Name
Affiliation
Papers
FLAVIO D. GARCIA
Institute for Computing and Information Science|Radboud University
42
Collaborators
Citations 
PageRank 
49
438
33.08
Referers 
Referees 
References 
952
698
457
Search Limit
100952
Title
Citations
PageRank
Year
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware00.342022
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis.00.342021
VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface00.342021
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble00.342020
Grey-box Analysis and Fuzzing of Automotive Electronic Components via Control-Flow Graph Extraction00.342020
Dismantling DST80-based Immobiliser Systems.00.342020
Plundervolt: Software-based Fault Injection Attacks against Intel SGX110.582020
A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X10.352020
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes60.472019
Dismantling the AUT64 Automotive Cipher.00.342018
Spinner: Semi-Automatic Detection of Pinning without Hostname Verification.30.402017
Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps.30.402017
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware.20.362017
Stringer: Measuring The Importance Of Static Data Comparisons To Detect Backdoors And Undocumented Functionality00.342017
Lock It And Still Lose It - On The (In) Security Of Automotive Remote Keyless Entry Systems100.932016
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.30.372016
The Fall of a Tiny Star.00.342016
Cryptanalysis of the Megamos Crypto Automotive Immobilizer.00.342015
Relay Cost Bounding for Contactless EMV Payments70.512015
Wirelessly lockpicking a smart card reader10.362014
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer191.022013
Cell-based privacy-friendly roadpricing70.562013
Dismantling iClass and iClass Elite.60.552012
Gone in 360 seconds: Hijacking with Hitag2301.332012
Cell-Based roadpricing30.412011
Exposing iClass key diversification60.512011
Dismantling SecureMemory, CryptoMemory and CryptoRF100.702010
Towards a practical solution to the RFID desynchronization problem00.342010
Modeling privacy for off-line RFID systems160.852010
Privacy-friendly energy-metering via homomorphic encryption653.422010
A Schnorr-Like Lightweight Identity-Based Signature Scheme401.382009
Computational soundness of non-malleable commitments80.442008
Dismantling MIFARE Classic583.942008
A Practical Attack on the MIFARE Classic504.822008
Sound and complete computational interpretation of symbolic hashes in the standard model70.452008
Probabilistic Anonymity and Admissible Schedulers70.492007
Sound computational interpretation of symbolic hashes in the standard model60.422006
Sound Computational Interpretation of Formal Hashes.50.462006
Completeness of Formal Hashes in the Standard Model.10.352006
Provable anonymity210.982005
Off-Line karma: a decentralized currency for peer-to-peer and grid applications140.782005
Spam Filter Analysis120.792004