scispace - formally typeset
O

Olivier Heen

Researcher at French Institute for Research in Computer Science and Automation

Publications -  53
Citations -  873

Olivier Heen is an academic researcher from French Institute for Research in Computer Science and Automation. The author has contributed to research in topics: Key (cryptography) & Timestamp. The author has an hindex of 13, co-authored 53 publications receiving 796 citations. Previous affiliations of Olivier Heen include University of Paris.

Papers
More filters
Book ChapterDOI

Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters

TL;DR: An automatic and generic method for reverse engineering Intel's last-level cache complex addressing, consequently rendering the class of cache attacks highly practical and giving a more precise description of the complex addressing function than previous work.
Book ChapterDOI

C5: Cross-Cores Cache Covert Channel

TL;DR: C5 is built, a covert channel that tackles addressing uncertainty without requiring any shared memory, making the covert channel fast and practical and one order of magnitude above previous cache-based covert channels in the same setup.
Proceedings ArticleDOI

An Empirical Study of Passive 802.11 Device Fingerprinting

TL;DR: This work evaluates a set of global wireless network parameters with respect to their ability to identify 802.11 devices and focuses on inter-arrival times, the most promising parameter for device identification, and shows its dependency from several device characteristics such as the wireless card and driver but also running applications.

New Tool And Technique For Remote Operating System Fingerprinting

TL;DR: An original Operating System detection method, based on temporal response analysis, is presented, and the open source tool called RING – for Remote Identification Next Generation – is released, and improvements are suggested.
Book ChapterDOI

Confidentiality issues on a GPU in a virtualized environment

TL;DR: The objective is to highlight possible information leakage due to GPUs in virtualized and cloud computing environments, and provides insight into the different GPU virtualization techniques, along with their security implications.