What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Aurélien Francillon
Google Scholar
43
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels.
Pierre Ayoub
Aurélien Hernandez
Romain Cayre
Aurélien Francillon
Clémentine Maurice
2024
conf/asiaccs
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers.
Romain Cayre
Vincent Nicomette
Guillaume Auriol
Mohamed Kaâniche
Aurélien Francillon
2024
conf/asiaccs
X-Ray-TLS: Transparent Decryption of TLS Sessions by Extracting Session Keys from Memory.
Florent Moriconi
Olivier Levillain
Aurélien Francillon
Raphaël Troncy
2024
conf/acsac
BlueScream: Screaming Channels on Bluetooth Low Energy.
Pierre Ayoub
Romain Cayre
Aurélien Francillon
Clémentine Maurice
2023
conf/sp
ESPwn32: Hacking with ESP32 System-on-Chips.
Romain Cayre
Damien Cauquil
Aurélien Francillon
2023
conf/sp
Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems.
Florent Moriconi
Axel Ilmari Neergaard
Lucas Georget
Samuel Aubertin
Aurélien Francillon
2022
conf/sp
Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security.
Giovanni Camurati
Aurélien Francillon
2022
conf/eurosp
BEERR: Bench of Embedded system Experiments for Reproducible Research.
Paul Olivier
Xuan-Huy Ngo
Aurélien Francillon
2021
conf/asiaccs
SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Andrew Fasano
Tiemoko Ballo
Marius Muench
Tim Leek
Alexander Bulekov
Brendan Dolan-Gavitt
Manuel Egele
Aurélien Francillon
Long Lu
Nick Gregory
Davide Balzarotti
William Robertson
2021
conf/ndss
Understanding and Detecting International Revenue Share Fraud.
Merve Sahin
Aurélien Francillon
2021
conf/ndss
SymQEMU: Compilation-based symbolic execution for binaries.
Sebastian Poeplau
Aurélien Francillon
2020
journals/tches
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks.
Giovanni Camurati
Aurélien Francillon
François-Xavier Standaert
2020
conf/uss
Symbolic execution with SymCC: Don't interpret, compile!
Sebastian Poeplau
Aurélien Francillon
2020
conf/dsn
HardSnap: Leveraging Hardware Snapshotting for Embedded Systems Security Testing.
Nassim Corteggiani
Aurélien Francillon
2019
conf/acsac
Systematic comparison of symbolic execution systems: intermediate representation and its generation.
Sebastian Poeplau
Aurélien Francillon
2018
conf/ccs
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers.
Giovanni Camurati
Sebastian Poeplau
Marius Muench
Tom Hayes
Aurélien Francillon
2018
conf/uss
Inception: System-Wide Security Testing of Real-World Embedded Systems Software.
Nassim Corteggiani
Giovanni Camurati
Aurélien Francillon
2018
conf/sec
Smashing the Stack Protector for Fun and Profit.
Bruno Bierbaumer
Julian Kirsch
Thomas Kittel
Aurélien Francillon
Apostolis Zarras
2018
conf/ndss
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
Marius Muench
Jan Stijohann
Frank Kargl
Aurélien Francillon
Davide Balzarotti
2017
conf/sec
Towards Automated Classification of Firmware Images and Identification of Embedded Devices.
Andrei Costin
Apostolis Zarras
Aurélien Francillon
2017
conf/soups
Using chatbots against voice spam: Analyzing Lenny's effectiveness.
Merve Sahin
Marc Relieu
Aurélien Francillon
2017
conf/eurosp
SoK: Fraud in Telephony Networks.
Merve Sahin
Aurélien Francillon
Payas Gupta
Mustaque Ahamad
2016
conf/ccs
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces.
Andrei Costin
Apostolis Zarras
Aurélien Francillon
2016
conf/ccs
Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next?
Aurélien Francillon
2016
conf/ccs
Over-The-Top Bypass: Study of a Recent Telephony Fraud.
Merve Sahin
Aurélien Francillon
2015
conf/acsac
PIE: Parser Identification in Embedded Systems.
Lucian Cojocar
Jonas Zaddach
Roel Verdult
Herbert Bos
Aurélien Francillon
Davide Balzarotti
2014
conf/ccs
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment.
Gábor Pék
Andrea Lanzi
Abhinav Srivastava
Davide Balzarotti
Aurélien Francillon
Christoph Neumann
2014
conf/uss
A Large-Scale Analysis of the Security of Embedded Firmwares.
Andrei Costin
Jonas Zaddach
Aurélien Francillon
Davide Balzarotti
2014
conf/fc
Confidentiality Issues on a GPU in a Virtualized Environment.
Clémentine Maurice
Christoph Neumann
Olivier Heen
Aurélien Francillon
2014
conf/ndss
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
Jonas Zaddach
Luca Bruno
Aurélien Francillon
Davide Balzarotti
2014
conf/dsn
Optical Delusions: A Study of Malicious QR Codes in the Wild.
Amin Kharraz
Engin Kirda
William K. Robertson
Davide Balzarotti
Aurélien Francillon
2014
conf/wisec
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission.
Jagdish Prasad Achara
Mathieu Cunche
Vincent Roca
Aurélien Francillon
2014
conf/wisec
Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design.
Andrei Costin
Aurélien Francillon
2013
conf/sp
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations.
Jelena Isacenkova
Olivier Thonnard
Andrei Costin
Davide Balzarotti
Aurélien Francillon
2013
conf/acsac
Implementation and implications of a stealth hard-drive backdoor.
Jonas Zaddach
Anil Kurmus
Davide Balzarotti
Erik-Oliver Blass
Aurélien Francillon
Travis Goodspeed
Moitrayee Gupta
Ioannis Koltsidas
2012
conf/ndss
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
Karim Eldefrawy
Gene Tsudik
Aurélien Francillon
Daniele Perito
2012
conf/acsac
Enabling trusted scheduling in embedded systems.
Ramya Jayaram Masti
Claudio Marforio
Aanjhan Ranganathan
Aurélien Francillon
Srdjan Capkun
2012
conf/acsac
Analysis of the communication between colluding applications on modern smartphones.
Claudio Marforio
Hubert Ritzdorf
Aurélien Francillon
Srdjan Capkun
2012
conf/wisec
Physical-layer attacks on chirp-based ranging systems.
Aanjhan Ranganathan
Boris Danev
Aurélien Francillon
Srdjan Capkun
2011
conf/ndss
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.
Aurélien Francillon
Boris Danev
Srdjan Capkun
2009
conf/ccs
On the difficulty of software-based attestation of embedded devices.
Claude Castelluccia
Aurélien Francillon
Daniele Perito
Claudio Soriente
2009
conf/ccs
Defending embedded systems against control flow attacks.
Aurélien Francillon
Daniele Perito
Claude Castelluccia
2008
conf/ccs
Code injection attacks on harvard-architecture devices.
Aurélien Francillon
Claude Castelluccia
Coauthors
Aanjhan Ranganathan
(2)
Abhinav Srivastava
(1)
Alexander Bulekov
(1)
Amin Kharraz
(1)
Andrea Lanzi
(1)
Andrei Costin
(5)
Andrew Fasano
(1)
Anil Kurmus
(1)
Apostolis Zarras
(3)
Aurélien Francillon
(43)
Aurélien Hernandez
(1)
Axel Ilmari Neergaard
(1)
Boris Danev
(2)
Brendan Dolan-Gavitt
(1)
Bruno Bierbaumer
(1)
Christoph Neumann
(2)
Claude Castelluccia
(3)
Claudio Marforio
(2)
Claudio Soriente
(1)
Clémentine Maurice
(3)
Damien Cauquil
(1)
Daniele Perito
(3)
Davide Balzarotti
(9)
Engin Kirda
(1)
Erik-Oliver Blass
(1)
Florent Moriconi
(2)
François-Xavier Standaert
(1)
Frank Kargl
(1)
Gábor Pék
(1)
Gene Tsudik
(1)
Giovanni Camurati
(4)
Guillaume Auriol
(1)
Herbert Bos
(1)
Hubert Ritzdorf
(1)
Ioannis Koltsidas
(1)
Jagdish Prasad Achara
(1)
Jan Stijohann
(1)
Jelena Isacenkova
(1)
Jonas Zaddach
(4)
Julian Kirsch
(1)
Karim Eldefrawy
(1)
Long Lu
(1)
Luca Bruno
(1)
Lucas Georget
(1)
Lucian Cojocar
(1)
Manuel Egele
(1)
Marc Relieu
(1)
Marius Muench
(3)
Mathieu Cunche
(1)
Merve Sahin
(4)
Mohamed Kaâniche
(1)
Moitrayee Gupta
(1)
Mustaque Ahamad
(1)
Nassim Corteggiani
(2)
Nick Gregory
(1)
Olivier Heen
(1)
Olivier Levillain
(1)
Olivier Thonnard
(1)
Paul Olivier
(1)
Payas Gupta
(1)
Pierre Ayoub
(2)
Ramya Jayaram Masti
(1)
Raphaël Troncy
(1)
Roel Verdult
(1)
Romain Cayre
(4)
Samuel Aubertin
(1)
Sebastian Poeplau
(4)
Srdjan Capkun
(4)
Thomas Kittel
(1)
Tiemoko Ballo
(1)
Tim Leek
(1)
Tom Hayes
(1)
Travis Goodspeed
(1)
Vincent Nicomette
(1)
Vincent Roca
(1)
William K. Robertson
(1)
William Robertson
(1)
Xuan-Huy Ngo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to