Clémentine Maurice

Orcid: 0000-0002-8896-9494

According to our database1, Clémentine Maurice authored at least 39 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481).
Dagstuhl Reports, 2023

The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Micro-architectural side channels: Studying the attack surface from hardware to browsers.
, 2023

2022
DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting.
CoRR, 2022

Characterizing Prefetchers using CacheObserver.
Proceedings of the 2022 IEEE 34th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD), 2022

DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

CPU Port Contention Without SMT.
Proceedings of the Computer Security - ESORICS 2022, 2022

Port Contention Goes Portable: Port Contention Side Channels in Web Browsers.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

Reproducing Spectre Attack with gem5: How To Do It Right?
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021

Calibration Done Right: Noiseless Flush+Flush Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

2020
Branch Prediction Attack on Blinded Scalar Multiplication.
IEEE Trans. Computers, 2020

Malware Guard Extension: abusing Intel SGX to conceal cache attacks.
Cybersecur., 2020

Nethammer: Inducing Rowhammer Faults through Network Requests.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2018
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls.
IACR Cryptol. ePrint Arch., 2017

KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks.
CoRR, 2017

Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
Proceedings of the Financial Cryptography and Data Security, 2017

KASLR is Dead: Long Live KASLR.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Proceedings of the Computer Security - ESORICS 2017, 2017

Malware Guard Extension: Using SGX to Conceal Cache Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

ARMageddon: Cache Attacks on Mobile Devices.
Proceedings of the 25th USENIX Security Symposium, 2016

Flush+Flush: A Fast and Stealthy Cache Attack.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Information leakage on shared hardware : evolutions in recent hardware and applications to virtualization. (Fuites d'information dans les processeurs récents et applications à la virtualisation).
PhD thesis, 2015

Reverse Engineering Intel DRAM Addressing and Exploitation.
CoRR, 2015

Flush+Flush: A Stealthier Last-Level Cache Attack.
CoRR, 2015

Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

C5: Cross-Cores Cache Covert Channel.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
Confidentiality Issues on a GPU in a Virtualized Environment.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting.
Proceedings of the SECRYPT 2013, 2013


  Loading...