Name
Affiliation
Papers
AURÉLIEN FRANCILLON
EURECOM, Biot, France
45
Collaborators
Citations 
PageRank 
78
812
45.60
Referers 
Referees 
References 
1971
1287
587
Search Limit
1001000
Title
Citations
PageRank
Year
SoC Security Evaluation: Reflections on Methodology and Tooling00.342021
Symqemu: Compilation-Based Symbolic Execution For Binaries00.342021
Understanding And Detecting International Revenue Share Fraud00.342021
HardSnap: Leveraging Hardware Snapshotting for Embedded Systems Security Testing00.342020
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks.00.342020
Toward The Analysis Of Embedded Firmware Through Automated Re-Hosting00.342019
Lenny the bot as a resource for sequential analysis - exploring the treatment of Next Turn Repair Initiation in the beginnings of unsolicited calls.00.342019
Systematic comparison of symbolic execution systems: intermediate representation and its generation10.342019
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.20.352018
Smashing the Stack Protector for Fun and Profit.10.362018
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers.100.492018
SMASHUP: a toolchain for unified verification of hardware/software co-designs.40.432017
SoK: Fraud in Telephony Networks50.472017
Using chatbots against voice spam: Analyzing Lenny's effectiveness.10.342017
Towards Automated Classification Of Firmware Images And Identification Of Embedded Devices40.462017
Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next?00.342016
Trust, but verify: Why and how to establish trust in embedded devices.20.412016
Over-The-Top Bypass: Study of a Recent Telephony Fraud.30.392016
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs.00.342016
PIE: Parser identification in embedded systems70.472015
C5: Cross-cores cache covert channel240.972015
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters.361.282015
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment90.532014
Optical Delusions: A Study of Malicious QR Codes in the Wild90.682014
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission80.562014
Through the looking-glass, and what eve found there20.402014
Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design20.462014
Confidentiality Issues on a GPU in a Virtualized Environment.150.762014
A minimalist approach to Remote Attestation381.492014
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.622.552014
Microcomputations as Micropayments in Web-based Services.00.342014
A large-scale analysis of the security of embedded firmwares753.212014
The role of web hosting providers in detecting compromised websites231.062013
Implementation and implications of a stealth hard-drive backdoor211.072013
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.20.372012
Enabling trusted scheduling in embedded systems40.482012
Physical-layer attacks on chirp-based ranging systems90.542012
Analysis of the communication between colluding applications on modern smartphones622.022012
Systematic Treatment of Remote Attestation.80.752012
Pay as you browse: microcomputations as micropayments in web-based services61.242011
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.1025.302010
Defending embedded systems against control flow attacks481.972009
On the difficulty of software-based attestation of embedded devices873.852009
Code injection attacks on harvard-architecture devices1165.662008
Impacts of packet scheduling and packet loss distribution on FEC Performances: observations and recommendations40.472005