A Large Scale Analysis of the Security of Embedded Firmwares A Costin, J Zaddach, A Francillon, D Balzarotti, S Antipolis USENIX Security Symposium, 2014 | 620 | 2014 |
AVATAR: A framework to support dynamic security analysis of embedded systems' firmwares J Zaddach, L Bruno, A Francillon, D Balzarotti NDSS 2014, 2014 | 464 | 2014 |
A security analysis of amazon's elastic compute cloud service M Balduzzi, J Zaddach, D Balzarotti, E Kirda, S Loureiro Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1427-1434, 2012 | 188 | 2012 |
Implementation and Implications of a Stealth Hard-Drive Backdoor J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ... Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 109 | 2013 |
Embedded Devices Security and Firmware Reverse Engineering J Zaddach, A Costin Black Hat USA 2013, 2013 | 74 | 2013 |
A Security Analysis of Amazon’s Elastic Compute Cloud Service–Long Version– M Balduzzi, J Zaddach, D Balzarotti, E Kirda, S Loureiro | 1 | 2011 |