关注
Romain Cayre
Romain Cayre
INSA Toulouse / LAAS-CNRS
在 laas.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Radiot: Radio communications intrusion detection for iot-a protocol independent approach
J Roux, E Alata, G Auriol, M Kaâniche, V Nicomette, R Cayre
2018 IEEE 17th International Symposium on Network Computing and Applications …, 2018
302018
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections
R Cayre, F Galtier, G Auriol, V Nicomette, M Kaâniche, G Marconato
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
222021
WazaBee: attacking Zigbee networks by diverting Bluetooth Low Energy chips
R Cayre, F Galtier, G Auriol, V Nicomette, M Kaâniche, G Marconato
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
222021
Mirage: towards a Metasploit-like framework for IoT
R Cayre, V Nicomette, G Auriol, E Alata, M Kaaniche, G Marconato
2019 IEEE 30th International Symposium on Software Reliability Engineering …, 2019
212019
A PSD-based fingerprinting approach to detect IoT device spoofing
F Galtier, R Cayre, G Auriol, M Kaâniche, V Nicomette
2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing …, 2020
132020
Mirage: un framework offensif pour l'audit du Bluetooth Low Energy
R Cayre, J Roux, E Alata, V Nicomette, G Auriol
Symposium sur la Sécurité des Technologies de l'Information et des …, 2019
52019
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers
R Cayre, V Nicomette, G Auriol, M Kaâniche, A Francillon
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
32024
Offensive and defensive approaches for wireless communication protocols security in IoT
R Cayre
INSA de Toulouse, 2022
22022
A defensive man-in-middle approach to filter BLE packets
A Aboukora, G Bonnet, F Galtier, R Cayre, V Nicomette, G Auriol
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
12021
Cross-protocol attacks: weaponizing a smartphone by diverting its Bluetooth controller
R Cayre, G Marconato, F Galtier, M Kaâniche, V Nicomette, G Auriol
Proceedings of the 14th ACM conference on security and privacy in wireless …, 2021
12021
PhaseSCA: When Jitter Meets Electromagnetic Side Channels
P Ayoub, A Hernandez, R Cayre, A Francillon, C Maurice
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025
2025
BlueScream: Screaming Channels on Bluetooth Low Energy
P Ayoub, R Cayre, A Francillon, C Maurice
40th Annual Computer Security Applications Conference (ACSAC'24), 2024
2024
Wireless Modulation Identification: filling the gap in IoT networks security audit
F Galtier, G Auriol, V Nicomette, PLR Olivier, R Cayre, M Kaâniche
International Conference on Detection of Intrusions and Malware, and …, 2024
2024
POSTER: Experimentation platform for repeatable security analysis in IoT heterogeneous environments
F Galtier, PLR Olivier, G Auriol, V Nicomette, R Cayre
17th ACM Conference on Security and Privacy in Wireless and Mobile Networks …, 2024
2024
Rétro-ingénierie et détournement de piles protocolaires embarquées, un cas d'étude sur le système ESP32
D Cauquil, R Cayre
SSTIC 2023, Symposium sur la sécurité des technologies de l'information et …, 2023
2023
ESPwn32: Hacking with ESP32 System-on-Chips
R Cayre, D Cauquil, A Francillon
2023 IEEE Security and Privacy Workshops (SPW), 311-325, 2023
2023
William C. Carter Award
R Cayre
2022
OASIS: un framework pour la détection d'intrusion embarquée dans les contrôleurs Bluetooth Low Energy
R Cayre, C Chaine, G Auriol, V Nicomette, G Marconato
Symposium sur la sécurité des technologies de l'information et des …, 2022
2022
InjectaBLE: injection de trafic malveillant dans une connexion Bluetooth Low Energy
R Cayre, F Galtier, G Auriol, V Nicomette, M Kaâniche, G Marconato
Symposium sur la sécurité des technologies de l'information et des …, 2021
2021
Attaques inter-protocolaires par détournement du contrôleur Bluetooth d'un téléphone mobile
R Cayre, F Galtier
GT Sécurité des Systèmes, Logiciels et Réseaux, 2021
2021
系统目前无法执行此操作,请稍后再试。
文章 1–20