Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mirage: Towards a Metasploit-Like Framework for IoT., , , , , and . ISSRE, page 261-270. IEEE, (2019)Ten years of studies on the security of connected objects: a wrap-up (keynote abstract)., and . C&ESAR, volume 3610 of CEUR Workshop Proceedings, page 13-14. CEUR-WS.org, (2023)WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips., , , , , and . DSN, page 376-387. IEEE, (2021)A defensive man-in-middle approach to filter BLE packets., , , , , and . WISEC, page 365-367. ACM, (2021)ESPwn32: Hacking with ESP32 System-on-Chips., , and . SP (Workshops), page 311-325. IEEE, (2023)A PSD-based fingerprinting approach to detect IoT device spoofing., , , , and . PRDC, page 40-49. IEEE, (2020)InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections., , , , , and . DSN, page 388-399. IEEE, (2021)Offensive and defensive approaches for wireless communication protocols security in IoT. (Approches offensives et défensives pour la sécurité des protocoles de communication sans fil de l'IoT).. INSA Toulouse, France, (2022)Cross-protocol attacks: weaponizing a smartphone by diverting its bluetooth controller., , , , , and . WISEC, page 386-388. ACM, (2021)