Follow
Mathieu Renard
Mathieu Renard
Unknown affiliation
Verified email at gotohack.org
Title
Cited by
Cited by
Year
One car, two frames: attacks on hitag-2 remote keyless entry systems revisited
R Benadjila, M Renard, J Lopes-Esteves, C Kasmi
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
242017
Event logs generated by an operating system running on a COTS computer during IEMI exposure
C Kasmi, J Lopes-Esteves, N Picard, M Renard, B Beillard, E Martinod, ...
IEEE Transactions on Electromagnetic Compatibility 56 (6), 1723-1726, 2014
122014
WooKey: designing a trusted and efficient USB device
R Benadjila, A Michelizza, M Renard, P Thierry, P Trebuchet
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
112019
Practical iOS Apps hacking
M RENARD
GreHack 2012, 14, 2012
82012
Automation of the Immunity testing of COTS computers by the instrumentation of the internal sensors and involving the operating system logs–Technical report
C Kasmi, JL Esteves, M Renard
System Design and Assessment Note SDAN 44, 2014
72014
Wookey: Usb devices strike back
R Benadjila, M Renard, P Trebuchet, P Thierry, A Michelizza, J Lefaure
Proceedings of SSTIC, 2018
42018
LEIA: the lab embedded ISO7816 analyzer a custom smartcard reader for the ChipWhisperer
R Benadjila, M Renard, D Elbaze, P Trébuchet
SSTIC2019, 30, 2019
32019
Autonomous electromagnetic attacks detection considering a COTS computer as a multi-sensor system
C Kasmi, J Lopes-Esteves, M Renard
2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), 1-4, 2014
32014
Investigation numérique & terminaux Apple iOS: Acquisition de données
M Renard
SSTIC conference, 2014
22014
Designing and Efficient USB Device
R BENADJILA, M RENARD, A MICHELIZZA, P THIERRY, P TREBUCHET
2019
From Academia to Real World: a Practical Guide to Hitag-2 RKE System Analysis
R Benadjila, M Renard, J Lopes-Esteves, C Kasmi
2017
Stratégies de défense et d’attaque : le cas des consoles de jeux
M Renard, R Benadjila
SSTIC, 2015
2015
System Design & Assessment Note
C Kasmi, J Lopes-Esteves, M Renard
2014
Analysis of Hardware and Software Faults induced by IEMI on a COTS Computer
C Kasmi, N Picard, J Lopes-Esteves, M Renard, B Beillard, E Martinod, ...
ICEEA 2014, 5th International Conference on Environmental Engineering and …, 2014
2014
Investigation numérique & terminaux Apple iOS
M RENARD
SSTIC 2014, 2014
2014
Hacking apple accessories to pown iDevices
M RENARD
Hackito Ergo Sum, 2013
2013
Stratégies de défense et d’attaque: le cas des consoles de jeux
R Benadjila, M Renard
A Self-monitored Information System for High Power Electromagnetic Attacks Detection
C Kasmi, J Lopes-Esteves, M Renard
The system can't perform the operation now. Try again later.
Articles 1–18