I am a researcher in infosec.
I obtained my PhD from Telecom ParisTech in October 2015 while working at Technicolor in Rennes, jointly with the S3 group of Eurecom in Sophia Antipolis.
I am now working as a postdoctoral researcher in the Secure Systems group at the Graz University of Technology, Institute of Applied Information Processing and Communications, in Austria.
Among other topics, I am interested in microarchitectural covert and side channels in commodity computers and servers, reverse-engineering processor parts, virtualization security and fingerprinting everything :)
BloodyTangerine
Google Scholar
dblp
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
Network and Distributed System Security Symposium 2017 (NDSS'17), San Diego, California, USA, February 2017 (acceptance rate: 16.1%)
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
23rd ACM Conference on Computer and Communications Security (CCS'16), Vienna, Austria, October 2016 (acceptance rate: 16.4%)
Work presented at BlackHat USA 2016
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
23rd ACM Conference on Computer and Communications Security (CCS'16), Vienna, Austria, October 2016 (acceptance rate: 16.4%)
Media:
Ars Technica,
Wired
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
25th USENIX Security Symposium, Austin, TX, USA, August 2016 (acceptance rate: 15.6%)
Work presented at BlackHat Europe 2016.
Pre-print online since November 2015 on arXiv:1511.08756
ARMageddon: Cache Attacks on Mobile Devices
25th USENIX Security Symposium, Austin, TX, USA, August 2016 (acceptance rate: 15.6%)
Work presented at BlackHat Europe 2016
Flush+Flush: A Fast and Stealthy Cache Attack
13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'16), Donostia-San Sebastián, Spain, July 2016 (acceptance rate: 31.8%)
Pre-print online since November 2015 on arXiv:1511.04594
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'16), Donostia-San Sebastián, Spain, July 2016 (acceptance rate: 31.8%)
Media:
Slate,
Vice Motherboard,
Ars Technica,
Wired,
Le Monde Informatique [fr],
golem.de [de]
Work presented at the CCC 2015.
Pre-print online since July 2015 on arXiv:1507.06955
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
18th International Symposium on Research in Attacks,
Intrusions and Defenses (RAID'15), Kyoto, Japan, November 2015
(acceptance rate: 23.5%)
C5: Cross-Cores Cache Covert Channel
12th International Conference on Detection of
Intrusions and Malware, and Vulnerability Assessment (DIMVA'15), Milan,
Italy, July 2015 (acceptance rate: 22.7%)
Best Paper Award
Confidentiality Issues on a GPU in a Virtualized Environment
18th International Conference on Financial Cryptography and Data Security (FC'14), Barbados, March 2014 (acceptance rate: 22.5%)
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting
10th International Conference on Security and Cryptography (SECRYPT'13), Reykjavik, Iceland, July 2013
Mail: clementine AT cmaurice.fr
Public key: 0x8E3AD1E68A58791B
Fingerprint: B57A F30A ABD1 0F35 99D4 F53A 8E3A D1E6 8A58 791B