Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device., , , , , and . ICISSP (Revised Selected Papers), volume 1221 of Communications in Computer and Information Science, page 74-92. Springer, (2019)When Side-channel Meets Malware (short paper)., , and . C&ESAR, volume 3610 of CEUR Workshop Proceedings, page 71-77. CEUR-WS.org, (2023)Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification., , , and . ACSAC, page 706-719. ACM, (2021)Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware., , and . EuroS&P, page 710-712. IEEE, (2021)Binary Data Analysis for Source Code Leakage Assessment., , , , and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 391-409. Springer, (2018)Head pose characterization with face tracking during information consultation on a large display., , and . IHM, page 117-124. ACM, (2017)ULTRA: Ultimate Rootkit Detection over the Air., , and . RAID, page 232-251. ACM, (2022)Multidimensionality of the models and the data in the side-channel domain. (Multidimensionnalité des modèles et des données dans le domaine des canaux auxiliaires).. Télécom Paris, France, (2018)Experiment on Side-Channel Key-Recovery using a Real LPWA End-device., , , , , and . ICISSP, page 67-74. SciTePress, (2019)