Investigating Commercial {Pay-Per-Install} and the Distribution of Unwanted Software K Thomas, JAE Crespo, R Rasti, JM Picod, C Phillips, MA Decoste, ... 25th USENIX Security Symposium (USENIX Security 16), 721-739, 2016 | 75 | 2016 |
Cloak of visibility: Detecting when machines browse a different web L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ... 2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016 | 66 | 2016 |
Bringing software defined radio to the penetration testing community JM Picod, A Lebrun, JC Demay Black Hat USA Conference, 2014 | 42 | 2014 |
Doing forensics in the cloud age OWADE: beyond files recovery forensic E Bursztein, IF Cassidian, M Martin, JM Picod Black Hat, 2011 | 12 | 2011 |
Recovering Windows Secrets and {EFS} Certificates Offline E Burzstein, JM Picod 4th USENIX Workshop on Offensive Technologies (WOOT 10), 2010 | 9 | 2010 |
Attacking encrypted USB keys the hard (ware) way JM Picod, R Audebert, S Blumenstein, E Bursztein Black Hat USA, 2017 | 5 | 2017 |
Reversing dpapi and stealing windows secrets offline JM Picod, E Bursztein BlackHat DC 2010, 2010 | 3 | 2010 |
Security Competitions A Doupé, W Robertson, P Berrang, C Lewis, D Levin, A Hecksteden, ... 25th USENIX Security Symposium (USENIX Security 16), 1223-1240, 2016 | | 2016 |