Clémentine Maurice

According to our database1, Clémentine Maurice authored at least 26 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Nethammer: Inducing Rowhammer Faults through Network Requests.
CoRR, 2018

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls.
IACR Cryptology ePrint Archive, 2017

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
CoRR, 2017

Malware Guard Extension: Using SGX to Conceal Cache Attacks.
CoRR, 2017

KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks.
CoRR, 2017

Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
Proceedings of the Financial Cryptography and Data Security, 2017

KASLR is Dead: Long Live KASLR.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Proceedings of the Computer Security - ESORICS 2017, 2017

Malware Guard Extension: Using SGX to Conceal Cache Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

ARMageddon: Cache Attacks on Mobile Devices.
Proceedings of the 25th USENIX Security Symposium, 2016

Flush+Flush: A Fast and Stealthy Cache Attack.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Information leakage on shared hardware : evolutions in recent hardware and applications to virtualization. (Fuites d'information dans les processeurs récents et applications à la virtualisation).
PhD thesis, 2015

Reverse Engineering Intel DRAM Addressing and Exploitation.
CoRR, 2015

Flush+Flush: A Stealthier Last-Level Cache Attack.
CoRR, 2015

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript.
CoRR, 2015

Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

C5: Cross-Cores Cache Covert Channel.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
Confidentiality Issues on a GPU in a Virtualized Environment.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting.
Proceedings of the SECRYPT 2013, 2013


  Loading...