Search Results - "Heydemann, Karine"

Refine Results
  1. 1
  2. 2

    Correction to: Editorial about PROOFS 2019 by Heydemann, Karine, Li, Letitia

    “…A correction to this paper has been published: https://doi.org/10.1007/s13389-021-00266-7…”
    Get full text
    Journal Article
  3. 3

    A Tale of Resilience: On the Practical Security of Masked Software Implementations by Casalino, Lorenzo, Belleville, Nicolas, Courousse, Damien, Heydemann, Karine

    Published in IEEE access (01-01-2023)
    “…Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven…”
    Get full text
    Journal Article
  4. 4

    Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults by Tollec, Simon, Hadži´c, Vedad, Nasahl, Pascal, Asavoae, Mihail, Bloem, Roderick, Couroussé, Damien, Heydemann, Karine, Jan, Mathieu, Mangard, Stefan

    “…Fault injection attacks are a serious threat to system security, enabling attackers to bypass protection mechanisms or access sensitive information. To…”
    Get full text
    Journal Article
  5. 5

    Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller by Moro, Nicolas, Dehbaoui, Amine, Heydemann, Karine, Robisson, Bruno, Encrenaz, Emmanuelle

    “…Injection of transient faults as a way to attack cryptographic implementations has been largely studied in the last decade. Several attacks that use…”
    Get full text
    Conference Proceeding
  6. 6

    MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks by Chamelot, Thomas, Courousse, Damien, Heydemann, Karine

    “…Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. have reported that fault injection attacks can leverage…”
    Get full text
    Journal Article
  7. 7

    LeakageVerif: Efficient and Scalable Formal Verification of Leakage in Symbolic Expressions by Meunier, Quentin L., Pons, Etienne, Heydemann, Karine

    Published in IEEE transactions on software engineering (01-06-2023)
    “…Side-channel attacks are a powerful class of attacks targeting cryptographic devices. Masking is a popular protection technique to thwart such attacks as it…”
    Get full text
    Journal Article
  8. 8

    ARMISTICE: Micro-Architectural Leakage Modelling for Masked Software Formal Verification by de Grandmaison, Arnaud, Heydemann, Karine, Meunier, Quentin L.

    “…Side channel attacks are powerful attacks for retrieving secret data by exploiting physical measurements such as power consumption or electromagnetic…”
    Get full text
    Journal Article
  9. 9

    ARMISTICE: Microarchitectural Leakage Modeling for Masked Software Formal Verification by Grandmaison, Arnaud de, Heydemann, Karine, Meunier, Quentin L.

    “…Side-channel attacks are powerful attacks for retrieving secret data by exploiting physical measurements, such as power consumption or electromagnetic…”
    Get full text
    Journal Article
  10. 10

    Formally verified software countermeasures for control-flow integrity of smart card C code by Heydemann, Karine, Lalande, Jean-François, Berthomé, Pascal

    Published in Computers & security (01-08-2019)
    “…Fault attacks can target smart card programs to disrupt an execution and take control of the data or the embedded functionalities. Among all possible attacks,…”
    Get full text
    Journal Article
  11. 11

    SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks by Chamelot, Thomas, Courousse, Damien, Heydemann, Karine

    “…Fault injection attacks have become a serious threat against embedded systems. Recently, Laurent et al. have reported that some faults inside the…”
    Get full text
    Conference Proceeding
  12. 12

    Scalable task parallelism for NUMA: A uniform abstraction for coordinated scheduling and memory management by Drebes, Andi, Pop, Antoniu, Heydemann, Karine, Cohen, Albert, Drach, Nathalie

    “…Dynamic task-parallel programming models are popular on shared-memory systems, promising enhanced scalability, load balancing and locality. Yet these promises…”
    Get full text
    Conference Proceeding
  13. 13

    Maskara: Compilation of a Masking Countermeasure With Optimized Polynomial Interpolation by Belleville, Nicolas, Courousse, Damien, Heydemann, Karine, Meunier, Quentin, El Ouahma, Ines Ben

    “…Side-channel attacks are amongst the major threats for embedded systems and IoT devices. Masking is one of the most used countermeasure against such attacks,…”
    Get full text
    Journal Article
  14. 14

    Formal verification of a software countermeasure against instruction skip attacks by Moro, N., Heydemann, K., Encrenaz, E., Robisson, B.

    Published in Journal of cryptographic engineering (01-09-2014)
    “…Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model…”
    Get full text
    Journal Article
  15. 15

    Side-channel robustness analysis of masked assembly codes using a symbolic approach by Ben El Ouahma, Inès, Meunier, Quentin L., Heydemann, Karine, Encrenaz, Emmanuelle

    Published in Journal of cryptographic engineering (01-09-2019)
    “…Masking is a popular countermeasure against side-channel attacks, which randomizes secret data with random and uniform variables called masks. At software…”
    Get full text
    Journal Article
  16. 16

    MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks by Chamelot, Thomas, Couroussé, Damien, Heydemann, Karine

    Published 05-09-2023
    “…IEEE TCAD (2023) Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. have reported that fault injection attacks…”
    Get full text
    Journal Article
  17. 17

    μARCHIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections by Tollec, Simon, Asavoae, Mihail, Courousse, Damien, Heydemann, Karine, Jan, Mathieu

    “…This paper introduces μARCHiFI, an open-source tool dedicated to the formal modeling and verification of microarchitecture-level fault injections and their…”
    Get full text
    Conference Proceeding
  18. 18

    Exploration of Fault Effects on Formal RISC-V Microarchitecture Models by Tollec, Simon, Asavoae, Mihail, Courousse, Damien, Heydemann, Karine, Jan, Mathieu

    “…This paper introduces a formal workflow for modeling software/hardware systems in order to explore the effects of fault injections and evaluate the robustness…”
    Get full text
    Conference Proceeding
  19. 19

    Secure Optimization Through Opaque Observations by Vu, Son Tuan, Cohen, Albert, Heydemann, Karine, de Grandmaison, Arnaud, Guillon, Christophe

    Published 15-01-2021
    “…Secure applications implement software protections against side-channel and physical attacks. Such protections are meaningful at machine code or…”
    Get full text
    Journal Article
  20. 20

    Studying EM Pulse Effects on Superscalar Microarchitectures at ISA Level by Proy, Julien, Heydemann, Karine, Majéric, Fabien, Cohen, Albert, Berzati, Alexandre

    Published 06-03-2019
    “…In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of attention as simpler micro-controllers. We try to model the…”
    Get full text
    Journal Article