumann, O Heen, A Francillon
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015
1542015
Toward the Analysis of Embedded Firmware through Automated Re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
1412019
Defending embedded systems against control flow attacks
A Francillon, D Perito, C Castelluccia
Proceedings of the first ACM workshop on Secure execution of untrusted code …, 2009
1332009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20