Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Jaloyan, Georges-Axel"'
Autor:
Barral, Hadrien, Jaloyan, Georges-Axel, Thomas-Brans, Fabien, Regnery, Matthieu, Géraud-Stewart, Rémi, Heckmann, Thibaut, Souvignet, Thomas, Naccache, David
Publikováno v:
Forensic Science International: Digital Investigation, Volume 42, 2022, 301437, ISSN 2666-2817
This paper provides a detailed explanation of the steps taken to extract and repair a Google Home's internal data. Starting with reverse engineering the hardware of a commercial off-the-shelf Google Home, internal data is then extracted by desolderin
Externí odkaz:
http://arxiv.org/abs/2210.00856
Autor:
Jaloyan, Georges-Axel, Markantonakis, Konstantinos, Akram, Raja Naeem, Robin, David, Mayes, Keith, Naccache, David
This paper provides the first analysis on the feasibility of Return-Oriented Programming (ROP) on RISC-V, a new instruction set architecture targeting embedded systems. We show the existence of a new class of gadgets, using several Linear Code Sequen
Externí odkaz:
http://arxiv.org/abs/2103.08229
This paper presents LIRA-V, a lightweight system for performing remote attestation between constrained devices using the RISC-V architecture. We propose using read-only memory and the RISC-V Physical Memory Protection (PMP) primitive to build a trust
Externí odkaz:
http://arxiv.org/abs/2102.08804
We explain how to design RISC-V shellcodes capable of running arbitrary code, whose ASCII binary representation use only letters a-zA-Z, digits 0-9, and either of the three characters: #, /, '.
Comment: 25 pages, originally published at WOOT'19
Comment: 25 pages, originally published at WOOT'19
Externí odkaz:
http://arxiv.org/abs/1908.03819
In the field of deductive software verification, programs with pointers present a major challenge due to pointer aliasing. In this paper, we introduce pointers to SPARK, a well-defined subset of the Ada language, intended for formal verification of m
Externí odkaz:
http://arxiv.org/abs/1805.05576
Autor:
Jaloyan, Georges-Axel
In the context of deductive software verification, programs with pointers present a major challenge due to pointer aliasing. In this paper, we introduce pointers to SPARK, a well-defined subset of the Ada language, intended for formal verification of
Externí odkaz:
http://arxiv.org/abs/1710.07047
We describe a methodology to automatically turn arbitrary ARMv8 programs into alphanumeric executable polymorphic shellcodes. Shellcodes generated in this way can evade detection and bypass filters, broadening the attack surface of ARM-powered device
Externí odkaz:
http://arxiv.org/abs/1608.03415
Autor:
Jaloyan, Georges-Axel
Publikováno v:
Cryptography and Security [cs.CR]. Université Paris sciences et lettres, 2021. English. ⟨NNT : 2021UPSLE062⟩
Computer science is built on many layers of abstraction, from hardware to algorithms or statements of work. In the context of computer security, vulnerabilities often originate from the discrepancies between these different abstraction levels. Such i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______165::8dce16f397cef82a1ae396cd2c1dc784
https://theses.hal.science/tel-04023324
https://theses.hal.science/tel-04023324
Publikováno v:
WOOT, USENIX Security Symposium 2019
WOOT, USENIX Security Symposium 2019, Jan 2019, SANTA CLARA, United States
WOOT, USENIX Security Symposium 2019, Jan 2019, SANTA CLARA, United States
International audience; We explain how to design RISC-V shellcodes capable ofrunning arbitrary code, whose ASCII binary representation use only letters a–zA–Z, digits 0–9, and either of the three characters: #, /, ’.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3c1dc55f949e38cd8cc64e21e4560a9a
https://hal.inria.fr/hal-03935118
https://hal.inria.fr/hal-03935118
Publikováno v:
Information Security Practice & Experience: 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings; 2016, p354-377, 24p