Flavio D. Garcia

According to our database1, Flavio D. Garcia authored at least 52 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Watching your call: Breaking VoLTE Privacy in LTE/5G Networks.
Proc. Priv. Enhancing Technol., April, 2023

2022
Millimeter-Wave Automotive Radar Spoofing.
CoRR, 2022

Protocols for a Two-Tiered Trusted Computing Base.
Proceedings of the Computer Security - ESORICS 2022, 2022

MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Cutting Through the Complexity of Reverse Engineering Embedded Devices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Dismantling DST80-based Immobiliser Systems.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble.
IEEE Secur. Priv., 2020

Plundervolt: Software-based Fault Injection Attacks against Intel SGX.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Grey-box Analysis and Fuzzing of Automotive Electronic Components via Control-Flow Graph Extraction.
Proceedings of the CSCS '20: Computer Science in Cars Symposium, 2020

2019
IFAL: Issue First Activate Later Certificates for V2X.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Dismantling the AUT64 Automotive Cipher.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Automotive Cyber Security: Lessons Learned and Research Challenges.
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, 2018

Beneath the Bonnet: A Breakdown of Diagnostic Security.
Proceedings of the Computer Security, 2018

2017
Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps.
Proceedings of the Financial Cryptography and Data Security, 2017

Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality.
Proceedings of the Computer Security - ESORICS 2017, 2017

HumIDIFy: A Tool for Hidden Functionality Detection in Firmware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Spinner: Semi-Automatic Detection of Pinning without Hostname Verification.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems.
Proceedings of the 25th USENIX Security Symposium, 2016

LeiA: A Lightweight Authentication Protocol for CAN.
Proceedings of the Computer Security - ESORICS 2016, 2016

The Fall of a Tiny Star.
Proceedings of the New Codebreakers, 2016

On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Cryptanalysis of the Megamos Crypto Automotive Immobilizer.
login Usenix Mag., 2015

Relay Cost Bounding for Contactless EMV Payments.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Wirelessly lockpicking a smart card reader.
Int. J. Inf. Sec., 2014

2013
Cell-based privacy-friendly roadpricing.
Comput. Math. Appl., 2013

Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Gone in 360 Seconds: Hijacking with Hitag2.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Dismantling iClass and iClass Elite.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Exposing iClass Key Diversification.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Cell-Based Roadpricing.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

2010
Dismantling SecureMemory, CryptoMemory and CryptoRF.
IACR Cryptol. ePrint Arch., 2010

Privacy-Friendly Energy-Metering via Homomorphic Encryption.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Towards a Practical Solution to the RFID Desynchronization Problem.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Modeling Privacy for Off-Line RFID Systems.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
Wirelessly Pickpocketing a Mifare Classic Card.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

A Schnorr-Like Lightweight Identity-Based Signature Scheme.
Proceedings of the Progress in Cryptology, 2009

2008
Sound and complete computational interpretation of symbolic hashes in the standard model.
Theor. Comput. Sci., 2008

Computational Soundness of Non-Malleable Commitments.
Proceedings of the Information Security Practice and Experience, 2008

Dismantling MIFARE Classic.
Proceedings of the Computer Security, 2008

A Practical Attack on the MIFARE Classic.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Probabilistic Anonymity and Admissible Schedulers
CoRR, 2007

2006
Completeness of Formal Hashes in the Standard Model.
IACR Cryptol. ePrint Arch., 2006

Sound Computational Interpretation of Formal Hashes.
IACR Cryptol. ePrint Arch., 2006

Sound Computational Interpretation of Symbolic Hashes in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

2005
Provable anonymity.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Spam filter analysis
CoRR, 2004

Spam Filter Analysis.
Proceedings of the Security and Protection in Information Processing Systems, 2004


  Loading...