Author of the publication

A minimalist approach to Remote Attestation.

, , , and . DATE, page 1-6. European Design and Automation Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Francillon, Aurélien
add a person with the name Francillon, Aurélien
 

Other publications of authors with the same name

Microcomputations as Micropayments in Web-based Services., , , , and . ACM Trans. Internet Techn., 13 (3): 8:1-8:23 (2014)Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters., , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 48-65. Springer, (2015)On the difficulty of software-based attestation of embedded devices., , , and . ACM Conference on Computer and Communications Security, page 400-409. ACM, (2009)Analysis of the communication between colluding applications on modern smartphones., , , and . ACSAC, page 51-60. ACM, (2012)Trust, but verify: Why and how to establish trust in embedded devices.. DATE, page 1178-1182. IEEE, (2016)Defending embedded systems against control flow attacks., , and . SecuCode@CCS, page 19-26. ACM, (2009)The role of phone numbers in understanding cyber-crime schemes., , , , and . PST, page 213-220. IEEE, (2013)Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next?. TrustED@CCS, page 1. ACM, (2016)Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces., , and . AsiaCCS, page 437-448. ACM, (2016)Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers., , , , and . ACM Conference on Computer and Communications Security, page 163-177. ACM, (2018)