Follow
Jean-Michel PICOD
Jean-Michel PICOD
Google Switzerland
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software
K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ...
25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016
752016
Cloak of visibility: Detecting when machines browse a different web
L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ...
2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016
662016
Bringing software defined radio to the penetration testing community
JM Picod, A Lebrun, JC Demay
Black Hat USA Conference, 2014
422014
Doing forensics in the cloud age OWADE: beyond files recovery forensic
E Bursztein, IF Cassidian, M Martin, JM Picod
Black Hat, 2011
122011
Recovering Windows Secrets and {EFS} Certificates Offline
E Burzstein, JM Picod
4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010
92010
Attacking encrypted USB keys the hard (ware) way
JM Picod, R Audebert, S Blumenstein, E Bursztein
Black Hat USA, 2017
52017
Reversing dpapi and stealing windows secrets offline
JM Picod, E Bursztein
BlackHat DC 2010, 2010
32010
Security Competitions
A Doupé, W Robertson, P Berrang, C Lewis, D Levin, A Hecksteden, ...
25th USENIX Security Symposium (USENIX Security 16), 1223-1240, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–8