Recent publications
Article
Murdock, K, Oswald, D, Garcia, F, Van Bulck, J, Gruss, D & Piessens, F 2020, 'Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble', IEEE Security & Privacy Magazine, vol. 18, no. 5, pp. 28-37. https://doi.org/10.1109/MSEC.2020.2990495
Wouters, L, Van Den Herrewegen, J, Garcia, FD, Oswald, D, Gierlichs, B & Preneel, B 2019, 'Dismantling DST80-based Immobiliser Systems', IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020, no. 2, pp. 99-127. https://doi.org/10.13154/tches.v2020.i2.99-127
Conference article
Hicks, C, Garcia, FD & Oswald, D 2018, 'Dismantling the AUT64 Automotive Cipher', IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2018, no. 2, pp. 46-69. https://doi.org/10.13154/tches.v2018.i2.46-69
Conference contribution
Hicks, C & Garcia, F 2020, A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X Christopher Hicks. in 5th IEEE European Symposium on Security and Privacy. IEEE Computer Society Press, 5th IEEE European Symposium on Security and Privacy (EuroS&P), Genova, Italy, 7/09/20.
Murdock, K, Oswald, D, Garcia, F, Van Bulck, J, Gruss, D & Piessens, F 2020, Plundervolt: software-based fault injection attacks against Intel SGX. in 2020 IEEE Symposium on Security and Privacy (SP)., 9152636, IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp. 1466-1482, 41st IEEE Symposium on Security and Privacy, San Francisco, United States, 17/05/20. https://doi.org/10.1109/SP40000.2020.00057
Chen, Z, Vasilakis, G, Murdock, K, Dean, E, Oswald, D & Garcia, F 2020, VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. in Proceedings of 30th Usenix Security Symposium (USENIX Security 21). USENIX , 30th USENIX Security Symposium 2021 (USENIX Security 21), Vancouver, Canada, 11/08/21.
Van Bulck, J, Oswald, D, Marin, E, Aldoseri, A, Garcia, FD & Piessens, F 2019, A tale of two worlds: assessing the vulnerability of enclave shielding runtimes. in CCS '19 : Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), pp. 1741-1758, 26th ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), London, United Kingdom, 11/11/19. https://doi.org/10.1145/3319535.3363206
Van Den Herrewegen, J & Garcia, F 2018, Beneath the Bonnet: a Breakdown of Diagnostic Security. in Proceedings of the 23rd European Symposium on Research in Computer Security. vol. 11098, Lecture Notes in Computer Science, Springer, 23rd European Symposium on Research in Computer Security, Barcelona, Spain, 3/09/18. https://doi.org/10.1007/978-3-319-99073-6_15
Thomas, S, Garcia, FD & Chothia, T 2017, HumIDIFy: A Tool for Hidden Functionality Detection in Firmware. in 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '17), Proceedings. Lecture Notes in Computer Science, vol. 10327, Springer, pp. 279-300, 14th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA '17), Bonn, Germany, 6/07/17. https://doi.org/10.1007/978-3-319-60876-1_13
McMahon Stone, C, Chothia, T & Garcia, FD 2017, Spinner: Semi-Automatic Detection of Pinning without Hostname Verification (or why 10M bank users were vulnerable). in Proceedings of 33rd Annual Computer Security Applications Conference (ACSAC 2017). Association for Computing Machinery , pp. 176-188, 33rd Annual Computer Security Applications Conference (ACSAC 2017), Orlando, Florida, United States, 4/12/17. https://doi.org/10.1145/3134600.3134628
Thomas, SL, Chothia, T & Garcia, FD 2017, Stringer: measuring the importance of static data comparisons to detect backdoors and undocumented functionality. in SN Foley, D Gollmann & E Snekkenes (eds), Computer Security - ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II. Lecture Notes in Computer Science, Springer, pp. 513-531, 22nd European Symposium on Research in Computer Security (ESORICS 2017), Oslo, Norway, 11/09/17. https://doi.org/10.1007/978-3-319-66399-9_28
Chothia, T, Garcia, F, Heppel, C & McMahon Stone, C 2017, Why banker Bob (still) can’t get TLS right: A Security Analysis of TLS in Leading UK Banking Apps. in A Kiayias (ed.), Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10322, Springer, pp. 579-597, 21st International Conference on Financial Cryptography and Data Security (FC 2017), Sliema, Malta, 3/04/17. https://doi.org/10.1007/978-3-319-70972-7_33
Radu, A-I & Garcia, F 2016, LeiA: A Lightweight Authentication Protocol for CAN. in Computer Security – ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9879, Springer, pp. 283-300, 21st European Symposium on Research in Computer Security (ESORICS 2016), Heraklion, Crete, Greece, 26/09/16. https://doi.org/10.1007/978-3-319-45741-3_15
Garcia, F, Oswald, D, Kasper, T & Pavlides, P 2016, Lock it and still lose it: on the (in)security of automotive remote keyless entry systems. in Proceedings of the 25th USENIX Security Symposium . USENIX Association, pp. 929-944, 25th USENIX Security Symposium , Austin, Texas, United States, 10/08/16. https://doi.org/10.5555/3241094.3241166
Marin, E, Singelée, D, Garcia, FD, Chothia, T, Willems, R & Preneel, B 2016, On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. in ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications. Association for Computing Machinery , pp. 226-236, 32nd Annual Computer Security Applications Conference (ACSAC 2016), Los Angeles, CA, United States, 5/12/16. https://doi.org/10.1145/2991079.2991094
View all publications in research portal