Toggle navigation
EFBW
Home
Archive
Categories
Tags
About
Bio & Research
Diplomas & Certifications
Awards
Teaching
Publications
Hacking Events
Invited Talks
Books & Book Chapter
Journal Papers (Peer-reviewed)
Conference Papers (Peer-reviewed)
Technical Papers
Technical Reports & Preprints
National & International Media
Scientific Activities
Ph D & PostDoc Tutorships
MSc Tutorships
Conference Organization
Reviewing Activities
Projects
Perseus
Megiddo
Davfi
Gostcrypt
Miscallanous Projects
Contact
Eric Filiol's Blog and Website
Recent Posts
The Gostcrypt Project Goes Private
An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography
Google Censorship
OSINT on the TOR Foundation (Update)
List of TOR Relays for Optimal Correlation Attack
Links
Electronic_Frontier Foundation
Cryptome archive
Framasoft
Wikileaks
Comsec
Mar-2011
iAWACS 2011
Mar-2011
Feedbacks from CanSecWest 2011
Feb-2011
Libperseus now in Ruby
Jan-2011
libperseus 1.0.1 (python + java binding)
Censorship
Dec-2019
Google Censorship
Computer security
Sep-2014
Focus on my situation with EICAR
May-2011
EICAR 2011 Paper on Mobile Botnets
Computer virology
Sep-2014
Focus on my situation with EICAR
Aug-2012
Android Malware SMSZombie In-depth Analysis
Apr-2012
Saving Private Herm1t
May-2011
EICAR 2011 Paper on Mobile Botnets
May-2011
McAfee Quarantine file and sequels from our EICAR 2011 paper
Mar-2011
iAWACS 2011
Mar-2011
Feedbacks from CanSecWest 2011
Dec-2010
Our talk on icons at Malcon 2010 and Clubhack 2010
Nov-2010
What the interest to create a malicious registry key? A confirmation of our Hack.lu 2010 paper
Comsec
Mar-2023
The Gostcrypt Project Goes Private
Feb-2020
An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography
Cryptology
Mar-2023
The Gostcrypt Project Goes Private
Feb-2020
An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography
Jan-2015
The New GOST Standard from the Russian Federation: GOST Grasshopper
Nov-2011
TOR Attack Technical Details
Oct-2011
First Feedbacks from H2HC and our TOR Attack
Cyberwarfare
Nov-2011
Let us stop with the buzz on TOR
Nov-2011
TOR Attack Technical Details
Oct-2011
First Feedbacks from H2HC and our TOR Attack
Ethics
Mar-2013
When Journalists are Going Deaf
Forensics
Feb-2020
An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography
Aug-2012
Android Malware SMSZombie In-depth Analysis
May-2011
iAWACS 2011 Forensics challenge
Gafam
Dec-2019
Google Censorship
Hacking
Mar-2018
OSINT on the TOR Foundation (Update)
Oct-2017
List of TOR Relays for Optimal Correlation Attack
Sep-2017
Preliminary Results on TOR Routing Protocol Statistical and Combinatorial Analysis
Apr-2014
Les incohérences de Microsoft
Oct-2013
L'avance technologique de Vupen
Mar-2013
Windows Memory Protection Oddities
Aug-2012
Perseus and iAWACS 2009/2010 Available Again
Nov-2011
TOR Attack Technical Details
Oct-2011
First Feedbacks from H2HC and our TOR Attack
May-2011
iAWACS 2011 Forensics challenge
Mar-2011
Voting machine attack
Information security
Jan-2015
The New GOST Standard from the Russian Federation: GOST Grasshopper
Mar-2011
iAWACS 2011
Mar-2011
Feedbacks from CanSecWest 2011
Feb-2011
Libperseus now in Ruby
Jan-2011
libperseus 1.0.1 (python + java binding)
Information security
Mar-2023
The Gostcrypt Project Goes Private
Feb-2020
An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography
Intelligence
Mar-2018
OSINT on the TOR Foundation (Update)
Oct-2017
List of TOR Relays for Optimal Correlation Attack
Sep-2017
Preliminary Results on TOR Routing Protocol Statistical and Combinatorial Analysis
Osint
Mar-2018
OSINT on the TOR Foundation (Update)
Operational
Mar-2018
OSINT on the TOR Foundation (Update)
Oct-2017
List of TOR Relays for Optimal Correlation Attack
Sep-2017
Preliminary Results on TOR Routing Protocol Statistical and Combinatorial Analysis
Jan-2015
The New GOST Standard from the Russian Federation: GOST Grasshopper
Oct-2013
L'avance technologique de Vupen
Aug-2012
Perseus and iAWACS 2009/2010 Available Again
Nov-2011
Let us stop with the buzz on TOR
May-2011
McAfee Quarantine file and sequels from our EICAR 2011 paper
Mar-2011
iAWACS 2011
Mar-2011
Feedbacks from CanSecWest 2011
Mar-2011
Voting machine attack
Feb-2011
Libperseus now in Ruby
Jan-2011
libperseus 1.0.1 (python + java binding)
Dec-2010
Our talk on icons at Malcon 2010 and Clubhack 2010
Nov-2010
What the interest to create a malicious registry key? A confirmation of our Hack.lu 2010 paper
Operationnal
Mar-2023
The Gostcrypt Project Goes Private
Feb-2020
An Cryptographic Algorithm Design Framework for Effective Deniable Cryptography
Social cooling
Dec-2019
Google Censorship
System security
Sep-2014
Focus on my situation with EICAR
Apr-2014
Les incohérences de Microsoft
Oct-2013
L'avance technologique de Vupen
Mar-2013
When Journalists are Going Deaf
Mar-2013
Windows Memory Protection Oddities
Aug-2012
Android Malware SMSZombie In-depth Analysis
Nov-2011
Let us stop with the buzz on TOR
May-2011
iAWACS 2011 Forensics challenge
May-2011
EICAR 2011 Paper on Mobile Botnets
May-2011
McAfee Quarantine file and sequels from our EICAR 2011 paper
Mar-2011
Voting machine attack
Dec-2010
Our talk on icons at Malcon 2010 and Clubhack 2010
Nov-2010
What the interest to create a malicious registry key? A confirmation of our Hack.lu 2010 paper
Transec
Mar-2011
iAWACS 2011
Mar-2011
Feedbacks from CanSecWest 2011
Feb-2011
Libperseus now in Ruby
Jan-2011
libperseus 1.0.1 (python + java binding)