SoC Security Evaluation: Reflections on Methodology and Tooling | 0 | 0.34 | 2021 |
Symqemu: Compilation-Based Symbolic Execution For Binaries | 0 | 0.34 | 2021 |
Understanding And Detecting International Revenue Share Fraud | 0 | 0.34 | 2021 |
HardSnap: Leveraging Hardware Snapshotting for Embedded Systems Security Testing | 0 | 0.34 | 2020 |
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks. | 0 | 0.34 | 2020 |
Toward The Analysis Of Embedded Firmware Through Automated Re-Hosting | 0 | 0.34 | 2019 |
Lenny the bot as a resource for sequential analysis - exploring the treatment of Next Turn Repair Initiation in the beginnings of unsolicited calls. | 0 | 0.34 | 2019 |
Systematic comparison of symbolic execution systems: intermediate representation and its generation | 1 | 0.34 | 2019 |
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. | 2 | 0.35 | 2018 |
Smashing the Stack Protector for Fun and Profit. | 1 | 0.36 | 2018 |
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. | 10 | 0.49 | 2018 |
SMASHUP: a toolchain for unified verification of hardware/software co-designs. | 4 | 0.43 | 2017 |
SoK: Fraud in Telephony Networks | 5 | 0.47 | 2017 |
Using chatbots against voice spam: Analyzing Lenny's effectiveness. | 1 | 0.34 | 2017 |
Towards Automated Classification Of Firmware Images And Identification Of Embedded Devices | 4 | 0.46 | 2017 |
Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next? | 0 | 0.34 | 2016 |
Trust, but verify: Why and how to establish trust in embedded devices. | 2 | 0.41 | 2016 |
Over-The-Top Bypass: Study of a Recent Telephony Fraud. | 3 | 0.39 | 2016 |
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs. | 0 | 0.34 | 2016 |
PIE: Parser identification in embedded systems | 7 | 0.47 | 2015 |
C5: Cross-cores cache covert channel | 24 | 0.97 | 2015 |
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters. | 36 | 1.28 | 2015 |
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment | 9 | 0.53 | 2014 |
Optical Delusions: A Study of Malicious QR Codes in the Wild | 9 | 0.68 | 2014 |
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission | 8 | 0.56 | 2014 |
Through the looking-glass, and what eve found there | 2 | 0.40 | 2014 |
Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design | 2 | 0.46 | 2014 |
Confidentiality Issues on a GPU in a Virtualized Environment. | 15 | 0.76 | 2014 |
A minimalist approach to Remote Attestation | 38 | 1.49 | 2014 |
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. | 62 | 2.55 | 2014 |
Microcomputations as Micropayments in Web-based Services. | 0 | 0.34 | 2014 |
A large-scale analysis of the security of embedded firmwares | 75 | 3.21 | 2014 |
The role of web hosting providers in detecting compromised websites | 23 | 1.06 | 2013 |
Implementation and implications of a stealth hard-drive backdoor | 21 | 1.07 | 2013 |
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. | 2 | 0.37 | 2012 |
Enabling trusted scheduling in embedded systems | 4 | 0.48 | 2012 |
Physical-layer attacks on chirp-based ranging systems | 9 | 0.54 | 2012 |
Analysis of the communication between colluding applications on modern smartphones | 62 | 2.02 | 2012 |
Systematic Treatment of Remote Attestation. | 8 | 0.75 | 2012 |
Pay as you browse: microcomputations as micropayments in web-based services | 6 | 1.24 | 2011 |
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. | 102 | 5.30 | 2010 |
Defending embedded systems against control flow attacks | 48 | 1.97 | 2009 |
On the difficulty of software-based attestation of embedded devices | 87 | 3.85 | 2009 |
Code injection attacks on harvard-architecture devices | 116 | 5.66 | 2008 |
Impacts of packet scheduling and packet loss distribution on FEC Performances: observations and recommendations | 4 | 0.47 | 2005 |