• Publications
  • Influence
What If You Can't Trust Your Network Card?
TLDR
It is shown that, depending on the architecture of the adapter and the interface provided by the NIC to the host operating system, building an efficient detection framework is possible and the choices made when designing such a framework are explained and described. Expand
ACPI and SMI handlers: some limits to trusted computing
TLDR
An original mechanism that may be used by attackers to alter the SMI handler is presented, and how rogue functions triggered by an external stimulus can be injected inside ACPI tables are described. Expand
ACPI: Design Principles and Concerns
TLDR
This paper illustrates how this shift in the global power management model introduces additional threats, especially for trusted platforms, by showing how rootkits can use ACPI to conceal some of their functions. Expand
CPU bugs, CPU backdoors and consequences on security
  • Loïc Duflot
  • Computer Science
  • Journal in Computer Virology
  • 1 May 2009
TLDR
The security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors are presented and it is shown how it is possible for an attacker to implement a simple and generic CPU backdoor to bypass mandatory security mechanisms with very limited initial privileges. Expand
On the Limits of Hypervisor- and Virtual Machine Monitor-Based Isolation
In the past few years, there has been a lot of different attempts to build trusted platforms allowing users to access sensitive and non-sensitive data in a compartmentalized way, i.e., such thatExpand
CPU Bugs, CPU Backdoors and Consequences on Security
TLDR
It is shown how it is possible for an attacker to implement a simple and generic CPU backdoor to be later able to bypass mandatory security mechanisms with very limited initial privileges. Expand
Device forming a logic gate adapted to detect a logical error
The present invention relates to a device forming an electrical circuit, characterized in that it comprises logic means (30) generating and exploiting low signal levels intermediate between the powerExpand
Collaboration and Information Sharing toward forecasting : A case study at L’Oréal Sverige AB
This paper tackles the need for information sharing between retailer and supplier in the fast moving consumer goods industry. Satisfying the end customer demand strains both the supplier and theExpand