Aurélien Francillon
Orcid: 0000-0003-0584-8732
According to our database1,
Aurélien Francillon
authored at least 67 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
5
10
1
1
1
1
1
1
2
1
2
2
2
3
3
2
3
5
3
4
3
9
4
4
2
3
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025
2024
X-Ray-TLS: Transparent Decryption of TLS Sessions by Extracting Session Keys from Memory.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
2022
Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Companion Proceedings of the 23rd International Conference on Knowledge Engineering and Knowledge Management, 2022
2021
IEEE Des. Test, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Lenny the bot as a resource for sequential analysis: exploring the treatment of Next Turn Repair Initiation in the beginnings of unsolicited calls.
Proceedings of the Mensch und Computer 2019, 2019
Systematic comparison of symbolic execution systems: intermediate representation and its generation.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
J. Cryptogr. Eng., 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Towards Automated Classification of Firmware Images and Identification of Embedded Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs.
CoRR, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, 2016
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
ACM Trans. Internet Techn., 2014
EURASIP J. Inf. Secur., 2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the 20th International Conference on World Wide Web, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
2010
Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols.
RFC, April, 2010
IACR Cryptol. ePrint Arch., 2010
2009
PhD thesis, 2009
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007
2005
Impacts of packet scheduling and packet loss distribution on FEC Performances: observations and recommendations.
Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, 2005