Pin skimmer: Inferring pins through the camera and microphone L Simon, R Anderson Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013 | 152 | 2013 |
Fuzzbench: an open fuzzer benchmarking platform and service J Metzman, L Szekeres, L Simon, R Sprabery, A Arya Proceedings of the 29th ACM joint meeting on European software engineering …, 2021 | 83 | 2021 |
What you get is what you C: Controlling side effects in mainstream C compilers L Simon, D Chisnall, R Anderson 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 1-15, 2018 | 73 | 2018 |
Fuzzfactory: domain-specific fuzzing with waypoints R Padhye, C Lemieux, K Sen, L Simon, H Vijayakumar Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-29, 2019 | 58 | 2019 |
SOK: Making sense of censorship resistance systems S Khattak, T Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg Proceedings on Privacy Enhancing Technologies 2016 (4), 37-61, 2016 | 56 | 2016 |
Hearing your touch: A new acoustic side channel on smartphones I Shumailov, L Simon, J Yan, R Anderson arXiv preprint arXiv:1903.11137, 2019 | 49 | 2019 |
Don’t interrupt me while i type: Inferring text entered through gesture typing on android keyboards L Simon, W Xu, R Anderson Privacy Enhancing Technologies Symposium Advisory Board, 2016 | 40 | 2016 |
Security analysis of android factory resets L Simon, R Anderson 4th Mobile Security Technologies Workshop (MoST), 2015 | 27 | 2015 |
Speed adjustment algorithm for an RFID reader and conveyor belt system performing dynamic framed slotted aloha L Simon, P Saengudomlert, U Ketprom 2008 IEEE International Conference on RFID, 199-206, 2008 | 15 | 2008 |
Horizontal privilege escalation in trusted applications D Suciu, S McLaughlin, L Simon, R Sion 29th USENIX Security Symposium (USENIX Security 20), 2020 | 13 | 2020 |
Security analysis of consumer-grade anti-theft solutions provided by android mobile anti-virus apps L Simon, R Anderson 4th Mobile Security Technologies Workshop (MoST), 2015 | 12 | 2015 |
Systemization of pluggable transports for censorship resistance S Khattak, L Simon, SJ Murdoch arXiv preprint arXiv:1412.7448, 2014 | 11 | 2014 |
Improving Fuzzing through Controlled Compilation L Simon, A Verma 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 34-52, 2020 | 6 | 2020 |
Exploring new attack vectors for the exploitation of smartphones L Simon University of Cambridge, Computer Laboratory, 2017 | 1 | 2017 |
SCORED'22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses S Torres-Arias, M Melara, L Simon Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | | 2022 |
Erasing Secrets from RAM L Simon Real World Crypto Conference (RWC'17), 2017 | | 2017 |
A Gentle Introduction to Side Channel Attacks on Smartphones L Simon The Book of Payments: Historical and Contemporary Views on the Cashless …, 2016 | | 2016 |
EuroS&P 2021 L Bauer, AR Abdou, A Parker-Wood, A Dmitrienko, A Sabelfeld, A Paverd, ... | | |
Reynaud, Chantal Rogers, Mark I Mihu, E Nazerfard, B Negrevergne, P Nicolas, M Ostrowski, N Papadakis, ... | | |
Tan, Te Juin Lester 175 Tang, Haixu 521 Towa, Patrick 405 Treharne, Helen 425 J Koschel, E Koutsoupias, B Kreuter, R Küsters, X Lan, A Lehmann, ... | | |