default search action
Flavio D. Garcia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui, Dominik Rys:
Watching your call: Breaking VoLTE Privacy in LTE/5G Networks. Proc. Priv. Enhancing Technol. 2023(2): 282-297 (2023) - [i9]Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui, Dominik Rys:
Watching your call: Breaking VoLTE Privacy in LTE/5G Networks. CoRR abs/2301.02487 (2023) - 2022
- [c37]Zitai Chen, Sam L. Thomas, Flavio D. Garcia:
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware. CCS 2022: 515-529 - [c36]José Moreira, Mark Ryan, Flavio D. Garcia:
Protocols for a Two-Tiered Trusted Computing Base. ESORICS (3) 2022: 229-249 - [i8]Mihai Ordean, Flavio D. Garcia:
Millimeter-Wave Automotive Radar Spoofing. CoRR abs/2205.06567 (2022) - [i7]Zitai Chen, Sam L. Thomas, Flavio D. Garcia:
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware. CoRR abs/2208.03528 (2022) - 2021
- [j9]Jan Van den Herrewegen, David F. Oswald, Flavio D. Garcia, Qais Temeiza:
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 56-81 (2021) - [j8]Sam L. Thomas, Jan Van den Herrewegen, Georgios Vasilakis, Zitai Chen, Mihai Ordean, Flavio D. Garcia:
Cutting Through the Complexity of Reverse Engineering Embedded Devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 360-389 (2021) - [c35]Zitai Chen, Georgios Vasilakis, Kit Murdock, Edward Dean, David F. Oswald, Flavio D. Garcia:
VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface. USENIX Security Symposium 2021: 699-716 - 2020
- [j7]Kit Murdock, David F. Oswald, Flavio D. Garcia, Jo Van Bulck, Frank Piessens, Daniel Gruss:
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble. IEEE Secur. Priv. 18(5): 28-37 (2020) - [j6]Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David F. Oswald, Benedikt Gierlichs, Bart Preneel:
Dismantling DST80-based Immobiliser Systems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 99-127 (2020) - [c34]Andreea-Ina Radu, Flavio D. Garcia:
Grey-box Analysis and Fuzzing of Automotive Electronic Components via Control-Flow Graph Extraction. CSCS 2020: 9:1-9:11 - [c33]Christopher Hicks, Flavio D. Garcia:
A Vehicular DAA Scheme for Unlinkable ECDSA Pseudonyms in V2X. EuroS&P 2020: 460-473 - [c32]Kit Murdock, David F. Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, Frank Piessens:
Plundervolt: Software-based Fault Injection Attacks against Intel SGX. SP 2020: 1466-1482
2010 – 2019
- 2019
- [c31]Jo Van Bulck, David F. Oswald, Eduard Marin, Abdulla Aldoseri, Flavio D. Garcia, Frank Piessens:
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes. CCS 2019: 1741-1758 - [c30]Eric R. Verheul, Christopher Hicks, Flavio D. Garcia:
IFAL: Issue First Activate Later Certificates for V2X. EuroS&P 2019: 279-293 - 2018
- [j5]Christopher Hicks, Flavio D. Garcia, David F. Oswald:
Dismantling the AUT64 Automotive Cipher. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 46-69 (2018) - [c29]Jan Van den Herrewegen, Flavio D. Garcia:
Beneath the Bonnet: A Breakdown of Diagnostic Security. ESORICS (1) 2018: 305-324 - [c28]Flavio D. Garcia:
Automotive Cyber Security: Lessons Learned and Research Challenges. CS2@HiPEAC 2018: 19 - 2017
- [c27]Chris McMahon Stone, Tom Chothia, Flavio D. Garcia:
Spinner: Semi-Automatic Detection of Pinning without Hostname Verification. ACSAC 2017: 176-188 - [c26]Sam L. Thomas, Flavio D. Garcia, Tom Chothia:
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware. DIMVA 2017: 279-300 - [c25]Sam L. Thomas, Tom Chothia, Flavio D. Garcia:
Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality. ESORICS (2) 2017: 513-531 - [c24]Tom Chothia, Flavio D. Garcia, Chris Heppel, Chris McMahon Stone:
Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps. Financial Cryptography 2017: 579-597 - 2016
- [c23]Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel:
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. ACSAC 2016: 226-236 - [c22]Flavio D. Garcia, Bart Jacobs:
The Fall of a Tiny Star. The New Codebreakers 2016: 69-87 - [c21]Andreea-Ina Radu, Flavio D. Garcia:
LeiA: A Lightweight Authentication Protocol for CAN. ESORICS (2) 2016: 283-300 - [c20]Flavio D. Garcia, David F. Oswald, Timo Kasper, Pierre Pavlidès:
Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems. USENIX Security Symposium 2016 - 2015
- [j4]Roel Verdult, Flavio D. Garcia:
Cryptanalysis of the Megamos Crypto Automotive Immobilizer. login Usenix Mag. 40(6) (2015) - [c19]Tom Chothia, Flavio D. Garcia, Joeri de Ruiter, Jordi van den Breekel, Matthew Thompson:
Relay Cost Bounding for Contactless EMV Payments. Financial Cryptography 2015: 189-206 - 2014
- [j3]Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult:
Wirelessly lockpicking a smart card reader. Int. J. Inf. Sec. 13(5): 403-420 (2014) - 2013
- [j2]Flavio D. Garcia, Eric R. Verheul, Bart Jacobs:
Cell-based privacy-friendly roadpricing. Comput. Math. Appl. 65(5): 774-785 (2013) - [c18]Roel Verdult, Flavio D. Garcia, Baris Ege:
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. USENIX Security Symposium 2013: 703-718 - 2012
- [c17]Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac:
Dismantling iClass and iClass Elite. ESORICS 2012: 697-715 - [c16]Roel Verdult, Flavio D. Garcia, Josep Balasch:
Gone in 360 Seconds: Hijacking with Hitag2. USENIX Security Symposium 2012: 237-252 - 2011
- [c15]Flavio D. Garcia, Eric R. Verheul, Bart Jacobs:
Cell-Based Roadpricing. EuroPKI 2011: 106-122 - [c14]Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult:
Exposing iClass Key Diversification. WOOT 2011: 128-136 - 2010
- [c13]Flavio D. Garcia, Peter van Rossum:
Modeling Privacy for Off-Line RFID Systems. CARDIS 2010: 194-208 - [c12]Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur:
Dismantling SecureMemory, CryptoMemory and CryptoRF. CCS 2010: 250-259 - [c11]Gerhard de Koning Gans, Flavio D. Garcia:
Towards a Practical Solution to the RFID Desynchronization Problem. RFIDSec 2010: 203-219 - [c10]Flavio D. Garcia, Bart Jacobs:
Privacy-Friendly Energy-Metering via Homomorphic Encryption. STM 2010: 226-238 - [i6]Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur:
Dismantling SecureMemory, CryptoMemory and CryptoRF. IACR Cryptol. ePrint Arch. 2010: 169 (2010)
2000 – 2009
- 2009
- [c9]David Galindo, Flavio D. Garcia:
A Schnorr-Like Lightweight Identity-Based Signature Scheme. AFRICACRYPT 2009: 135-148 - [c8]Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur:
Wirelessly Pickpocketing a Mifare Classic Card. SP 2009: 3-15 - 2008
- [j1]Flavio D. Garcia, Peter van Rossum:
Sound and complete computational interpretation of symbolic hashes in the standard model. Theor. Comput. Sci. 394(1-2): 112-133 (2008) - [c7]Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia:
A Practical Attack on the MIFARE Classic. CARDIS 2008: 267-282 - [c6]Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs:
Dismantling MIFARE Classic. ESORICS 2008: 97-114 - [c5]David Galindo, Flavio D. Garcia, Peter van Rossum:
Computational Soundness of Non-Malleable Commitments. ISPEC 2008: 361-376 - [i5]Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia:
A Practical Attack on the MIFARE Classic. CoRR abs/0803.2285 (2008) - 2007
- [i4]Flavio D. Garcia, Peter van Rossum, Ana Sokolova:
Probabilistic Anonymity and Admissible Schedulers. CoRR abs/0706.1019 (2007) - 2006
- [c4]Flavio D. Garcia, Peter van Rossum:
Sound Computational Interpretation of Symbolic Hashes in the Standard Model. IWSEC 2006: 33-47 - [i3]Flavio D. Garcia, Peter van Rossum:
Sound Computational Interpretation of Formal Hashes. IACR Cryptol. ePrint Arch. 2006: 14 (2006) - [i2]Flavio D. Garcia, Peter van Rossum:
Completeness of Formal Hashes in the Standard Model. IACR Cryptol. ePrint Arch. 2006: 146 (2006) - 2005
- [c3]Flavio D. Garcia, Jaap-Henk Hoepman:
Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. ACNS 2005: 364-377 - [c2]Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum:
Provable anonymity. FMSE 2005: 63-72 - 2004
- [c1]Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen:
Spam Filter Analysis. SEC 2004: 395-410 - [i1]Flavio D. Garcia, Jaap-Henk Hoepman:
Spam filter analysis. CoRR cs.CR/0402046 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint