Filtrer vos résultats
- 23
- 4
- 3
- 1
- 1
- 1
- 31
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 29
- 5
- 2
- 2
- 9
- 6
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 25
- 11
- 11
- 10
- 9
- 9
- 9
- 9
- 9
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 32
- 1
- 21
- 12
- 1
- 2
- 1
- 1
- 1
- 1
- 2
- 5
- 1
- 2
- 1
- 3
- 3
- 3
- 1
- 2
- 3
33 résultats
|
|
triés par
|
Screaming Channels : When Electromagnetic Side Channels Meet Radio TransceiversCCS 2018, ACM SIGSAC Conference on Computer and Communications Security, Oct 2018, Toronto, Canada. pp.163-177, ⟨10.1145/3243734.3243802⟩
Communication dans un congrès
hal-03556925v1
|
|||
Symbolic execution with SymCC: Don't interpret, compile!USENIX Security Symposium 2020, Aug 2020, Boston, United States
Communication dans un congrès
hal-02874078v1
|
|||
|
ESPwn32: Hacking with ESP32 System-on-ChipsWOOT 2023, 17th IEEE Workshop on Offensive Technologies, co-located with IEEE S&P 2023, IEEE, May 2023, San Francisco, United States. ⟨10.1109/SPW59333.2023.00033⟩
Communication dans un congrès
hal-04183794v1
|
||
|
The Role of Web Hosting Providers in Detecting Compromised WebsitesWWW '13 Proceedings of the 22nd international conference on World Wide Web, May 2013, Rio de Janeiro, Brazil. pp.177-188
Communication dans un congrès
hal-00856722v1
|
||
|
Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ FirmwaresNetwork and Distributed System Security (NDSS) Symposium, Feb 2014, San Diego, United States. ⟨10.14722/ndss.2014.23229⟩
Communication dans un congrès
hal-01079676v1
|
||
A Large-Scale Analysis of the Security of Embedded FirmwaresProceedings of the 23rd USENIX Security Symposium, Aug 2014, San Diego, United States. pp.95-110
Communication dans un congrès
hal-01079824v1
|
|||
|
SymQEMU: Compilation-based symbolic execution for binariesNDSS 2021, Network and Distributed System Security Symposium, Feb 2021, San Diego (virtuel), United States. ⟨10.14722/NDSS.2021.24118⟩
Communication dans un congrès
hal-03556899v1
|
||
|
Understanding Screaming Channels: From a Detailed Analysis to Improved AttacksIACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 3, ⟨10.13154/tches.v2020.i3.358-401⟩
Article dans une revue
hal-04138258v1
|
||
Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation2019 Annual Computer Security Applications Conference (ACSAC’19), Dec 2019, San Juan, Puerto Rico
Communication dans un congrès
hal-02305914v1
|
|||
Pay as you Browse: Microcomputations as Micropayments in Web-based Services2012
Rapport
hal-00675056v1
|
|||
|
Towards Automated Classification of Firmware Images and Identification of Embedded Devices32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.233-247, ⟨10.1007/978-3-319-58469-0_16⟩
Communication dans un congrès
hal-01649015v1
|
||
|
Smashing the Stack Protector for Fun and Profit33th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2018, Poznan, Poland. pp.293-306, ⟨10.1007/978-3-319-99828-2_21⟩
Communication dans un congrès
hal-02023742v1
|
||
Microcomputations as Micropayments in Web-based ServicesACM Transactions on Internet Technology, 2014, 13 (3), pp.NC. ⟨10.1145/2611526⟩
Article dans une revue
hal-01066489v1
|
|||
|
Implementation and Implications of a Stealth Hard-Drive BackdoorACSAC '13, Dec 2013, New Orleans, United States. pp.978-1-4503-2015-3/13/12
Communication dans un congrès
hal-00869263v1
|
||
|
Attacking and Protecting Constrained Embedded Systems from Control Flow AttacksNetworking and Internet Architecture [cs.NI]. Institut National Polytechnique de Grenoble - INPG, 2009. English. ⟨NNT : ⟩
Thèse
tel-00540371v1
|
||
|
Code injection attacks on harvard-architecture devicesCCS '08: Proceedings of the 15th ACM conference on Computer and communications security, Oct 2008, Alexandria, Virginia, United States. pp.15--26, ⟨10.1145/1455770.1455775⟩
Communication dans un congrès
inria-00355202v1
|
||
|
TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network NodesWIOPT'07, 5th Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Apr 2007, Limassol, Cyprus
Communication dans un congrès
inria-00190971v1
|
||
Lenny the bot as a resource for sequential analysis: exploring the treatment of Next Turn Repair Initiation in the beginnings of unsolicited callsMensch und Computer 2019, Sep 2019, Hambourg, Germany
Communication dans un congrès
hal-02171482v1
|
|||
Doing being" an ordinary human calleeConference of the International Institute for Ethnomethodology and Conversation Analysis 2019, Jul 2019, Manheim, Germany
Communication dans un congrès
hal-02171487v1
|
|||
TESLA source authentication in the ALC and NORM protocols2007
Autre publication
inria-00000161v4
|
|||
|
Impacts of Packet Scheduling and Packet Loss Distribution on FEC Performances: Observations and Recommendations[Research Report] RR-5578, INRIA. 2005, pp.29
Rapport
inria-00000146v1
|
||
Toward a Methodology for Unified Verification of Hardware/Software Co-designsPROOFS, Sep 2015, Saint Malo, France
Communication dans un congrès
hal-02287183v1
|
|||
|
SMASHUP: a toolchain for unified verification of hardware/software co-designsJournal of Cryptographic Engineering, 2016, pp.1-12. ⟨10.1007/s13389-016-0145-2⟩
Article dans une revue
hal-01403136v2
|
||
|
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs2016
Pré-publication, Document de travail
hal-01322286v1
|
||
Une approche configurationnelle des leurres conversationnelsRéseaux : communication, technologie, société, 2020, Ethnographies des agents conversationnels, 220-221 (2), pp.81-11. ⟨10.3917/res.220.0081⟩
Article dans une revue
hal-02696398v1
|
|||
EphPub: Toward Robust Ephemeral PublishingNetwork Protocols (ICNP), 2011 19th IEEE International Conference on, Oct 2011, Vancouver, Canada. pp.165--175
Communication dans un congrès
hal-00748213v1
|
|||
|
WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission[Research Report] RR-8539, Inria. 2014, pp.21
Rapport
hal-00994926v2
|
||
|
Backdoors: Definition, Deniability and DetectionProceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2018), Sep 2018, Heraklion, Crete, Greece. ⟨10.1007/978-3-030-00470-5_5⟩
Communication dans un congrès
hal-01889981v1
|
||
|
Short Paper: WifiLeaks: Underestimated Privacy Implications of the ACCESS_WIFI_STATE Android Permission7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)), Jul 2014, Oxford, United Kingdom. ⟨10.1145/2627393.2627399⟩
Communication dans un congrès
hal-00997716v1
|
||
|
Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems17th IEEE Workshop on Offensive Technologies (WOOT 2023), IEEE, May 2023, San Francisco (CA, USA), United States. ⟨10.1109/SPW59333.2023.00025⟩
Communication dans un congrès
hal-04087018v1
|
- 1
- 2