Canflict: Exploiting peripheral conflicts for data-link layer attacks on automotive networks A de Faveri Tron, S Longari, M Carminati, M Polino, S Zanero Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 21 | 2022 |
{InSpectre} Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 S Wiebing, A de Faveri Tron, H Bos, C Giuffrida 33rd USENIX Security Symposium (USENIX Security 24), 577-594, 2024 | 15 | 2024 |
Intrusion detection with neural networks: A tutorial AD TRON Optimization and Machine Learning: Optimization for Machine Learning and …, 2022 | 2 | 2022 |
Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks A de Faveri Tron, R Isemann, H Ragab, C Giuffrida, K von Gleissenthall, ... USENIX Security, 2025 | | 2025 |
La détection d'intrusion au moyen des réseaux de neurones: un tutoriel ADEF TRON Optimisation et apprentissage, 211, 2023 | | 2023 |
CANPass: an extensible framework for bypassing CAN peripherals on unmodified microcontrollers A de Faveri Tron | | 2020 |