IEMI Threats for Information Security: Remote Command Injection on Modern Smartphones C Kasmi, J Lopes Esteves IEEE Transactions on EMC, 0 | 142* | |
Unlocking the Access to the Effects Induced by IEMI on a Civilian UAV JL Esteves, E Cottais, C Kasmi 2018 International Symposium on Electromagnetic Compatibility (EMC EUROPE …, 2018 | 41 | 2018 |
One car, two frames: attacks on hitag-2 remote keyless entry systems revisited R Benadjila, M Renard, J Lopes-Esteves, C Kasmi 11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017 | 35 | 2017 |
Remote and silent voice command injection on a smartphone through conducted IEMI: Threats of smart IEMI for information security JL Esteves, C Kasmi Wireless Security Lab, French Network and Information Security Agency (ANSSI …, 2018 | 26 | 2018 |
Bluemirror: reflections on bluetooth pairing and provisioning protocols T Claverie, JL Esteves 2021 IEEE Security and Privacy Workshops (SPW), 339-351, 2021 | 24 | 2021 |
Air-gap Limitations and Bypass Techniques:“Command and Control” using Smart Electromagnetic Interferences C Kasmi, JL Esteves, P Valembois Le journal de la cybercriminalité & des investigations numériques 1 (1), 13-19, 2016 | 21 | 2016 |
Automated analysis of the effects induced by radiofrequency pulses on embedded systems for EMC functional safety C Kasmi, J Lopes-Esteves AT-RASC, URSI, 2015 | 17 | 2015 |
Stochastic EMC/EMI experiments optimization using resampling techniques C Kasmi, S Lalléchère, JL Esteves, S Girard, P Bonnet, F Paladian, ... IEEE Transactions on Electromagnetic Compatibility 58 (4), 1143-1150, 2016 | 15 | 2016 |
Event logs generated by an operating system running on a COTS computer during IEMI exposure C Kasmi, J Lopes-Esteves, N Picard, M Renard, B Beillard, E Martinod, ... IEEE Transactions on Electromagnetic Compatibility 56 (6), 1723-1726, 2014 | 15 | 2014 |
Electromagnetic Watermarking: Exploiting IEMI effects for forensic tracking of UAVs JL Esteves 2019 International Symposium on Electromagnetic Compatibility-EMC EUROPE …, 2019 | 14 | 2019 |
A LoRaWAN security assessment test bench T Claverie, JL Esteves Proceedings of the GNU Radio Conference 2 (1), 2021 | 8 | 2021 |
Second order soft-TEMPEST in RF front-ends: Design and detection of polyglot modulations E Cottais, JL Esteves, C Kasmi 2018 International Symposium on Electromagnetic Compatibility (EMC EUROPE …, 2018 | 8 | 2018 |
Immunity assessment of a servomotor exposed to an intentional train of RF pulses V Houchouas, JL Esteves, E Cottais, C Kasmi, K Armstrong 2017 International Symposium on Electromagnetic Compatibility-EMC EUROPE, 1-5, 2017 | 7 | 2017 |
Automation of the Immunity testing of COTS computers by the instrumentation of the internal sensors and involving the operating system logs – Technical report C Kasmi, J Lopes-Esteves, M Renard System Design & Assessment Note, 2014 | 7 | 2014 |
Smart TVs: Security of DVB-T T Claverie, JL Esteves, C Kasmi Proceedings of the Symposium on Information and Communications Security …, 2018 | 6 | 2018 |
EMC/EMI and Functional Safety: Methodology to characterize effects of interferences on devices C Kasmi, JL Esteves, K Armstrong 2016 Asia-Pacific International Symposium on Electromagnetic Compatibility …, 2016 | 6 | 2016 |
Second order soft Tempest: From internal cascaded electromagnetic interactions to long haul covert channels JL Esteves, E Cottais, C Kasmi 2019 URSI Asia-Pacific Radio Science Conference (AP-RASC), 1-3, 2019 | 5 | 2019 |
Electromagnetic harmonic attack on transient effect ring oscillator based true random number generator P Haddad, C Kasmi, JL Esteves, V Houchouas Hardwear. io Conference, Netherlands, 2016 | 5 | 2016 |
Whisper in the Wire: Voice Command Injection Reloaded C Kasmi, JL Esteves Hack In Paris, 2016 | 5 | 2016 |
Tamarin-based analysis of bluetooth uncovers two practical pairing confusion attacks T Claverie, G Avoine, S Delaune, JL Esteves European Symposium on Research in Computer Security, 100-119, 2023 | 4 | 2023 |