Toggle navigation
EFBW
Home
Archive
Categories
Tags
About
Bio & Research
Diplomas & Certifications
Awards
Teaching
Publications
Hacking Events
Invited Talks
Books & Book Chapter
Journal Papers (Peer-reviewed)
Conference Papers (Peer-reviewed)
Technical Papers
Technical Reports & Preprints
National & International Media
Scientific Activities
Ph D & PostDoc Tutorships
MSc Tutorships
Conference Organization
Reviewing Activities
Projects
Perseus
Megiddo
Davfi
Gostcrypt
Miscallanous Projects
Contact
Eric Filiol's Blog and Website
Recent Posts
The Gostcrypt Project Goes Private
An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography
Google Censorship
OSINT on the TOR Foundation (Update)
List of TOR Relays for Optimal Correlation Attack
Links
Electronic_Frontier Foundation
Cryptome archive
Framasoft
Wikileaks
2023
Mar
The Gostcrypt Project Goes Private
2020
Feb
An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography
2019
Dec
Google Censorship
2018
Mar
OSINT on the TOR Foundation (Update)
2017
Oct
List of TOR Relays for Optimal Correlation Attack
Sep
Preliminary Results on TOR Routing Protocol Statistical and Combinatorial Analysis
2015
Jan
The New GOST Standard from the Russian Federation: GOST Grasshopper
2014
Sep
Focus on my situation with EICAR
Apr
Les incohérences de Microsoft
2013
Oct
L'avance technologique de Vupen
Mar
When Journalists are Going Deaf
Mar
Windows Memory Protection Oddities
2012
Aug
Android Malware SMSZombie In-depth Analysis
Aug
Perseus and iAWACS 2009/2010 Available Again
Apr
Saving Private Herm1t
2011
Nov
Let us stop with the buzz on TOR
Nov
TOR Attack Technical Details
Oct
First Feedbacks from H2HC and our TOR Attack
May
iAWACS 2011 Forensics challenge
May
EICAR 2011 Paper on Mobile Botnets
May
McAfee Quarantine file and sequels from our EICAR 2011 paper
Mar
iAWACS 2011
Mar
Feedbacks from CanSecWest 2011
Mar
Voting machine attack
Feb
Libperseus now in Ruby
Jan
libperseus 1.0.1 (python + java binding)
2010
Dec
Our talk on icons at Malcon 2010 and Clubhack 2010
Nov
What the interest to create a malicious registry key? A confirmation of our Hack.lu 2010 paper