EFBW
  • Home
  • Archive
  • Categories
  • Tags
  • About
    • Bio & Research
    • Diplomas & Certifications
    • Awards
    • Teaching
  • Publications
    • Hacking Events
    • Invited Talks
    • Books & Book Chapter
    • Journal Papers (Peer-reviewed)
    • Conference Papers (Peer-reviewed)
    • Technical Papers
    • Technical Reports & Preprints
    • National & International Media
  • Scientific Activities
    • Ph D & PostDoc Tutorships
    • MSc Tutorships
    • Conference Organization
    • Reviewing Activities
  • Projects
    • Perseus
    • Megiddo
    • Davfi
    • Gostcrypt
    • Miscallanous Projects
  • Contact
Eric Filiol's Blog and Website

Recent Posts

  • The Gostcrypt Project Goes Private
  • An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography
  • Google Censorship
  • OSINT on the TOR Foundation (Update)
  • List of TOR Relays for Optimal Correlation Attack

Links

  • Electronic_Frontier Foundation
  • Cryptome archive
  • Framasoft
  • Wikileaks

2023

  • Mar The Gostcrypt Project Goes Private

2020

  • Feb An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography

2019

  • Dec Google Censorship

2018

  • Mar OSINT on the TOR Foundation (Update)

2017

  • Oct List of TOR Relays for Optimal Correlation Attack
  • Sep Preliminary Results on TOR Routing Protocol Statistical and Combinatorial Analysis

2015

  • Jan The New GOST Standard from the Russian Federation: GOST Grasshopper

2014

  • Sep Focus on my situation with EICAR
  • Apr Les incohérences de Microsoft

2013

  • Oct L'avance technologique de Vupen
  • Mar When Journalists are Going Deaf
  • Mar Windows Memory Protection Oddities

2012

  • Aug Android Malware SMSZombie In-depth Analysis
  • Aug Perseus and iAWACS 2009/2010 Available Again
  • Apr Saving Private Herm1t

2011

  • Nov Let us stop with the buzz on TOR
  • Nov TOR Attack Technical Details
  • Oct First Feedbacks from H2HC and our TOR Attack
  • May iAWACS 2011 Forensics challenge
  • May EICAR 2011 Paper on Mobile Botnets
  • May McAfee Quarantine file and sequels from our EICAR 2011 paper
  • Mar iAWACS 2011
  • Mar Feedbacks from CanSecWest 2011
  • Mar Voting machine attack
  • Feb Libperseus now in Ruby
  • Jan libperseus 1.0.1 (python + java binding)

2010

  • Dec Our talk on icons at Malcon 2010 and Clubhack 2010
  • Nov What the interest to create a malicious registry key? A confirmation of our Hack.lu 2010 paper

©2024 EFBW , Powered by Jekyll , Bootstrap , Markdown