default search action
Clémentine Maurice
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Iliana Fayolle, Jan Wichelmann, Anja Köhl, Walter Rudametkin, Thomas Eisenbarth, Clémentine Maurice:
Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript. CANS (2) 2024: 25-46 - 2023
- [b2]Clémentine Maurice:
Micro-architectural side channels: Studying the attack surface from hardware to browsers. University of Lille, France, 2023 - [c29]Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice:
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. CCS 2023: 1690-1704 - [c28]Marina Botvinnik, Tomer Laor, Thomas Rokicki, Clémentine Maurice, Yossi Oren:
The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption. DIMVA 2023: 24-45 - [i11]Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice:
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. CoRR abs/2310.08153 (2023) - [i10]Christopher W. Fletcher, Marco Guarnieri, David Kohlbrenner, Clémentine Maurice:
MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481). Dagstuhl Reports 13(11): 151-166 (2023) - 2022
- [c27]Thomas Rokicki, Clémentine Maurice, Marina Botvinnik, Yossi Oren:
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers. AsiaCCS 2022: 1182-1194 - [c26]Thomas Rokicki, Clémentine Maurice, Michael Schwarz:
CPU Port Contention Without SMT. ESORICS (3) 2022: 209-228 - [c25]Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom:
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting. NDSS 2022 - [c24]Guillaume Didier, Clémentine Maurice, Antoine Geimer, Walid J. Ghandour:
Characterizing Prefetchers using CacheObserver. SBAC-PAD 2022: 170-179 - [i9]Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom:
DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting. CoRR abs/2201.09956 (2022) - 2021
- [c23]Guillaume Didier, Clémentine Maurice:
Calibration Done Right: Noiseless Flush+Flush Attacks. DIMVA 2021: 278-298 - [c22]Pierre Ayoub, Clémentine Maurice:
Reproducing Spectre Attack with gem5: How To Do It Right? EuroSec@EuroSys 2021: 15-20 - [c21]Quentin Forcioli, Jean-Luc Danger, Clémentine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loïc France, Pascal Benoit, Sylvain Guilley, Thomas Perianin:
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level. EuroS&P Workshops 2021: 96-102 - [c20]Thomas Rokicki, Clémentine Maurice, Pierre Laperdrix:
SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers. EuroS&P 2021: 472-486 - 2020
- [j2]Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: abusing Intel SGX to conceal cache attacks. Cybersecur. 3(1): 2 (2020) - [j1]Sarani Bhattacharya, Clémentine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay:
Branch Prediction Attack on Blinded Scalar Multiplication. IEEE Trans. Computers 69(5): 633-648 (2020) - [c19]Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais, Clémentine Maurice, Daniel Gruss:
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors. AsiaCCS 2020: 813-825 - [c18]Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Clémentine Maurice, Daniel Gruss:
Nethammer: Inducing Rowhammer Faults through Network Requests. EuroS&P Workshops 2020: 710-719 - [e3]Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves:
Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12223, Springer 2020, ISBN 978-3-030-52682-5 [contents]
2010 – 2019
- 2019
- [e2]Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren:
Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings. Lecture Notes in Computer Science 11543, Springer 2019, ISBN 978-3-030-22037-2 [contents] - [e1]Alex Gantman, Clémentine Maurice:
13th USENIX Workshop on Offensive Technologies, WOOT 2019, Santa Clara, CA, USA, August 12-13, 2019. USENIX Association 2019 [contents] - 2018
- [c17]Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. AsiaCCS 2018: 587-600 - [c16]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. NDSS 2018 - [i8]Moritz Lipp, Misiker Tadesse Aga, Michael Schwarz, Daniel Gruss, Clémentine Maurice, Lukas Raab, Lukas Lamster:
Nethammer: Inducing Rowhammer Faults through Network Requests. CoRR abs/1805.04956 (2018) - 2017
- [c15]Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: Using SGX to Conceal Cache Attacks. DIMVA 2017: 3-24 - [c14]Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice, Stefan Mangard:
Practical Keystroke Timing Attacks in Sandboxed JavaScript. ESORICS (2) 2017: 191-209 - [c13]Daniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Clémentine Maurice, Stefan Mangard:
KASLR is Dead: Long Live KASLR. ESSoS 2017: 161-176 - [c12]Michael Schwarz, Clémentine Maurice, Daniel Gruss, Stefan Mangard:
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript. Financial Cryptography 2017: 247-267 - [c11]Clémentine Maurice, Manuel Weber, Michael Schwarz, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Stefan Mangard, Kay Römer:
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. NDSS 2017 - [i7]Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: Using SGX to Conceal Cache Attacks. CoRR abs/1702.08719 (2017) - [i6]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks. CoRR abs/1706.06381 (2017) - [i5]Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. CoRR abs/1711.01254 (2017) - [i4]Sarani Bhattacharya, Clémentine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay:
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls. IACR Cryptol. ePrint Arch. 2017: 968 (2017) - 2016
- [c10]Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard:
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. CCS 2016: 368-379 - [c9]Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida:
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. CCS 2016: 1675-1689 - [c8]Daniel Gruss, Clémentine Maurice, Klaus Wagner, Stefan Mangard:
Flush+Flush: A Fast and Stealthy Cache Attack. DIMVA 2016: 279-299 - [c7]Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. DIMVA 2016: 300-321 - [c6]Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard:
ARMageddon: Cache Attacks on Mobile Devices. USENIX Security Symposium 2016: 549-564 - [c5]Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, Stefan Mangard:
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. USENIX Security Symposium 2016: 565-581 - 2015
- [b1]Clémentine Maurice:
Information leakage on shared hardware : evolutions in recent hardware and applications to virtualization. (Fuites d'information dans les processeurs récents et applications à la virtualisation). Télécom ParisTech, France, 2015 - [c4]Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon:
C5: Cross-Cores Cache Covert Channel. DIMVA 2015: 46-64 - [c3]Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann, Olivier Heen, Aurélien Francillon:
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters. RAID 2015: 48-65 - [i3]Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. CoRR abs/1507.06955 (2015) - [i2]Daniel Gruss, Clémentine Maurice, Klaus Wagner:
Flush+Flush: A Stealthier Last-Level Cache Attack. CoRR abs/1511.04594 (2015) - [i1]Peter Pessl, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Reverse Engineering Intel DRAM Addressing and Exploitation. CoRR abs/1511.08756 (2015) - 2014
- [c2]Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon:
Confidentiality Issues on a GPU in a Virtualized Environment. Financial Cryptography 2014: 119-135 - 2013
- [c1]Clémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen, Aurélien Francillon:
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting. SECRYPT 2013: 379-386
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint