What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Clémentine Maurice
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels.
Pierre Ayoub
Aurélien Hernandez
Romain Cayre
Aurélien Francillon
Clémentine Maurice
2024
conf/acsac
BlueScream: Screaming Channels on Bluetooth Low Energy.
Pierre Ayoub
Romain Cayre
Aurélien Francillon
Clémentine Maurice
2024
conf/cans
Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript.
Iliana Fayolle
Jan Wichelmann
Anja Köhl
Walter Rudametkin
Thomas Eisenbarth
Clémentine Maurice
2023
conf/ccs
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries.
Antoine Geimer
Mathéo Vergnolle
Frédéric Recoules
Lesly-Ann Daniel
Sébastien Bardin
Clémentine Maurice
2022
conf/esorics
CPU Port Contention Without SMT.
Thomas Rokicki
Clémentine Maurice
Michael Schwarz
2022
conf/asiaccs
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers.
Thomas Rokicki
Clémentine Maurice
Marina Botvinnik
Yossi Oren
2022
conf/ndss
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting.
Tomer Laor
Naif Mehanna
Antonin Durey
Vitaly Dyadyuk
Pierre Laperdrix
Clémentine Maurice
Yossi Oren
Romain Rouvoy
Walter Rudametkin
Yuval Yarom
2021
conf/eurosp
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level.
Quentin Forcioli
Jean-Luc Danger
Clémentine Maurice
Lilian Bossuet
Florent Bruguier
Maria Mushtaq
David Novo
Loïc France
Pascal Benoit
Sylvain Guilley
Thomas Perianin
2021
conf/eurosp
SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers.
Thomas Rokicki
Clémentine Maurice
Pierre Laperdrix
2020
conf/ccs
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors.
Moritz Lipp
Vedad Hadzic
Michael Schwarz
Arthur Perais
Clémentine Maurice
Daniel Gruss
2020
conf/eurosp
Nethammer: Inducing Rowhammer Faults through Network Requests.
Moritz Lipp
Michael Schwarz
Lukas Raab
Lukas Lamster
Misiker Tadesse Aga
Clémentine Maurice
Daniel Gruss
2018
conf/ccs
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Michael Schwarz
Daniel Gruss
Moritz Lipp
Clémentine Maurice
Thomas Schuster
Anders Fogh
Stefan Mangard
2018
conf/ndss
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Michael Schwarz
Moritz Lipp
Daniel Gruss
Samuel Weiser
Clémentine Maurice
Raphael Spreitzer
Stefan Mangard
2017
conf/fc
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
Michael Schwarz
Clémentine Maurice
Daniel Gruss
Stefan Mangard
2017
conf/esorics
Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Moritz Lipp
Daniel Gruss
Michael Schwarz
David Bidner
Clémentine Maurice
Stefan Mangard
2017
conf/ndss
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Clémentine Maurice
Manuel Weber
Michael Schwarz
Lukas Giner
Daniel Gruss
Carlo Alberto Boano
Stefan Mangard
Kay Römer
2016
conf/ccs
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Victor van der Veen
Yanick Fratantonio
Martina Lindorfer
Daniel Gruss
Clémentine Maurice
Giovanni Vigna
Herbert Bos
Kaveh Razavi
Cristiano Giuffrida
2016
conf/ccs
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
Daniel Gruss
Clémentine Maurice
Anders Fogh
Moritz Lipp
Stefan Mangard
2016
conf/uss
ARMageddon: Cache Attacks on Mobile Devices.
Moritz Lipp
Daniel Gruss
Raphael Spreitzer
Clémentine Maurice
Stefan Mangard
2016
conf/uss
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.
Peter Pessl
Daniel Gruss
Clémentine Maurice
Michael Schwarz
Stefan Mangard
2014
conf/fc
Confidentiality Issues on a GPU in a Virtualized Environment.
Clémentine Maurice
Christoph Neumann
Olivier Heen
Aurélien Francillon
Coauthors
Anders Fogh
(2)
Anja Köhl
(1)
Antoine Geimer
(1)
Antonin Durey
(1)
Arthur Perais
(1)
Aurélien Francillon
(3)
Aurélien Hernandez
(1)
Carlo Alberto Boano
(1)
Christoph Neumann
(1)
Clémentine Maurice
(21)
Cristiano Giuffrida
(1)
Daniel Gruss
(11)
David Bidner
(1)
David Novo
(1)
Florent Bruguier
(1)
Frédéric Recoules
(1)
Giovanni Vigna
(1)
Herbert Bos
(1)
Iliana Fayolle
(1)
Jan Wichelmann
(1)
Jean-Luc Danger
(1)
Kaveh Razavi
(1)
Kay Römer
(1)
Lesly-Ann Daniel
(1)
Lilian Bossuet
(1)
Loïc France
(1)
Lukas Giner
(1)
Lukas Lamster
(1)
Lukas Raab
(1)
Manuel Weber
(1)
Maria Mushtaq
(1)
Marina Botvinnik
(1)
Martina Lindorfer
(1)
Mathéo Vergnolle
(1)
Michael Schwarz
(9)
Misiker Tadesse Aga
(1)
Moritz Lipp
(7)
Naif Mehanna
(1)
Olivier Heen
(1)
Pascal Benoit
(1)
Peter Pessl
(1)
Pierre Ayoub
(2)
Pierre Laperdrix
(2)
Quentin Forcioli
(1)
Raphael Spreitzer
(2)
Romain Cayre
(2)
Romain Rouvoy
(1)
Samuel Weiser
(1)
Sébastien Bardin
(1)
Stefan Mangard
(8)
Sylvain Guilley
(1)
Thomas Eisenbarth
(1)
Thomas Perianin
(1)
Thomas Rokicki
(3)
Thomas Schuster
(1)
Tomer Laor
(1)
Vedad Hadzic
(1)
Victor van der Veen
(1)
Vitaly Dyadyuk
(1)
Walter Rudametkin
(2)
Yanick Fratantonio
(1)
Yossi Oren
(2)
Yuval Yarom
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to