Search Results - "Courousse, Damien"
-
1
A Tale of Resilience: On the Practical Security of Masked Software Implementations
Published in IEEE access (01-01-2023)“…Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven…”
Get full text
Journal Article -
2
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-12-2023)“…Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. have reported that fault injection attacks can leverage…”
Get full text
Journal Article -
3
SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks
Published in 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) (14-03-2022)“…Fault injection attacks have become a serious threat against embedded systems. Recently, Laurent et al. have reported that some faults inside the…”
Get full text
Conference Proceeding -
4
Maskara: Compilation of a Masking Countermeasure With Optimized Polynomial Interpolation
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-11-2020)“…Side-channel attacks are amongst the major threats for embedded systems and IoT devices. Masking is one of the most used countermeasure against such attacks,…”
Get full text
Journal Article -
5
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Published in IACR transactions on cryptographic hardware and embedded systems (05-09-2024)“…Fault injection attacks are a serious threat to system security, enabling attackers to bypass protection mechanisms or access sensitive information. To…”
Get full text
Journal Article -
6
Ergotic Sounds: A New Way to Improve Playability, Believability and Presence of Virtual Musical Instruments
Published in Journal of new music research (01-09-2009)“…We explore how an 'ergotic gesture-sound situation' is a genuine way to improve the playability, believability and presence of virtual musical instruments. An…”
Get full text
Journal Article -
7
Exploration of Fault Effects on Formal RISC-V Microarchitecture Models
Published in 2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) (01-09-2022)“…This paper introduces a formal workflow for modeling software/hardware systems in order to explore the effects of fault injections and evaluate the robustness…”
Get full text
Conference Proceeding -
8
Idols with Feet of Clay: On the Security of Bootloaders and Firmware Updaters for the IoT
Published in 2019 17th IEEE International New Circuits and Systems Conference (NEWCAS) (01-06-2019)“…IoT devices are generally implemented with low-cost embedded solutions, and connectivity and communication capabilities are the raison d'être of such devices…”
Get full text
Conference Proceeding -
9
μARCHIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections
Published in 2023 Formal Methods in Computer-Aided Design (FMCAD) (24-10-2023)“…This paper introduces μARCHiFI, an open-source tool dedicated to the formal modeling and verification of microarchitecture-level fault injections and their…”
Get full text
Conference Proceeding -
10
Pushing the Limits of Online Auto-Tuning: Machine Code Optimization in Short-Running Kernels
Published in 2016 IEEE 10th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSOC) (01-09-2016)“…This paper proposes an online auto-tuning approach for computing kernels. Differently from existing online auto-tuners, which regenerate code with long…”
Get full text
Conference Proceeding -
11
Micro-architectural simulation of in-order and out-of-order ARM microprocessors with gem5
Published in 2014 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS XIV) (01-07-2014)“…Heterogeneous multicore systems have gained momentum, specially for embedded applications, thanks to the performance and energy consumption trade-offs provided…”
Get full text
Conference Proceeding -
12
Software acceleration of floating-point multiplication using runtime code generation - Student paper
Published in 2013 4th Annual International Conference on Energy Aware Computing Systems and Applications (ICEAC) (01-12-2013)“…Floating-point units are seldom in highly constrained systems, due to silicon and energy footprint, but emulated instead in algorithms based on integer…”
Get full text
Conference Proceeding -
13
Code Polymorphism Meets Code Encryption: Confidentiality and Side-Channel Protection of Software Components
Published 11-10-2023“…Digital Threats: Research and Practice, 2021 In this paper, we consider that, in practice, attack scenarios involving side-channel analysis combine two…”
Get full text
Journal Article -
14
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks
Published 05-09-2023“…IEEE TCAD (2023) Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. have reported that fault injection attacks…”
Get full text
Journal Article -
15
COGITO: Code polymorphism to secure devices
Published in 2014 11th International Conference on Security and Cryptography (SECRYPT) (01-08-2014)“…In this paper, we advocate the use of code polymorphism as an efficient means to improve security at several levels in electronic devices. We analyse the…”
Get full text
Conference Proceeding -
16
Perception of Virtual Multi-Sensory Objects: Some Musings on the Enactive Approach
Published in 2008 International Conference on Cyberworlds (01-09-2008)“…In this paper we explore, by means of three pilot observational studies using virtual objects, how direct perception through action of multi-sensory…”
Get full text
Conference Proceeding -
17
Effects of Stiffness on Tapping Performance
Published in 2006 14th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems (2006)“…Several studies have investigated the robustness of the sound-action perception to auditory delay, and the effects of delay on performance in tapping gesture…”
Get full text
Conference Proceeding -
18
Pushing the Limits of Online Auto-tuning: Machine Code Optimization in Short-Running Kernels
Published 14-07-2017“…We propose an online auto-tuning approach for computing kernels. Differently from existing online auto-tuners, which regenerate code with long compilation…”
Get full text
Journal Article -
19
A basic gesture and motion format for virtual reality multisensory applications
Published 25-05-2010“…The question of encoding movements such as those produced by human gestures may become central in the coming years, given the growing importance of movement…”
Get full text
Journal Article