Follow
Damien Marion
Damien Marion
Univ Rennes, CNRS, Inria, IRISA Rennes, France - CAPSULE team
Verified email at irisa.fr - Homepage
Title
Cited by
Cited by
Year
Less is more: dimensionality reduction from a theoretical perspective
N Bruneau, S Guilley, A Heuser, D Marion, O Rioul
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
532015
Simple power analysis on AES key expansion revisited
C Clavier, D Marion, A Wurcker
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
312014
Optimal side-channel attacks for multivariate leakages and multiple models
N Bruneau, S Guilley, A Heuser, D Marion, O Rioul
Journal of Cryptographic Engineering 7, 331-341, 2017
232017
Obfuscation revealed: Leveraging electromagnetic signals for obfuscated malware classification
DP Pham, D Marion, M Mastio, A Heuser
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
202021
Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks
C Clavier, Q Isorez, D Marion, A Wurcker
Cryptography and Communications 7, 121-162, 2015
172015
The Prevention of Radicalization Leading To Violence: An International Study Of Front-Line Workers And Prevention Issues
P Madriaza, AS Ponsot, D Marion
International Centre for the Prevention of Crime (ICPC), 2017
72017
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device.
K Fukushima, D Marion, Y Nakano, A Facon, S Kiyomoto, S Guilley
ICISSP, 67-74, 2019
52019
Evaluation of side-channel key-recovery attacks on lorawan end-device
K Fukushima, D Marion, Y Nakano, A Facon, S Kiyomoto, S Guilley
Information Systems Security and Privacy: 5th International Conference …, 2020
42020
ULTRA: Ultimate rootkit detection over the air
DP Pham, D Marion, A Heuser
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
32022
Binary data analysis for source code leakage assessment
A Facon, S Guilley, M Lec’Hvien, D Marion, T Perianin
Innovative Security Solutions for Information Technology and Communications …, 2019
32019
Give me your binary, I'll tell you if it leaks
A Bouvet, N Bruneau, A Facon, S Guilley, D Marion
2018 13th International Conference on Design & Technology of Integrated …, 2018
32018
Poster: Obfuscation Revealed-Using Electromagnetic Emanation to Identify and Classify Malware
DP Pham, D Marion, A Heuser
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 710-712, 2021
22021
Fault Analysis Assisted by Simulation
K Chibani, A Facon, S Guilley, D Marion, Y Mathieu, L Sauvage, Y Souissi, ...
Automated Methods in Cryptographic Fault Analysis, 263-277, 2019
12019
Software Camouflage
S Guilley, D Marion, Z Najm, Y Souissi, A Wurcker
Foundations and Practice of Security: 6th International Symposium, FPS 2013 …, 2014
12014
Multidimensionality of the models and the data in the side-channel domain
D Marion
Paris, ENST, 2018
2018
Optimal attacks for multivariate and multi-model side-channel leakages
N Bruneau, S Guilley, A Heuser, M Damien, O Rioul
18th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2016), 2016
2016
When Side-channel Meets Malware
DP Pham, D Marion, A Heuser
The system can't perform the operation now. Try again later.
Articles 1–17