Jean-Michel PICOD
Jean-Michel PICOD
Google Switzerland
Zweryfikowany adres z google.com - Strona główna
Cytowane przez
Cytowane przez
Cloak of visibility: Detecting when machines browse a different web
L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ...
2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016
Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016
Bringing software defined radio to the penetration testing community
JM Picod, A Lebrun, JC Demay
Black Hat USA Conference, 2014
Doing forensics in the cloud age OWADE: beyond files recovery forensic
E Bursztein, IF Cassidian, M Martin, JM Picod
Black Hat, 2011
Recovering Windows Secrets and {EFS} Certificates Offline
E Burzstein, JM Picod
4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010
A hacker guide to deep-learning based side channel attacks
E Bursztein, JM Picod
Defcon27 https://elie. net/talk/a-hackerguide-to-deep-learning-based-side …, 2019
Attacking encrypted USB keys the hard (ware) way
JM Picod, R Audebert, S Blumenstein, E Bursztein
Black Hat USA, 2017
Hybrid Post-Quantum Signatures in Hardware Security Keys
D Ghinea, F Kaczmarczyck, J Pullman, J Cretin, S Kölbl, R Misoczki, ...
International Conference on Applied Cryptography and Network Security, 480-499, 2023
Reversing dpapi and stealing windows secrets offline
JM Picod, E Bursztein
BlackHat DC 2010, 2010
Generic attacks against cryptographic hardware through long-range deep learning
E Bursztein, L Invernizzi, K Král, D Moghimi, JM Picod, M Zhang
arXiv preprint arXiv:2306.07249, 2023
Security Competitions
A Doupé, W Robertson, P Berrang, C Lewis, D Levin, A Hecksteden, ...
25th USENIX Security Symposium (USENIX Security 16), 1223-1240, 2016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–11