Publications
Feb 19th, 2021
Gauging LoRaWAN Communication Security with LoraPWN
Trend Micro Blog
Jan 27th, 2021
LoRaPWNing: Practical Radio Attacks on LoRaWAN
The Things Conference
Jan 26th, 2021
Low Powered but High Risk: Evaluating Possible Attacks on LoRaWAN Devices
Trend Micro Blog
Dec 2nd, 2020
Deep dive into LoRa(WAN) RF and Hardware Security
OWASP Czech Meetup 2020
Nov 27th, 2020
LORAPWNING - JAK ATAKOWAĆ I ZABEZPIECZAĆ PROTOKÓŁ LORAWAN
OMYHACK 2020
Nov 11th, 2020
Introduction to IoT hacking with SDR
Semana de INFormática (SINF) 2020
Apr 22nd, 2020
RF Shadow Plays
Mar 14th, 2020
Smart grid (in)security
CiderSecCon 2020
Feb 4th, 2020
Introduction to mobile network intrusions from a mobile phone
Nov 3rd, 2019
TIBCO JasperReports Server XML Entity Expansion Vulnerability (CVE-2019-8986)
Oct 24th, 2019
V2G Injector: Whispering to cars and charging units through the Power-Line (extended version)
t2 infosec
Oct 3rd, 2019
Huawei ManageOne ServiceCenter ACL Bypass
Software-Defined Network
Aug 1st, 2019
TRF7970A forgotten features for HydraNFC
Paged Out! Issue #1
Jul 6th, 2019
The return of FAIFA and HomePlugPWN: Make Power-Line Communication hacks great again!
leHack 2019
Jun 7th, 2019
V2G Injector: Whispering to cars and charging units through the Power-Line
SSTIC 2019
Mar 19th, 2019
Modmobtools: Internals, updates and more
Troopers Telco Sec Day 2019
Mar 18th, 2019
Modmob tools and tricks: Using cheap tools and tricks to attack mobile devices in practice
Troopers NGI 2019
Feb, 2019
Attacking mobile devices from GPRS to LTE
MISC magazine HS #19
Nov 19th, 2018
PentHertz: The use of radio attacks in red team and pentests
Security PWNing 2018
Jun 14th, 2018
Modmobjam: Jam tomorrow, jam yesterday, but also jam today
SSTIC RUMP 2018
May 31st, 2018
Modmobmap: The modest mobile networks mapping tool
BeeRump 2018
Apr 10th, 2018
Missing XML Validation vulnerability in SAP Control Center and SAP Cockpit Framework
Sep, 2017
Radio communication penetration testing
MISC Magazine HS #16
Jun 8th, 2017
Out-of-control cars!
SSTIC RUMP 2017
May 23th, 2017
IoT Hacking - the case of Intercoms (with little updates since 33C3)
OSSIR 2017
Dec 28th, 2016
Intercoms Hackings, when frontdoors become backdoors (more detailed)
33c3
Dec 28th, 2016
House intercoms attacks, when frontdoors become backdoors (including progresses on 3G intercoms)
Hack.lu 2012
Jul 2nd, 2016
House intercoms attacks, when frontdoors become backdoors
Nuit Du Hack 2012
Jun 7th, 2016
Mobile communications: practical attacks using cheap equipment
Business France 2016
Feb 1st, 2016
CVE-2016-3513, CVE-2016-3514, CVE-2016-3515 and CVE-2016-3516 in Oracle ECB and COM products
May 1st, 2015
CVE-2015-6409: Cisco Jabber STARTTLS Downgrade Vulnerability
Apr 15th, 2015
How to hack the Blackphone, the "NSA-Proof" smartphone
01net.com magazine
Oct 19th, 2014
HomePlugAV PLC: Practical attacks and backdooring
NoSuchCon 2014
Oct, 2012
Fuzzing the GSM Protocol Stack
Hack.lu 2012
Jul, 2012
Applicative security in Linux
MISC #62
2010
Introduction to USRP: hardware, radio, digital processing, and GnuRadio
HackerzVoice