Eric Filiol [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
BY-DESIGN BACKDOORING OF ENCRYPTION SYSTEM - CAN WE TRUST FOREIGN ENCRYPTION ALGORITHMS blackhateu-2017 - london,uk
(IN)SECURITY OF MOBILE BANKING BlackHatAsia-2015 - Marina Bay,Singapore
Crypto Hot Cases – One Year Backward phdays-2014 - Moscow,Russia
Hacking 9/11 - The next is likely to be even bigger with an ounce of cyber - CanSecWest-2014 - Vancouver,Canada
[FR] Securing cities with CCTVs? Not so sure – A urban guerilla perspective Nuit-2013 - Paris,France
The Control of technology by nation state : Past, Present and Future - The Case of Cryptology and information security hackinparis-2013 - Paris,France Security
Dynamic cryptographic trapdoors to take over the TOR network PacSec-2011 - Tokyo,Japan
Dymanic Cryptographic Trapdoors CanSecWest-2011 - Vancouver, Canada Security
Malcon Ñ Windows Icons: Watch Them Closely Or Your Screwed! ClubHack-2010 - Pune, India Security
How To Operationally Detect And Break Misuse Of Weak Stream Ciphers (And Even Block Ciphers Sometimes) - Application To The Office Encryption Cryptanalysis Blackhat Europe-2010 - Barcelona, Spain Security Risk
Perseus: A Coding Theory-based Firefox Plug-in to Counter Botnet Activity HackLu-2009 - Luxembourg,Luxembourg
How To Prepare, Coordinate And Conduct A Cyber Attack BruCON-2009 - Brussels, Belgium Security Cyberwar
Openoffice Security Design Weaknesses Blackhat Europe-2009 - Barcelona, Spain Security
Opening Speech: Malware of the future - When mathematics work for the dark side. HackLu-2008 - Luxembourg,Luxembourg
Passive And Active Leakage Of Secret Data From Non Networked Computer Blackhat USA-2008 - Las Vegas, USA Security
New Viral Threats Of Pdf Language Blackhat Europe-2008 - Amsterdam, The Netherlands Security
Formal model proposal for (malware) program stealth Virus Bulletin-2007 - Vienna, Austria Security