Skip to main content

Showing 1–7 of 7 results for author: Jaloyan, G

  1. A forensic analysis of the Google Home: repairing compressed data without error correction

    Authors: Hadrien Barral, Georges-Axel Jaloyan, Fabien Thomas-Brans, Matthieu Regnery, Rémi Géraud-Stewart, Thibaut Heckmann, Thomas Souvignet, David Naccache

    Abstract: This paper provides a detailed explanation of the steps taken to extract and repair a Google Home's internal data. Starting with reverse engineering the hardware of a commercial off-the-shelf Google Home, internal data is then extracted by desoldering and dumping the flash memory. As error correction is performed by the CPU using an undisclosed method, a new alternative method is shown to repair a… ▽ More

    Submitted 29 September, 2022; originally announced October 2022.

    Comments: 28 pages, modified version of paper that appeared originally at Forensic Science International: Digital Investigation

    Journal ref: Forensic Science International: Digital Investigation, Volume 42, 2022, 301437, ISSN 2666-2817

  2. Return-Oriented Programming on RISC-V

    Authors: Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache

    Abstract: This paper provides the first analysis on the feasibility of Return-Oriented Programming (ROP) on RISC-V, a new instruction set architecture targeting embedded systems. We show the existence of a new class of gadgets, using several Linear Code Sequences And Jumps (LCSAJ), undetected by current Galileo-based ROP gadget searching tools. We argue that this class of gadgets is rich enough on RISC-V to… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

    Comments: 27 pages, 8 figures, originally published at AsiaCCS 2020

  3. arXiv:2102.08804  [pdf, other

    cs.CR

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Authors: Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan

    Abstract: This paper presents LIRA-V, a lightweight system for performing remote attestation between constrained devices using the RISC-V architecture. We propose using read-only memory and the RISC-V Physical Memory Protection (PMP) primitive to build a trust anchor for remote attestation and secure channel creation. Moreover, we show how LIRA-V can be used for trusted communication between two devices usi… ▽ More

    Submitted 22 March, 2022; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: Published in the proceedings of the IEEE Security and Privacy Workshops, 2021

  4. arXiv:1908.03819  [pdf, other

    cs.CR

    RISC-V: #AlphanumericShellcoding

    Authors: Hadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache

    Abstract: We explain how to design RISC-V shellcodes capable of running arbitrary code, whose ASCII binary representation use only letters a-zA-Z, digits 0-9, and either of the three characters: #, /, '.

    Submitted 10 August, 2019; originally announced August 2019.

    Comments: 25 pages, originally published at WOOT'19

  5. arXiv:1805.05576  [pdf, ps, other

    cs.PL

    Borrowing Safe Pointers from Rust in SPARK

    Authors: Georges-Axel Jaloyan, Yannick Moy, Andrei Paskevich

    Abstract: In the field of deductive software verification, programs with pointers present a major challenge due to pointer aliasing. In this paper, we introduce pointers to SPARK, a well-defined subset of the Ada language, intended for formal verification of mission-critical software. Our solution uses a permission-based static alias analysis method inspired by Rust's borrow-checker and affine types, and en… ▽ More

    Submitted 15 May, 2018; originally announced May 2018.

    Comments: 17 pages, 0 figures

  6. arXiv:1710.07047  [pdf, other

    cs.PL

    Safe Pointers in SPARK 2014

    Authors: Georges-Axel Jaloyan

    Abstract: In the context of deductive software verification, programs with pointers present a major challenge due to pointer aliasing. In this paper, we introduce pointers to SPARK, a well-defined subset of the Ada language, intended for formal verification of mission-critical software. Our solution is based on static alias analysis inspired by Rust's borrow-checker and affine types, and enforces the Concur… ▽ More

    Submitted 19 October, 2017; originally announced October 2017.

  7. arXiv:1608.03415  [pdf, other

    cs.CR

    ARMv8 Shellcodes from 'A' to 'Z'

    Authors: Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache

    Abstract: We describe a methodology to automatically turn arbitrary ARMv8 programs into alphanumeric executable polymorphic shellcodes. Shellcodes generated in this way can evade detection and bypass filters, broadening the attack surface of ARM-powered devices such as smartphones.

    Submitted 22 June, 2019; v1 submitted 11 August, 2016; originally announced August 2016.

    Comments: 28 pages, 2 figures, source code in ARMv8, haskell, php, M4