Follow
Laurent Simon
Laurent Simon
Verified email at cl.cam.ac.uk - Homepage
Title
Cited by
Cited by
Year
Pin skimmer: Inferring pins through the camera and microphone
L Simon, R Anderson
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
1582013
Fuzzbench: an open fuzzer benchmarking platform and service
J Metzman, L Szekeres, L Simon, R Sprabery, A Arya
Proceedings of the 29th ACM joint meeting on European software engineering …, 2021
1552021
What you get is what you C: Controlling side effects in mainstream C compilers
L Simon, D Chisnall, R Anderson
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 1-15, 2018
912018
Fuzzfactory: domain-specific fuzzing with waypoints
R Padhye, C Lemieux, K Sen, L Simon, H Vijayakumar
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-29, 2019
812019
SOK: Making sense of censorship resistance systems
S Khattak, MT Elahi, L Simon, CM Swanson, SJ Murdoch, I Goldberg
Water Treatment Technology 2016 (4), 37-61, 2016
692016
Hearing your touch: A new acoustic side channel on smartphones
I Shumailov, L Simon, J Yan, R Anderson
arXiv preprint arXiv:1903.11137, 2019
602019
Don’t interrupt me while i type: Inferring text entered through gesture typing on android keyboards
L Simon, W Xu, R Anderson
Privacy Enhancing Technologies Symposium Advisory Board, 2016
442016
Security analysis of android factory resets
L Simon, R Anderson
4th Mobile Security Technologies Workshop (MoST), 2015
292015
Horizontal privilege escalation in trusted applications
D Suciu, S McLaughlin, L Simon, R Sion
29th USENIX Security Symposium (USENIX Security 20), 2020
282020
Speed adjustment algorithm for an RFID reader and conveyor belt system performing dynamic framed slotted aloha
L Simon, P Saengudomlert, U Ketprom
2008 IEEE International Conference on RFID, 199-206, 2008
142008
Security analysis of consumer-grade anti-theft solutions provided by android mobile anti-virus apps
L Simon, R Anderson
4th Mobile Security Technologies Workshop (MoST), 2015
132015
Systemization of pluggable transports for censorship resistance
S Khattak, L Simon, SJ Murdoch
arXiv preprint arXiv:1412.7448, 2014
112014
Improving fuzzing through controlled compilation
L Simon, A Verma
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 34-52, 2020
72020
Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager
PC Amusuo, KA Robinson, S Torres-Arias, L Simon, JC Davis
arXiv preprint arXiv:2310.14117, 2023
32023
Human and Avicennia marina Mangrove Populations: with Special Reference to Qatar
O Pernot, MH Abu-Dieyeh, L Simon, J Al-Khyatt, M Al-Ghouti
The Arab World Geographer 20 (2-3), 208-236, 2017
32017
SCORED'22: ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses
S Torres-Arias, M Melara, L Simon
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
12022
Exploring new attack vectors for the exploitation of smartphones
L Simon
University of Cambridge, Computer Laboratory, 2017
12017
Ecosystem services and mangroves in Qatar: preservation issues
O Pernot, L Simon, J Al-Khyatt, M Al-Ghouti, MH Abu-Dieyeh
Qscience Proceedings 2015 (5), 37, 2015
12015
SCORED'23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses
M Melara, S Torres-Arias, L Simon
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
Erasing Secrets from RAM
L Simon
Real World Crypto Conference (RWC'17), 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20