Getting into the SMRAM: SMM Reloaded L Duflot, O Levillain, B Morin, O Grumelard CanSecWest, Vancouver, Canada, 2009 | 80 | 2009 |
Can you still trust your network card L Duflot, YA Perez, G Valadon, O Levillain CanSecWest/core10, 24-26, 2010 | 75 | 2010 |
One year of SSL Internet measurement O Levillain, A Ébalard, B Morin, H Debar Proceedings of the 28th Annual Computer Security Applications Conference, 11-20, 2012 | 40* | 2012 |
Caradoc: A pragmatic approach to pdf parsing and validation G Endignoux, O Levillain, JY Migeon Security and Privacy Workshops (SPW), 2016 IEEE, 126-139, 2016 | 36 | 2016 |
Framework, Tools and Good Practices for Cybersecurity Curricula J Hajny, S Ricci, E Piesarskas, O Levillain, L Galletta, R De Nicola IEEE Access 9, 94723-94747, 2021 | 25 | 2021 |
Analysis of QUIC session establishment and its implementations E Gagliardi, O Levillain Information Security Theory and Practice: 13th IFIP WG 11.2 International …, 2020 | 20 | 2020 |
System Management Mode Design and Security Issues L Duflot, O Levillain, B Morin, O Grumelard IT Defense, February, 2010 | 19 | 2010 |
ACPI: Design principles and concerns L Duflot, O Levillain, B Morin Trusted Computing: Second International Conference, Trust 2009, Oxford, UK …, 2009 | 19 | 2009 |
Parsifal: A Pragmatic Solution to the Binary Parsing Problems O Levillain Security and Privacy Workshops (SPW), 2014 IEEE, 191-197, 2014 | 17 | 2014 |
Mind your language (s): A discussion about languages and security É Jaeger, O Levillain 2014 IEEE Security and Privacy Workshops, 140-151, 2014 | 16* | 2014 |
Newspeak, doubleplussimple minilang for goodthinkful static analysis of C C Hymans, O Levillain Technical Note 2008-IW-SE-00010-1, EADS IW/SE, 2008 | 16 | 2008 |
TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS O Levillain, B Gourdin, H Debar Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 15 | 2015 |
Format oracles on OpenPGP F Maury, JR Reinhard, O Levillain, H Gilbert Cryptographers’ Track at the RSA Conference, 220-236, 2015 | 15 | 2015 |
A study of the TLS ecosystem O Levillain Institut National des Télécommunications, 2016 | 12 | 2016 |
ACPI and SMI handlers: some limits to trusted computing L Duflot, O Grumelard, O Levillain, B Morin Journal in computer virology 6 (4), 353-374, 2010 | 12 | 2010 |
Implementation flaws in TLS stacks: lessons learned and study of TLS 1.3 benefits O Levillain Risks and Security of Internet and Systems: 15th International Conference …, 2021 | 11 | 2021 |
ACPI et routine de traitement de la SMI L Duflot, O Levillain Actes du 7ème symposium sur la sécurité des technologies de l’information et …, 2009 | 11* | 2009 |
Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks AT Rasoamanana, O Levillain, H Debar Computer Security–ESORICS 2022: 27th European Symposium on Research in …, 2022 | 7 | 2022 |
On the limits of hypervisor-and virtual machine monitor-based isolation L Duflot, O Grumelard, O Levillain, B Morin Towards Hardware-Intrinsic Security: Foundations and Practice, 349-366, 2010 | 7 | 2010 |
SSL/TLS: état des lieux et recommandations O Levillain proc. of Symposium sur la sécurité des technologies de l’information et des …, 2012 | 6 | 2012 |