Skip to main content

Showing 1–4 of 4 results for author: Francillon, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1605.08357  [pdf, other

    cs.CR

    MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs

    Authors: Jagdish Prasad Achara, Vincent Roca, Claude Castelluccia, Aurelien Francillon

    Abstract: Smartphones, the devices we carry everywhere with us, are being heavily tracked and have undoubtedly become a major threat to our privacy. As "tracking the trackers" has become a necessity, various static and dynamic analysis tools have been developed in the past. However, today, we still lack suitable tools to detect, measure and compare the ongoing tracking across mobile OSs. To this end, we pro… ▽ More

    Submitted 10 June, 2016; v1 submitted 26 May, 2016; originally announced May 2016.

  2. arXiv:1511.03609  [pdf, other

    cs.CR cs.DC cs.NI

    Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

    Authors: Andrei Costin, Apostolis Zarras, Aurélien Francillon

    Abstract: Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure. Moreover, many embedded systems rely on web interfaces for user interaction or administration. Unfortunately, web security is known to be difficult, and therefore the web interfaces of embedded systems represent a considerable attack… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    ACM Class: D.4.6; K.4.4; K.6.5; K.6.m; C.3; D.2.7; C.1.4; H.3.5

  3. arXiv:1003.5510  [pdf, other

    cs.CR cs.NI

    EphPub: Toward Robust Ephemeral Publishing

    Authors: Claude Castelluccia, Emiliano De Cristofaro, Aurelien Francillon, Mohamed-Ali Kaafar

    Abstract: The increasing amount of personal and sensitive information disseminated over the Internet prompts commensurately growing privacy concerns. Digital data often lingers indefinitely and users lose its control. This motivates the desire to restrict content availability to an expiration time set by the data owner. This paper presents and formalizes the notion of Ephemeral Publishing (EphPub), to preve… ▽ More

    Submitted 18 October, 2011; v1 submitted 29 March, 2010; originally announced March 2010.

    Comments: Proceedings of IEEE ICNP 2011

  4. arXiv:0901.3482  [pdf, ps, other

    cs.CR

    Code injection attacks on harvard-architecture devices

    Authors: Aurélien Francillon, Claude Castelluccia

    Abstract: Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited memory and can process only very small packets. Stack-based buffer overflow techniques that inject code into the stack and then execute it are therefore not applicable. It has been a common belief that code injection is i… ▽ More

    Submitted 22 January, 2009; originally announced January 2009.

    Journal ref: CCS '08: Proceedings of the 15th ACM conference on Computer and communications security (2008) 15--26