Aurélien Francillon

Orcid: 0000-0003-0584-8732

According to our database1, Aurélien Francillon authored at least 64 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

ESPwn32: Hacking with ESP32 System-on-Chips.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

2022
Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

BEERR: Bench of Embedded system Experiments for Reproducible Research.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Automated Identification of Flaky Builds using Knowledge Graphs.
Proceedings of the Companion Proceedings of the 23rd International Conference on Knowledge Engineering and Knowledge Management, 2022

2021
SoC Security Evaluation: Reflections on Methodology and Tooling.
IEEE Des. Test, 2021

Understanding and Detecting International Revenue Share Fraud.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

SymQEMU: Compilation-based symbolic execution for binaries.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Finding Software Bugs in Embedded Devices.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Symbolic execution with SymCC: Don't interpret, compile!
Proceedings of the 29th USENIX Security Symposium, 2020

HardSnap: Leveraging Hardware Snapshotting for Embedded Systems Security Testing.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Toward the Analysis of Embedded Firmware through Automated Re-hosting.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Lenny the bot as a resource for sequential analysis: exploring the treatment of Next Turn Repair Initiation in the beginnings of unsolicited calls.
Proceedings of the Mensch und Computer 2019, 2019

Systematic comparison of symbolic execution systems: intermediate representation and its generation.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Inception: System-Wide Security Testing of Real-World Embedded Systems Software.
Proceedings of the 27th USENIX Security Symposium, 2018

Smashing the Stack Protector for Fun and Profit.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Backdoors: Definition, Deniability and Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
SMASHUP: a toolchain for unified verification of hardware/software co-designs.
J. Cryptogr. Eng., 2017

Using chatbots against voice spam: Analyzing Lenny's effectiveness.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Towards Automated Classification of Firmware Images and Identification of Embedded Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

SoK: Fraud in Telephony Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs.
CoRR, 2016

Trust, but verify: Why and how to establish trust in embedded devices.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

Over-The-Top Bypass: Study of a Recent Telephony Fraud.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next?
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

C5: Cross-Cores Cache Covert Channel.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

PIE: Parser Identification in Embedded Systems.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Microcomputations as Micropayments in Web-based Services.
ACM Trans. Internet Techn., 2014

Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations.
EURASIP J. Inf. Secur., 2014

Through the Looking-Glass, and What Eve Found There.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

A Large-Scale Analysis of the Security of Embedded Firmwares.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Confidentiality Issues on a GPU in a Virtualized Environment.
Proceedings of the Financial Cryptography and Data Security, 2014

Optical Delusions: A Study of Malicious QR Codes in the Wild.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

A minimalist approach to Remote Attestation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
The role of web hosting providers in detecting compromised websites.
Proceedings of the 22nd International World Wide Web Conference, 2013

Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting.
Proceedings of the SECRYPT 2013, 2013

The role of phone numbers in understanding cyber-crime schemes.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Implementation and implications of a stealth hard-drive backdoor.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Systematic Treatment of Remote Attestation.
IACR Cryptol. ePrint Arch., 2012

Physical-layer attacks on chirp-based ranging systems.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Enabling trusted scheduling in embedded systems.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

Analysis of the communication between colluding applications on modern smartphones.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Pay as you browse: microcomputations as micropayments in web-based services.
Proceedings of the 20th International Conference on World Wide Web, 2011

EphPub: Toward robust Ephemeral Publishing.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

2010
Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols.
RFC, April, 2010

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.
IACR Cryptol. ePrint Arch., 2010

2009
Attacking and Protecting Constrained Embedded Systems from Control Flow Attacks.
PhD thesis, 2009

Half-Blind Attacks: Mask ROM Bootloaders are Dangerous.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

Defending embedded systems against control flow attacks.
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009

On the difficulty of software-based attestation of embedded devices.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Code injection attacks on harvard-architecture devices.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

2005
Impacts of packet scheduling and packet loss distribution on FEC Performances: observations and recommendations.
Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, 2005


  Loading...