Cloak of visibility: Detecting when machines browse a different web L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ... 2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016 | 116 | 2016 |
Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ... 25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016 | 91 | 2016 |
Bringing software defined radio to the penetration testing community JM Picod, A Lebrun, JC Demay Black Hat USA Conference, 2014 | 51 | 2014 |
Doing forensics in the cloud age OWADE: beyond files recovery forensic E Bursztein, IF Cassidian, M Martin, JM Picod Black Hat, 2011 | 12 | 2011 |
Recovering Windows Secrets and {EFS} Certificates Offline E Burzstein, JM Picod 4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010 | 12 | 2010 |
Hybrid post-quantum signatures in hardware security keys D Ghinea, F Kaczmarczyck, J Pullman, J Cretin, S Kölbl, R Misoczki, ... International Conference on Applied Cryptography and Network Security, 480-499, 2023 | 10 | 2023 |
A hacker guide to deep-learning based side channel attacks E Bursztein, JM Picod Defcon27 https://elie. net/talk/a-hackerguide-to-deep-learning-based-side …, 2019 | 7 | 2019 |
Attacking encrypted USB keys the hard (ware) way JM Picod, R Audebert, S Blumenstein, E Bursztein Black Hat USA, 2017 | 5 | 2017 |
Reversing dpapi and stealing windows secrets offline JM Picod, E Bursztein BlackHat DC 2010, 2010 | 4 | 2010 |
Generalized power attacks against crypto hardware using long-range deep learning E Bursztein, L Invernizzi, K Král, D Moghimi, JM Picod, M Zhang IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (3 …, 2024 | 3 | 2024 |
Generic attacks against cryptographic hardware through long-range deep learning E Bursztein, L Invernizzi, K Král, D Moghimi, JM Picod, M Zhang arXiv preprint arXiv:2306.07249, 2023 | 3 | 2023 |
Security Competitions A Doupé, W Robertson, P Berrang, C Lewis, D Levin, A Hecksteden, ... 25th USENIX Security Symposium (USENIX Security 16), 1223-1240, 2016 | | 2016 |