Conferences & Journals
Note
By default, if no author name is mentioned, I’m the sole author.
2025
- To be announced :)
2024
- R2AI, BlackAlps, Yverdon les Bains, November 2024, Lightning Talk
- Android Flutter Malware, Virus Bulletin, Dublin, Ireland, October 2024,
- Reversing Dart AOT snapshots, Phrack Magazine, Volume 0x10, Issue 0x47, Phile 0x0B of 0x11, August 2024.
- The Accessibility Abyss: Navigating Android Malware Waters, Insomnihack, Lausanne, Switzerland, April 2024, ,
- The Complexity of Reversing Flutter Applications, Nullcon, Berlin, Germany, March 2024, ,
2023
- Unraveling the Challenges of Reverse Engineering Flutter Applications, BlackAlps, Yverdon-les-Bains, Switzerland, November 3, 2023.
- The Mobile Malware Maze, BruCON Keynote, Mechelen, Belgium, September 2023.
- Hacking for Ideas, THCon Keynote, Toulouse, April 2023. at 1:06:56.
- Hacking a jump rope and/or a Coffee Machine:
2022
- Hunting the Android/BianLian botnet, Virus Bulletin, Prague, September 2022.
- Unpacking de malware Android:
2021
- Touche pas à mon dossier médical, SecSea, La Ciotat, France, October 15, 2021 fr
- Reverse Android malware like a Jedi Master, Virus Bulletin Conference (online), October 7-8, 2021. ,
- Live reverse engineering of Android Malware:
- Android/Oji at BSides Oslo - June 2021 -
- Android/Oji at THCon - June 2021 at 01:33:00
- Android/BrazKing at Mundo Hacker, online - April 2021
- Android/BrazKing at AMUSEC - April 2021
2020
Building and maintaining a honeypot for medical devices, BotConf (online), December 2020.
Malware and Cybercrime in Medical IoT, CCCC, September 14, 2020.
A. Apvrille, T. Goodspeed: on glucose sensor:
- Security analysis of a Connected Glucose Sensor for Diabetes, Technical report, June 2020
- Pique curiosity, not diabetic fingers, Pass The Salt, July 2020 (virtual edition),
- Capteur de glycémie connecté : les interdits, Barbhack, August 2020 fr,
- Hacking de capteur de glycémie connecté, UYBHYS, November 2020 (online) - starts at 54'45
T. Goodspeed, A. Apvrille, NFC exploitation with the RF430RFL152 and ‘TAL152, PoC || GTFO, volume, 20:03.
Medical malware on Android (all talks are on the same topic, but with different samples analyzed)
Hacking a Smart Coffee Machine:
A. Apvrille, T. Goodspeed, A. Lakhani, Malware, Cybercrime and Vulnerabilities for Diabetic Patients. Talk was accepted at Troopers 2020, but cancelled due to COVID.
A. Lakhani, A. Apvrille, Bringing Down the Empire: The Internet of Medical Things, RSA, San Francisco, USA, February 2020,
2019
- A. Apvrille, T. Goodspeed, The inner guts of a connected glucose sensor for diabetes, BlackAlps, Yverdon-les-Bains, Switzerland, November 2019.
- Smartphone apps: let’s talk about privacy, Hack. Lu, Luxembourg, October 2019.
- A. Apvrille, A. Lakhani, Medical IoT for diabetes and cybercrime, Virus Bulletin, London, UK, October 2019.
- Abusing cryptocurrencies on Android smartphone:
2018
- Cryptocurrency mobile malware, BlackAlps, Yverdon-les-Bains, Switzerland, November 2018
- Junior CTF, Lightning Talk at Hack.Lu, Luxembourg, October,
- Does Malware Based on Spectre Exist?, Virus Bulletin, July 2018
- Are there Spectre-based malware on your Android smartphone?, Pass The Salt, Lille, France, July 2018,
- A. Apvrille, P. Paget, Ph0wn smart devices CTF: Behind the Scenes, Insomni’hack, Geneva, Switzerland, March 2018,
- Is my toothbrush really smart?, Troopers, Heidelberg, Germany, March 2018,
2017
- Android Reverse Engineering Tools: not the usual suspects, Virus Bulletin Conference, Madrid, Spain, October 2017
- Ingénierie inverse d’une brosse à dents connectée, Symposium sur la sécurité des technologies de l’information et des communications (SSTIC), Rennes, 7-9 juin 2017 fr
2016
- Infecting Internet of Things, DefCamp, Bucharest, Romania, November 2016
- Mobile Applications: a Backdoor into Internet of Things?, Virus Bulletin Conference, Denver, USA, October 2016
- Reversing Internet of Things from mobile applications:
2015
- Geek usages for your Fitbit Flex tracker Hack.lu, Luxemburg, October 2015
- Criminal Profiling: Android Malware, Nuit du Hack, Paris, June 20, 2015,
- Fitness Tracker: Hack in Progress:
- L. Apvrille, A. Apvrille, Identifying Unknown Android Malware with Feature Extractions and Classification Techniques, IEEE TrustCom, Helsinki, Finland, 20-22 August 2015 see here
- Pawn Storm: What’s Up on iOS devices?, Insomni’hack, Geneva, March 2015,
- A. Apvrille, L .Apvrille, SherlockDroid: a Research Assistant to Spot Unknown Malware in Android Marketplaces, Journal in Computer Virology and Hacking Techniques, vol. 11, no. 39, pages 1-11, 2015. DOI
2014
- A. Apvrille, L. Apvrille, SherlockDroid: an Inspector for Android Marketplaces, Hack.Lu, Luxembourg, October 21-24 2014,
- A. Apvrille, A. Albertini, Hide Android Applications in Images, BlackHat Europe, Amsterdam, NL, October 2014, 16-17
- Inside the iOS/AdThief malware, Virus Bulletin, August 2014, ,
- A. Apvrille, R. Nigam, Obfuscation in Android malware and how to fight back,
- 8th International CARO Workshop, May 15-16, Florida, USA.
- Virus Bulletin, July 2014
- Playing Hide and Seek with Dalvik Executables, Insomni’Hack, March 2014
2013
- L. Apvrille, A. Apvrille, Pre-filtering Mobile Malware with Heuristic Techniques, GreHack, Grenoble, France, November 2013
- Playing Hide and Seek with Dalvik Executables:
- K. de Pontevès, A. Apvrille, Analysis of Android In-App Advertisement Kits, Virus Bulletin Conference, pp. 133-138, Berlin, Germany, October 2013.
2012
- Guns and Smoke to Defeat Mobile Malware, Hashdays, Lucerne, Switzerland, November 2-3 2012.
- A. Apvrille, G. Lovet, An Attacker’s Day into Virology: Human vs Computer, BlackHat Europe, Amsterdam, The Netherlands, March 14-16 2012,
- Android Reverse Engineering Tools, Insomni’Hack 2012, Geneva, Switzerland, March 2, 2012
- A. Apvrille, T. Strazzere, Reducing the Window of Opportunity for Android Malware:
- in Proceedings of the 21st EICAR Annual Conference, pp. 131-149, Lisbon, Portugal, May 7-8, 2012
- in Journal in Computer Virology 2021, , DOI: 10.1007/s11416-012-0162-3
- Symbian worm Yxes: towards mobile botnets?, Journal in Computer Virology, 2012, , DOI: 10.1007/s11416-012-0163-2
2011
- Cryptography for Mobile Malware Obfuscation, RSA Europe, London, UK, October 2011.
- An OpenBTS GSM Replication Jail for Mobile Malware, Virus Bulletin Conference, pp. 86-94, Barcelona, Spain, October 2011. . Copyright is held by Virus Bulletin Ltd but made available on this site for personal use free of charge by permission of Virus Bulletin.
- Mobile Malware in Practice, Insomni’Hack, Geneva, Switzerland, March 4, 2011,
- A. Apvrille, K. Yang, Defeating mTANs for profit:
- ShmooCon 2011, Washington DC, USA, January 28-30 2011,
- Virus Bulletin, pp. 6-10, March 2011 and part two
- OpenBTS for dummies v0.5, April 2011,
2010
- Symbian Worm Yxes: Towards Mobile Botnets?, in Proceedings of the 19th EICAR Annual Conference, pp. 31-54, Paris, France, May 8-11, 2010 (Best Paper Award)
- A. Apvrille, J. Zhang, Four Malware and a Funeral, in Proceedings of 5th Conf. on Network Architectures and Information Systems Security SAR-SSI, Menton, France, May 18-21, 2010.
- The Four Horsemen, CONFidence Krakow, Poland, May 24-26, 2010
2006
- L. Apvrille, P. de Saqui-Sannes, R. Pacalet et A. Apvrille, Un environnement de conception de systèmes distribués basé sur UML, Annals of Telecommunications, Vol. 61, n 11/12, pp. 1347-1368, Nov. 2006 abstract
2005
- L. Apvrille, P. de Saqui-Sannes, A. Apvrille, Une méthodologie de conception des systèmes distribués basée sur UML, Actes de la 5ème conférence sur les nouvelles technologies de la répartition NOTERE'05, p 217-214, Gatineau, QC, Canada, 29 août - 1er septembre 2005.
- A. Apvrille, M. Pourzandi, Secure Software Development by Example, IEEE Security & Privacy, vol. 3, no. 4, July/August, 2005, pp. 10-17.
- A. Apvrille, D. Gordon, DigSig novelties, Libre Software Meeting, Security Topic, July 4-9 2005
2004
- A. Apvrille, M. Pourzandi, XML Distributed Security Policy for Clusters, Computers & Security Journal (COSE91), Elsevier, vol. 23, no. 8, pp 649-658, December 2004 - abstract
- A. Apvrille, M. Pourzandi, Trusted Computing in Linux: status, Linux World magazine, Vol. 2, No. 12, December 2004
- A. Apvrille, D. Gordon, S. Hallyn, M. Pourzandi, V. Roy, DigSig: Runtime Authentication of Binaries at the Kernel Level, in the Proceedings of the 18th Large Installation System Administration Conference LISA, pp. 59-66, Atlanta, November 14-19 2004
- M. Pourzandi, A. Apvrille, Setting up Virtual Security Zones in a Linux Cluster, Linux Journal, Issue 126, October 2004 html
- A. Apvrille, M. Pourzandi, D. Gordon, V. Roy, Stop Malicious Code Execution at Kernel-Level, Linux World magazine, Vol. 2, No. 1, January 2004.
2003
- M. Pourzandi, A. Apvrille, E. Gingras, A. Medenou, D. Gordon, Distributed Access Control for Carrier Class Clusters, Parallel and Distributed Processing Techniques and Applications PDPTA'03 conference, Las Vegas, June 2003.
2002
- A. Apvrille, J. Hughes, V. Girier,Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System, First International IEEE Security in Storage Workshop (SISW'2002), Greenbelt, Maryland, USA, December 2002,
- A. Apvrille, V. Girier, XML Security Time Stamping Protocol, Information Security Solutions Europe conference (ISSE'02), Paris, October 2002,
- A. Apvrille, J. Hughes, A Time Stamped Virtual WORM System, SEcurité de la Communication ur Internet workshop (SECI'02), Tunis, Tunisia, September 2002,
- Programmation sécurisée sous Java : retour d’expérience, OSSIR RESIST, September 2002,
- L’horodatage sécurisé : état de l’art et applications, OSSIR RESIST, June 2002.
Diamond Editions fr
MISC Magazine
- Android/FluHorse, le malware qui défie les désassembleurs, MISC no. 136, Novembre/Décembre 2024,
- 20 ans de virus sur téléphone mobile, MISC no. 132, Mars/Avril 2024,
- Utilisation malveillante de l’API d’accessibilité sur Android, MISC no. 122, Juillet 2022,
- Rançon sur téléphone mobile : les entrailles d’Android/Koler, MISC, no. 107, January-February 2020
- Analyse de la sécurité d’un capteur de glucose, MISC, no. 106, November-December 2019
- Rétro-ingénierie d’applications Android avec Androguard, MISC, no. 92, July 2017,
- Les objets connectés peuvent-ils être infectés?, MISC, Hors Série no. 15 : Sécurité des objects connectés.
- Analyse de la sécurité d’un bracelet sportif, MISC no. 87, p. 76, Septembre-Octobre 2016
- L. Apvrille, A. Apvrille, P. Bogossian, Retour d’expérience sur quelques épreuves de Hack.lu 2013, MISC, no. 73, p. 50-86, May-June 2014.
- Détenu virus mobile : nous avons les moyens de vous faire parler ! MISC, Hors série, no. 5, p. 80, April - May 2012
- Le virus Symbian RommWar à la loupe, MISC, no. 46, p. 42-49, November-December 2009.
- La sécurité des Wikis, MISC, no. 44, p. 76-82, July-August 2009
- Conception et architecture de la bibliothèque cryptographique d’OpenSSL, MISC, no. 32, p. 52-60, July-August 2007
- Protéger les messages applicatifs avec XML Security ou PKCS, MISC no 25, May-June 2006.
- Des erreurs dans mon code sécurisé, où ça ?!, MISC, no. 16-17, November 2004 - January 2005
- L’ASN.1 par l’exemple dans les certificats X.509, MISC, no. 15, September - October 2004
- A. Apvrille, M. Pourzandi, Protéger un réseau de machines distribuées contre un débordement de buffer… d’un seul coup, MISC, no. 7, May-June 2003
Hackable Magazine
- Piloter sa cafetière connectée, Hackable no. 33, April-June 2020
- Fabriquez votre T-shirt interactif avec un Lilypad Arduino Hackable, no. 21, p. 96, November-December 2017
- A. Apvrille, L. Apvrille, Ventilation controlée par des framboises, Hackable, no. 11, p. 32, March-April 2016.
- A. Apvrille, L. Apvrille, Contrôler sa chaudière à distance avec un Raspberry Pi, Hackable, no.8, p.60, September-October 2015