Reverse engineering Intel last-level cache complex addressing using performance counters C Maurice, N Le Scouarnec, C Neumann, O Heen, A Francillon Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015 | 262 | 2015 |
C5: cross-cores cache covert channel C Maurice, C Neumann, O Heen, A Francillon Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015 | 155 | 2015 |
An empirical study of passive 802.11 device fingerprinting C Neumann, O Heen, S Onno 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 114 | 2012 |
Method for the discovery of devices connected to an IP network and device to carry out said method N Prigent, O Heen, Y Maetz, C Salmon-Legagneur, YM Tang-Talpin US Patent App. 11/082,562, 2005 | 100 | 2005 |
A security protocol animator tool for AVISPA Y Glouche, T Genet, O Heen, O Courtay ARTIST2 workshop on security specification and verification of embedded …, 2006 | 81 | 2006 |
New tool and technique for remote operating system fingerprinting F Veysset, O Courtay, O Heen, IR Team Intranode Software Technologies 4, 2002 | 77 | 2002 |
Confidentiality issues on a GPU in a virtualized environment C Maurice, C Neumann, O Heen, A Francillon Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 64 | 2014 |
Firewall system protecting a community of appliances, appliance participating in the system and method of updating the firewall rules within the system N Prigent, O Heen, C Bidan, O Courtay, JP Andreaux US Patent 7,676,836, 2010 | 59 | 2010 |
Method and device for fingerprinting of wireless communication devices O Heen, C Neumann, S Onno US Patent 9,462,449, 2016 | 41 | 2016 |
Improving the resistance to side-channel attacks on cloud storage services O Heen, C Neumann, L Montalvo, S Defrance 2012 5th International Conference on New Technologies, Mobility and Security …, 2012 | 39 | 2012 |
Secure long term communities in ad hoc networks N Prigent, C Bidan, JP Andreaux, O Heen Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor …, 2003 | 34 | 2003 |
A comparative privacy analysis of geosocial networks S Gambs, O Heen, C Potin Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and …, 2011 | 32 | 2011 |
A TPM-based architecture for improved security and anonymity in vehicular ad hoc networks G Guette, O Heen 2009 IEEE Vehicular Networking Conference (VNC), 1-7, 2009 | 32 | 2009 |
Using animation to improve formal specifications of security protocols Y Boichut, T Genet, Y Glouche, O Heen 2nd Conference on Security in Network Architectures and Information Systems …, 2007 | 30 | 2007 |
Taming the Android appstore: Lightweight characterization of Android applications L Vigneri, J Chandrashekar, I Pefkianakis, O Heen arXiv preprint arXiv:1504.06093, 2015 | 24 | 2015 |
Devices and methods for client device authentication N Le Scouarnec, C Neumann, O Heen, JR Vigouroux US Patent 10,708,058, 2020 | 20 | 2020 |
Improving 802.11 fingerprinting of similar devices by cooperative fingerprinting C Maurice, S Onno, C Neumann, O Heen, A Francillon 2013 international conference on security and cryptography (SECRYPT), 1-8, 2013 | 18 | 2013 |
Methods and devices for 3D object protection using surface subdivision E Diehl, O Heen, Y Maetz, M Eluard US Patent 9,202,064, 2015 | 15 | 2015 |
On the privacy impacts of publicly leaked password databases O Heen, C Neumann International Conference on Detection of Intrusions and Malware, and …, 2017 | 14 | 2017 |
User device, a second screen system and a method for rendering second screen information on a second screen O Heen, F Lefebvre US Patent 9,530,170, 2016 | 12 | 2016 |