Less is more: dimensionality reduction from a theoretical perspective N Bruneau, S Guilley, A Heuser, D Marion, O Rioul Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 60 | 2015 |
Simple power analysis on AES key expansion revisited C Clavier, D Marion, A Wurcker Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014 | 35 | 2014 |
Obfuscation revealed: Leveraging electromagnetic signals for obfuscated malware classification DP Pham, D Marion, M Mastio, A Heuser Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 28 | 2021 |
Optimal side-channel attacks for multivariate leakages and multiple models N Bruneau, S Guilley, A Heuser, D Marion, O Rioul Journal of Cryptographic Engineering 7, 331-341, 2017 | 25 | 2017 |
Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks C Clavier, Q Isorez, D Marion, A Wurcker Cryptography and Communications 7, 121-162, 2015 | 18 | 2015 |
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. K Fukushima, D Marion, Y Nakano, A Facon, S Kiyomoto, S Guilley ICISSP, 67-74, 2019 | 6 | 2019 |
Evaluation of side-channel key-recovery attacks on lorawan end-device K Fukushima, D Marion, Y Nakano, A Facon, S Kiyomoto, S Guilley Information Systems Security and Privacy: 5th International Conference …, 2020 | 5 | 2020 |
ULTRA: Ultimate rootkit detection over the air DP Pham, D Marion, A Heuser Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 4 | 2022 |
Binary data analysis for source code leakage assessment A Facon, S Guilley, M Lec’Hvien, D Marion, T Perianin Innovative Security Solutions for Information Technology and Communications …, 2019 | 3 | 2019 |
Poster: Obfuscation Revealed-Using Electromagnetic Emanation to Identify and Classify Malware DP Pham, D Marion, A Heuser 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 710-712, 2021 | 2 | 2021 |
" Reading the mind of the enemy" through an augmented multi-domain Commander's Critical Information Requirements (CCIR) process G Desclaux, D Marion, B Claverie 24th INTERNATIONAL COMMAND AND CONTROL RESEARCH & TECHNOLOGY SYMPOSIUM, 2019 | 2 | 2019 |
Give me your binary, I'll tell you if it leaks A Bouvet, N Bruneau, A Facon, S Guilley, D Marion 2018 13th International Conference on Design & Technology of Integrated …, 2018 | 2 | 2018 |
Fault Analysis Assisted by Simulation K Chibani, A Facon, S Guilley, D Marion, Y Mathieu, L Sauvage, Y Souissi, ... Automated Methods in Cryptographic Fault Analysis, 263-277, 2019 | 1 | 2019 |
Software Camouflage S Guilley, D Marion, Z Najm, Y Souissi, A Wurcker Foundations and Practice of Security: 6th International Symposium, FPS 2013 …, 2014 | 1 | 2014 |
Multidimensionality of the models and the data in the side-channel domain D Marion Télécom ParisTech, 2018 | | 2018 |
A new paradigm for lessons learned G Desclaux, D Marion, B Claverie NATO JALLC NEW TECHNOLOGIES EVENT 2018 (NTE18), 2018 | | 2018 |
Multidimensionality of the models and the data in the side-channel domain| Theses. fr D Marion Paris, ENST, 2018 | | 2018 |
Optimal attacks for multivariate and multi-model side-channel leakages N Bruneau, S Guilley, A Heuser, M Damien, O Rioul 18th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2016), 2016 | | 2016 |
A Study of Knowledge Exchange for Airborne Delegation in C-SAR Mission T Pagliardini-Leduc, T Letouze, M Poret, B Le Blanc, D Marion, ... | | |
When Side-channel Meets Malware DP Pham, D Marion, A Heuser | | |