I am a security researcher. I am working as a full-time researcher (Chargée de Recherche) for CNRS, at CRIStAL (Lille, France), in the Spirals group.
Previously, I worked as a CNRS researcher at IRISA (Rennes, France) in the EMSEC group.
Before that, I worked as a postdoctoral researcher in the Secure Systems group at the Graz University of Technology, Institute of Applied Information Processing and Communications, in Austria.
I obtained my PhD from Telecom ParisTech in October 2015 while working at Technicolor in Rennes, jointly with the S3 group of Eurecom in Sophia Antipolis.
Among other topics, I am interested in microarchitectural covert and side channels in commodity computers and servers, reverse-engineering processor parts, software-based fault attacks, and fingerprinting everything.
Career break: 6-month maternity leave from August 2023 to February 2024.
 @bloody-tangerine.bsky.social 
 Google Scholar 
 dblp 
CV [fr] (last update: October 2025)
Mail: clementine.maurice AT inria.fr
WIP: A Second Look at Port Assignment on Intel CPUs
  
    
Microarchitecture Security Conference (uASC'26), Leuven, Belgium
Stop treating code like an afterthought: record, share and value it
Nature 646 (8084), 284-286
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels
  
    
Conference on Cryptographic Hardware and Embedded Systems (CHES'25), Kuala Lumpur, Malaysia
 Artifact Functional
BlueScream: Screaming Channels on Bluetooth Low Energy
  
   
Annual Computer Security Applications Conference (ACSAC'24), Waikiki, Hawaii, USA (acceptance rate: 19.7%)
 Artifact Available, Reviewed & Reproducible
Semi-Automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript
  
   
   
23rd International Conference on Cryptology And Network Security (CANS'24), Cambridge, UK (acceptance rate: 32.9%)
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries
  
   
ACM Conference on Computer and Communications Security (CCS'23), Copenhagen, Denmark (acceptance rate: 19.1%)
The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption
  
   
20th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'23), Hamburg, Germany  (acceptance rate: 28.3%)
 Best Paper Award, Runner-Up
Characterizing Prefetchers using CacheObserver
  
   
34th International Symposium on Computer Architecture and High Performance Computing (IEEE SBAC-PAD'22), Bordeaux, France (acceptance rate: 35.4%)
CPU Port Contention Without SMT
  
   
27th European Symposium on Research in Computer Security (ESORICS'22), Copenhagen, Denmark (acceptance rate: 18.5%)
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers
  
   
17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22), Nagasaki, Japan (acceptance rate: 18.4%)
DrawnApart: A Device Identification Technique
based on Remote GPU Fingerprinting
   
  
Network and Distributed System Security Symposium 2022 (NDSS'22), San Diego, California, USA (acceptance rate: 16.2%)
Media: 
  Gizmodo, 
  PCMag,
  Tom's Hardware,
  Le Monde Informatique [fr]
 1st place at CSAW'22 Applied Research Competition MENA
 Mozilla Security Hall of Fame (Q2 2021)
DITTANY: Strength-Based Dynamic Information Flow Analysis Tool for x86 Binaries
   
  
Binary Analysis Research Workshop 2022 (BAR'22, co-located with NDSS '22), San Diego, California, USA
SoK: In Search of Lost Time: A Review of JavaScript’s Timers in Browsers
   
    
   
6th IEEE European Symposium on Security and Privacy (EuroS&P'21), Vienna, Austria, Online (acceptance rate: 19.4%)
Work also presented at Pass The SALT 2021
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level
   
Workshop on the Security of Software/Hardware Interfaces (SILM'21, co-located with EuroS&P21), Vienna, Austria, Online
Calibration Done Right: Noiseless Flush+Flush Attacks
   
  
18th Conference on Detection of Intrusions and Malware & Vulnerability Assessment  (DIMVA'21), Lisbon, Portugal, Online (acceptance rate: 28.8%)
Reproducing Spectre Attack with gem5: How To Do It Right?
   
  
   
14th European Workshop on Systems Security  (EuroSec'21, co-located with EuroSys'21), Edinburgh, Scotland, UK, Online (acceptance rate: 56.3%)
Nethammer: Inducing Rowhammer Faults through Network Requests
   
Workshop on the Security of Software/Hardware Interfaces (SILM'20, co-located with EuroS&P20), Genova, Italy, Online
Media: 
  The Hacker News, 
  The Register
 
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors
   
15th ACM ASIA Conference on Computer and Communications Security (ASIACCS'20), Taipei, Taiwan, Online (acceptance rate: 21.8%)
Media: 
  ZDNet, 
  Engadget,
  Tom's Hardware
 
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
   
Cybersecurity Vol. 3, January, 2020
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
   
13th ACM ASIA Conference on Computer and Communications Security (ASIACCS'18), Songdo, Incheon, Korea (acceptance rate: 20.0%)
Pre-print online since November 2017 on arXiv:1711.01254
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
   
     
      
Network and Distributed System Security Symposium 2018 (NDSS'18), San Diego, California, USA
Practical Keystroke Timing Attacks in Sandboxed JavaScript
   
  
      
22nd European Symposium on Research in Computer Security (ESORICS'17), Oslo, Norway (acceptance rate: 15.9%)
KASLR is Dead: Long Live KASLR
  
  
    
9th International Symposium on
Engineering Secure Software and Systems (ESSoS'17), Bonn, Germany (acceptance rate: 46.9%)
  Wikipedia
 
Malware Guard Extension: Using SGX to Conceal Cache Attacks
   
  
14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'17), Bonn, Germany (acceptance rate: 26.8%)
Pre-print online since February 2017 on arXiv:1702.08719
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript
   
  
Financial Cryptography and Data Security 2017 (FC'17), Malta
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
   
  
  
    
    
Network and Distributed System Security Symposium 2017 (NDSS'17), San Diego, California, USA (acceptance rate: 16.1%)
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
   
   
    
  
23rd ACM Conference on Computer and Communications Security (CCS'16), Vienna, Austria (acceptance rate: 16.4%)
Work also presented at BlackHat USA 2016
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
   
  
   
   
23rd ACM Conference on Computer and Communications Security (CCS'16), Vienna, Austria (acceptance rate: 16.4%)
Media: 
  Ars Technica, 
  Wired  
 1st place at CSAW'17 Applied Research Best Paper Award
 Pwnie Award for Best Privilege Escalation Bug at Black Hat 2017
 Best Dutch Cyber Security Research Paper (DCSRP) 2017
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
   
   
  
  
  
25th USENIX Security Symposium, Austin, TX, USA (acceptance rate: 15.6%)
Work also presented at BlackHat Europe 2016. 
Pre-print online since November 2015 on arXiv:1511.08756
ARMageddon: Cache Attacks on Mobile Devices
     
   
  
  
  
25th USENIX Security Symposium, Austin, TX, USA (acceptance rate: 15.6%)
Work also presented at BlackHat Europe 2016
Flush+Flush: A Fast and Stealthy Cache Attack
   
    
  
  
13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'16), Donostia-San Sebastián, Spain (acceptance rate: 31.8%)
Pre-print online since November 2015 on arXiv:1511.04594
 Most Influential DIMVA Paper 2014-2018 (awarded at DIMVA'23)
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
   
   
  
  
13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'16), Donostia-San Sebastián, Spain (acceptance rate: 31.8%)
Media: 
  Slate,
  Vice Motherboard,
  Ars Technica,
  Wired,
  Le Monde Informatique [fr],
  golem.de [de]
Work also presented at the CCC 2015. 
Pre-print online since July 2015 on arXiv:1507.06955
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
   
   
  
18th International Symposium on Research in Attacks,
 Intrusions and Defenses (RAID'15), Kyoto, Japan (acceptance rate: 23.5%)
C5: Cross-Cores Cache Covert Channel
   
  
12th International Conference on Detection of 
Intrusions and Malware, and Vulnerability Assessment (DIMVA'15), Milan, 
Italy (acceptance rate: 22.7%)
 Best Paper Award
Confidentiality Issues on a GPU in a Virtualized Environment
   
  
18th International Conference on Financial Cryptography and Data Security (FC'14), Barbados (acceptance rate: 22.5%)
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting
   
  
10th International Conference on Security and Cryptography (SECRYPT'13), Reykjavik, Iceland