Aurélien Francillon

@aurelsec

Associate professor of computer insecurity . Can be seen sometimes procrastinating on twitter.

In your computer already.
Vrijeme pridruživanja: kolovoz 2011.

Tweetovi

Blokirali ste korisnika/cu @aurelsec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @aurelsec

  1. Prikvačeni tweet
    25. srp 2018.

    "Screaming Channels" paper / is online Electromagnetic side channels from a CPU can leak to a radio transmitter. CPU and radio transmitters are often integrated (think WiFi, BlueTooth) We recover an AES key from 10 meters on a BT chip

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Today I'm very happy to announce that we released , an open-source security key implementation written on , based on OS and powered by a dongle dev kit! Learn more at: We're even releasing a custom 3D-printable enclosure!

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    At the back of the original remote, press the red button to put the shader in learn mode. Then on the goodwatch: - press a number (here 5) to select an id - press '=' to register the watch as a new remote From now on: - press '-' for down - press '*' for stop - press '/' for up

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Controlling somfy shaders using the goodwatch! - Register the goodwatch as a new remote - Up to 9 shaders supported With Natan

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    29. sij

    📢 PhD students: FTC's Office of Technology Research and Investigation (OTech) will host technical research internships this summer. Apply by February 10!

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    me, browsing fleabay: oh neat cheap ns delay line module. sure why not. wonder how it works *it arrives* cool let's check it out! ... i'm not sure what i expected, lmfao

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    28. sij

    Big news in avatar2 land: v1.3.1 was just released. Among others, we now support QEMU v4.2.0, and our modifications to PANDA have been mainlined, deprecating the need of a separate avatar-panda. Thanks to everyone involved!

    Poništi
  8. proslijedio/la je Tweet
    23. sij

    Deadline for IEEE SafeThings 2020 (co-located with 2020) has been extended to Jan 28. Send in your “keeping the world of smart things/machines safe”.

    Poništi
  9. proslijedio/la je Tweet
    23. sij

    The Security Circus 2019 update is now online:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    21. sij

    Upcoming meetup of Linux Hackers Nice next Monday is going to take place 7:30pm at ! Save the date!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    20. sij
    Poništi
  12. proslijedio/la je Tweet
    19. sij

    Il y a, dans ce pays, d’innombrables voix qui s’élèvent. Certaines disent posément à un micro ce que d’autres crient avec force dans la rue. Les unes comme les autres doivent être entendues.

    Poništi
  13. proslijedio/la je Tweet
    17. sij

    Our paper "Lessons Learned from SunDEW: A Self Defense Environment for Web Applications" is accepted to the workshop ! Looking forward to share our findings on application layer

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    16. sij
    Poništi
  15. proslijedio/la je Tweet
    15. sij

    New receiver for R400 presentation clicker mitigates wireless keystroke injection. Had 5 minutes to test a replacement receiver. The new ones marked with 'ESW3601' restrict injectable keys to the 4 buttons of the clicker and thus renders meaningful attacks impossible

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    15. sij

    WiSec'20 deadline is approaching! Paper submission deadline: February 28, 2020 CfP:

    Poništi
  17. proslijedio/la je Tweet
    14. sij

    It looks like it exploits what Vaudenay warned against in 2004 : "Digital Signature Schemes with Domain Parameters" ( )

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    14. sij

    Very interesting research paper about the methodology used by reverse engineering to RE software, including some tips for tools authors : by et al.

    Poništi
  19. proslijedio/la je Tweet
    14. sij

    My talk on breaking TrustZone-M on a variety of ARMv8-M processors can now be watched here:

    Poništi
  20. proslijedio/la je Tweet
    9. sij

    Remember a couple years ago when I was very negative on Tim Burners Lee and the W3C for allowing DRM into the spec with a non-unanimous vote? Well here is the beginning of the fallout of that decision:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·