Follow
Aurélien Francillon
Aurélien Francillon
Professor, EURECOM
Verified email at eurecom.fr - Homepage
Title
Cited by
Cited by
Year
Smashing the stack protector for fun and profit
B Bierbaumer, J Kirsch, T Kittel, A Francillon, A Zarras
ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International …, 2018
16192018
A Large-Scale Analysis of the Security of Embedded Firmwares
A Costin, J Zaddach, A Francillon, D Balzarotti
USENIX Security Symposium, 95-110, 2014
6342014
Relay attacks on passive keyless entry and start systems in modern cars
A Francillon, B Danev, S Capkun
NDSS 2011, Proceedings of the Network and Distributed System Security Symposium, 2011
6172011
SMART: Secure and Minimal Architecture for (establishing a dynamic) Root of Trust
K El Defrawy, A Francillon, D Perito, G Tsudik
Proceedings of the Network & Distributed System Security Symposium (NDSS …, 2012
5102012
AVATAR: A framework to support dynamic security analysis of embedded systems' firmwares
J Zaddach, L Bruno, A Francillon, D Balzarotti
NDSS 2014, Proceedings of the Network and Distributed System Security Symposium, 2014
4832014
Code injection attacks on Harvard-architecture devices
A Francillon, C Castelluccia
Proceedings of the 15th ACM conference on Computer and communications …, 2008
4012008
Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices
A Costin, A Francillon
black hat USA 1, 1-12, 2012
3442012
Analysis of the communication between colluding applications on modern smartphones
C Marforio, H Ritzdorf, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 51-60, 2012
330*2012
EphPub: Toward Robust Ephemeral Publishing
C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar
19th International Conference on Network Protocols (ICNP),, 2011
3302011
On the difficulty of software-based attestation of embedded devices
C Castelluccia, A Francillon, D Perito, C Soriente
Proceedings of the 16th ACM conference on Computer and communications …, 2009
3022009
Automated dynamic firmware analysis at scale: a case study on embedded web interfaces
A Costin, A Zarras, A Francillon
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
3002016
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices
M Muench, J Stijohann, F Kargl, A Francillon, D Balzarotti
Network and Distributed System Security Symposium (NDSS'18), 2018
2812018
Reverse engineering Intel last-level cache complex addressing using performance counters
C Maurice, N Le Scouarnec, C Neumann, O Heen, A Francillon
International Symposium on Recent Advances in Intrusion Detection, 48-65, 2015
2672015
Screaming channels: When electromagnetic side channels meet radio transceivers
G Camurati, S Poeplau, M Muench, T Hayes, A Francillon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2102018
Symbolic execution with SymCC: Don't interpret, compile!
S Poeplau, A Francillon
29th USENIX Security Symposium (USENIX Security 20), 181-198, 2020
1942020
Avatar²: A Multi-target Orchestration Platform
M Muench, D Nisi, A Francillon, D Balzarotti
Workshop on Binary Analysis Research (BAR) 2018 (co-located with NDSS 18), 2018
1852018
A minimalist approach to remote attestation
A Francillon, Q Nguyen, KB Rasmussen, G Tsudik
Proceedings of Design, Automation and Test in Europe (DATE), Dresden, Germany, 2014
1822014
C5: Cross-Cores Cache Covert Channel
C Maurice, C Neumann, O Heen, A Francillon
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2015
1612015
Toward the Analysis of Embedded Firmware through Automated Re-hosting
E Gustafson, M Muench, C Spensky, N Redini, A Machiry, Y Fratantonio, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
1562019
Inception: System-wide Security Testing of Real-World Embedded Systems Software
N Corteggiani, G Camurati, A Francillon
27th USENIX Security Symposium (USENIX Security 18), 2018
1422018
The system can't perform the operation now. Try again later.
Articles 1–20