Through the looking-glass, and what eve found there

Aurélien Francillon , Davide Balzarotti , Mariano Graziano , Luca Bruno
WOOT'14 Proceedings of the 8th USENIX conference on Offensive Technologies 6 -6

3
2014
A large-scale analysis of the security of embedded firmwares

Andrei Costin , Jonas Zaddach , Aurélien Francillon , Davide Balzarotti
usenix security symposium 95 -110

2014
Systematic Treatment of Remote Attestation.

Aurélien Francillon , Gene Tsudik , Kasper Bonne Rasmussen , Quan Nguyen
IACR Cryptology ePrint Archive 2012 713

19
2012
Half-blind attacks: mask ROM bootloaders are dangerous

Aurélien Francillon , Travis Goodspeed
WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies 6 -6

9
2009
Attacking and Protecting Constrained Embedded Systems from Control Flow Attacks

Aurélien Francillon
Institut National Polytechnique de Grenoble - INPG

5
2009
Using chatbots against voice spam: Analyzing Lenny’s effectiveness

Aurélien Francillon , Marc Relieu , Merve Sahin
symposium on usable privacy and security 319 -337

5
2017
Inception: system-wide security testing of real-world embedded systems software

Aurélien Francillon , Giovanni Camurati , Nassim Corteggiani
usenix security symposium 309 -326

25
2018
A configurational approach to conversational lures

Aurélien Francillon , Marc Relieu , Merve Sahin
Reseaux ( 2) 81 -111

2020
Symbolic execution with SymCC: Don't interpret, compile!

Aurélien Francillon , Sebastian Poeplau
usenix security symposium 181 -198

86
2020
SymQEMU: Compilation-based symbolic execution for binaries

Aurélien Francillon , Sebastian Poeplau
network and distributed system security symposium

31
2021
Understanding and Detecting International Revenue Share Fraud

Aurélien Francillon , Merve Sahin
network and distributed system security symposium

2021
SoK: Enabling Security Analyses of Embedded Systems via Rehosting

Davide Balzarotti , Manuel Egele , Brendan Dolan-Gavitt , Tim Leek
computer and communications security

17
2021
The role of web hosting providers in detecting compromised websites

Davide Canali , Davide Balzarotti , Aurélien Francillon
Proceedings of the 22nd international conference on World Wide Web - WWW '13 177 -188

93
2013
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks

Giovanni Camurati , Aurélien Francillon , François-Xavier Standaert
cryptographic hardware and embedded systems 2020 358 -401

1
2020
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters

Clémentine Maurice , Nicolas Le Scouarnec , Christoph Neumann , Olivier Heen
recent advances in intrusion detection 48 -65

108
2015
Trust, but verify: Why and how to establish trust in embedded devices

Aurélien Francillon
design, automation, and test in europe 1178 -1182

2
2016
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers

Giovanni Camurati , Sebastian Poeplau , Marius Muench , Tom Hayes
computer and communications security 163 -177

130
2018
Over-The-Top Bypass: Study of a Recent Telephony Fraud

Merve Sahin , Aurélien Francillon
computer and communications security 1106 -1117

9
2016
Analysis of the communication between colluding applications on modern smartphones

Claudio Marforio , Hubert Ritzdorf , Aurélien Francillon , Srdjan Capkun
Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12 51 -60

133
2012