Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Damien Couroussé"'
Autor:
Simon Tollec, Vedad Hadži´c, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Fault injection attacks are a serious threat to system security, enabling attackers to bypass protection mechanisms or access sensitive information. To evaluate the robustness of CPU-based systems against these attacks, it is essential to analyze the
Externí odkaz:
https://doaj.org/article/4f530bf376ec46b3bb26d08fdd69f770
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023, ⟨10.1109/TCAD.2023.3276507⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023, ⟨10.1109/TCAD.2023.3276507⟩
International audience; Fault injection attacks represent an effective threatto embedded systems. Recently, Laurent et al. have reported thatfault injection attacks can leverage faults inside the microarchi-tecture. However, state-of-the-art counter-
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a495c761d3f1811b055907758af528c
https://cea.hal.science/cea-04099414/document
https://cea.hal.science/cea-04099414/document
Autor:
Damien Couroussé, Karine Heydemann, Inès Ben El Ouahma, Quentin L. Meunier, Nicolas Belleville
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2020, 39 (11), pp.1-1. ⟨10.1109/TCAD.2020.3012237⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, 39 (11), pp.1-1. ⟨10.1109/TCAD.2020.3012237⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, IEEE, 2020, 39 (11), pp.1-1. ⟨10.1109/TCAD.2020.3012237⟩
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020, 39 (11), pp.1-1. ⟨10.1109/TCAD.2020.3012237⟩
International audience; Side-channel attacks are amongst the major threats for embedded systems and IoT devices. Masking is one of the most used countermeasure against such attacks, but its application remains a difficult process. We propose a target
Publikováno v:
HAL
Automation in Cybersecurity 2021-Proceedings of the 28th Computer & Electronics Security Application Rendezvous (C&ESAR 2021)
C&ESAR 2021 : 28th Computer Electronics Security Application Rendezvous
C&ESAR 2021 : 28th Computer Electronics Security Application Rendezvous, Nov 2021, Rennes, France. pp.13-25
Automation in Cybersecurity 2021-Proceedings of the 28th Computer & Electronics Security Application Rendezvous (C&ESAR 2021)
C&ESAR 2021 : 28th Computer Electronics Security Application Rendezvous
C&ESAR 2021 : 28th Computer Electronics Security Application Rendezvous, Nov 2021, Rennes, France. pp.13-25
The application and the verification of countermeasures against physical attacks still remainlong, error-prone and expertise-demanding tasks. We propose a toolchain to help the expertin these tasks. Our toolchain is composed of two components: a comp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ccf891c07f62fc8eabc7aad564eb1602
https://hal-cea.archives-ouvertes.fr/cea-03605070
https://hal-cea.archives-ouvertes.fr/cea-03605070
Publikováno v:
Digital Threats: Research and Practice
Digital Threats: Research and Practice, 2021, https://dl.acm.org/doi/10.1145/3487058. ⟨10.1145/3487058⟩
Digital Threats: Research and Practice, 2021, https://dl.acm.org/doi/10.1145/3487058. ⟨10.1145/3487058⟩
International audience; In this paper, we consider that, in practice, attack scenarios involving side-channel analysis combine two successive phases:an analysis phase, targeting the extraction of information about the target and the identification of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19bcdb439b13c8992e56939ff6d14589
https://cea.hal.science/cea-03605072/document
https://cea.hal.science/cea-03605072/document
Autor:
Nicolas Belleville, Eleonora Cagli, Loïc Masure, Cécile Dumas, Marie-Angela Cornelie, L. Maingault, Damien Couroussé
Publikováno v:
Computer Security – ESORICS 2020 ISBN: 9783030589509
ESORICS (1)
Computer Security – ESORICS 2020
ESORICS 2020: Computer Security
ESORICS 2020: Computer Security, Sep 2020, Guildford, United Kingdom. pp.440-460, ⟨10.1007/978-3-030-58951-6_22⟩
ESORICS (1)
Computer Security – ESORICS 2020
ESORICS 2020: Computer Security
ESORICS 2020: Computer Security, Sep 2020, Guildford, United Kingdom. pp.440-460, ⟨10.1007/978-3-030-58951-6_22⟩
ESORICS 2020 - European Symposium on Research in Computer Security; International audience; $Code\ polymorphism$ is a way to efficiently address the challenge of automatically applying the hiding of sensitive information leakage, as a way to protect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ed3908bb4bc5f30e7593adfeb90b69d7
https://doi.org/10.1007/978-3-030-58951-6_22
https://doi.org/10.1007/978-3-030-58951-6_22
Autor:
Lionel Morel, Damien Couroussé
Publikováno v:
NEWCAS
IoT devices are generally implemented with low-cost embedded solutions, and connectivity and communication capabilities are the raison d’etre of such devices. But this is a double-edged sword, since connectivity also implies (1) to open the door to
Autor:
Abderrahmane Seriai, Damien Couroussé, Thierno Barry, Karine Heydemann, Nicolas Belleville, Bruno Robisson, Henri-Pierre Charles
Publikováno v:
Cyber-Physical Systems Security
Çetin Kaya Koç. Cyber-Physical Systems Security, Springer International Publishing, pp.135-155, 2018, 978-3-319-98934-1. ⟨10.1007/978-3-319-98935-8_7⟩
Cyber-Physical Systems Security ISBN: 9783319989341
Çetin Kaya Koç. Cyber-Physical Systems Security, Springer International Publishing, pp.135-155, 2018, 978-3-319-98934-1. ⟨10.1007/978-3-319-98935-8_7⟩
Cyber-Physical Systems Security ISBN: 9783319989341
International audience; While the number of embedded systems is continuously increasing, securing software against physical attacks is costly and error-prone. Several works proposed solutions that automatically insert protections against these attack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a4a509a27c888d40b8c98091b6ab5fd3
https://hal.sorbonne-universite.fr/hal-01951305/file/CPSEd.pdf
https://hal.sorbonne-universite.fr/hal-01951305/file/CPSEd.pdf
Autor:
Damien Couroussé, Nicolas Belleville, Jean-Louis Lanet, Philippe Jaillon, Thierno Barry, Olivier Potin, Bruno Robisson, Hélène Le Bouder, Karine Heydemann
Publikováno v:
Fifth Workshop on Cryptography and Security in Computing Systems
Fifth Workshop on Cryptography and Security in Computing Systems, Jan 2018, Manchester, United Kingdom. pp.17-18, ⟨10.1145/3178291.3178296⟩
CS2@HiPEAC
Fifth Workshop on Cryptography and Security in Computing Systems, Jan 2018, Manchester, United Kingdom. pp.17-18, ⟨10.1145/3178291.3178296⟩
CS2@HiPEAC
International audience; In the landscape of cybersecurity, a large field of research is dedicated to physical attacks since the publication of the first attacks in the early 1990s. Side-channel attacks can reveal the secret values processed in a circ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::89f20488ad9b6d04653106e9e3c6dea0
https://hal-emse.ccsd.cnrs.fr/emse-02011053
https://hal-emse.ccsd.cnrs.fr/emse-02011053
Publikováno v:
European LLVM Developers Meeting
European LLVM Developers Meeting, Mar 2017, Saarbrücken, Germany
HAL
European LLVM Developers Meeting, Mar 2017, Saarbrücken, Germany
HAL
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ff8425c666ea83ade24bfadd8db693d4
https://hal.sorbonne-universite.fr/hal-01660160
https://hal.sorbonne-universite.fr/hal-01660160