Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Barral, Hadrien"'
Autor:
Barral, Hadrien, Jaloyan, Georges-Axel, Thomas-Brans, Fabien, Regnery, Matthieu, Géraud-Stewart, Rémi, Heckmann, Thibaut, Souvignet, Thomas, Naccache, David
Publikováno v:
Forensic Science International: Digital Investigation, Volume 42, 2022, 301437, ISSN 2666-2817
This paper provides a detailed explanation of the steps taken to extract and repair a Google Home's internal data. Starting with reverse engineering the hardware of a commercial off-the-shelf Google Home, internal data is then extracted by desolderin
Externí odkaz:
http://arxiv.org/abs/2210.00856
Autor:
Barral, Hadrien, Géraud-Stewart, Rémi, Léonard, Arthur, Naccache, David, Vermande, Quentin, Vivien, Samuel
$L$-functions typically encode interesting information about mathematical objects. This paper reports 29 identities between such functions that hitherto never appeared in the literature. Of these we have a complete proof for 9; all others are extensi
Externí odkaz:
http://arxiv.org/abs/2206.03604
We explain how to design RISC-V shellcodes capable of running arbitrary code, whose ASCII binary representation use only letters a-zA-Z, digits 0-9, and either of the three characters: #, /, '.
Comment: 25 pages, originally published at WOOT'19
Comment: 25 pages, originally published at WOOT'19
Externí odkaz:
http://arxiv.org/abs/1908.03819
We describe a methodology to automatically turn arbitrary ARMv8 programs into alphanumeric executable polymorphic shellcodes. Shellcodes generated in this way can evade detection and bypass filters, broadening the attack surface of ARM-powered device
Externí odkaz:
http://arxiv.org/abs/1608.03415
Publikováno v:
WOOT, USENIX Security Symposium 2019
WOOT, USENIX Security Symposium 2019, Jan 2019, SANTA CLARA, United States
WOOT, USENIX Security Symposium 2019, Jan 2019, SANTA CLARA, United States
International audience; We explain how to design RISC-V shellcodes capable ofrunning arbitrary code, whose ASCII binary representation use only letters a–zA–Z, digits 0–9, and either of the three characters: #, /, ’.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3c1dc55f949e38cd8cc64e21e4560a9a
https://hal.inria.fr/hal-03935118
https://hal.inria.fr/hal-03935118
Publikováno v:
Information Security Practice & Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings; 2016, p354-377, 24p