Search Results - "Heydemann, Karine"
-
1
Editorial about PROOFS 2019
Published in Journal of cryptographic engineering (01-06-2021)Get full text
Journal Article -
2
Correction to: Editorial about PROOFS 2019
Published in Journal of cryptographic engineering (2021)“…A correction to this paper has been published: https://doi.org/10.1007/s13389-021-00266-7…”
Get full text
Journal Article -
3
A Tale of Resilience: On the Practical Security of Masked Software Implementations
Published in IEEE access (01-01-2023)“…Masking constitutes a provably-secure approach against side-channel attacks. However, recombination effects (e.g., transitions) severely reduce the proven…”
Get full text
Journal Article -
4
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults
Published in IACR transactions on cryptographic hardware and embedded systems (05-09-2024)“…Fault injection attacks are a serious threat to system security, enabling attackers to bypass protection mechanisms or access sensitive information. To…”
Get full text
Journal Article -
5
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller
Published in 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography (01-08-2013)“…Injection of transient faults as a way to attack cryptographic implementations has been largely studied in the last decade. Several attacks that use…”
Get full text
Conference Proceeding -
6
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-12-2023)“…Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. have reported that fault injection attacks can leverage…”
Get full text
Journal Article -
7
LeakageVerif: Efficient and Scalable Formal Verification of Leakage in Symbolic Expressions
Published in IEEE transactions on software engineering (01-06-2023)“…Side-channel attacks are a powerful class of attacks targeting cryptographic devices. Masking is a popular protection technique to thwart such attacks as it…”
Get full text
Journal Article -
8
ARMISTICE: Micro-Architectural Leakage Modelling for Masked Software Formal Verification
Published in IEEE transactions on computer-aided design of integrated circuits and systems (2022)“…Side channel attacks are powerful attacks for retrieving secret data by exploiting physical measurements such as power consumption or electromagnetic…”
Get full text
Journal Article -
9
ARMISTICE: Microarchitectural Leakage Modeling for Masked Software Formal Verification
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-11-2022)“…Side-channel attacks are powerful attacks for retrieving secret data by exploiting physical measurements, such as power consumption or electromagnetic…”
Get full text
Journal Article -
10
Formally verified software countermeasures for control-flow integrity of smart card C code
Published in Computers & security (01-08-2019)“…Fault attacks can target smart card programs to disrupt an execution and take control of the data or the embedded functionalities. Among all possible attacks,…”
Get full text
Journal Article -
11
SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks
Published in 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) (14-03-2022)“…Fault injection attacks have become a serious threat against embedded systems. Recently, Laurent et al. have reported that some faults inside the…”
Get full text
Conference Proceeding -
12
Scalable task parallelism for NUMA: A uniform abstraction for coordinated scheduling and memory management
Published in 2016 International Conference on Parallel Architecture and Compilation Techniques (PACT) (01-09-2016)“…Dynamic task-parallel programming models are popular on shared-memory systems, promising enhanced scalability, load balancing and locality. Yet these promises…”
Get full text
Conference Proceeding -
13
Maskara: Compilation of a Masking Countermeasure With Optimized Polynomial Interpolation
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-11-2020)“…Side-channel attacks are amongst the major threats for embedded systems and IoT devices. Masking is one of the most used countermeasure against such attacks,…”
Get full text
Journal Article -
14
Formal verification of a software countermeasure against instruction skip attacks
Published in Journal of cryptographic engineering (01-09-2014)“…Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model…”
Get full text
Journal Article -
15
Side-channel robustness analysis of masked assembly codes using a symbolic approach
Published in Journal of cryptographic engineering (01-09-2019)“…Masking is a popular countermeasure against side-channel attacks, which randomizes secret data with random and uniform variables called masks. At software…”
Get full text
Journal Article -
16
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks
Published 05-09-2023“…IEEE TCAD (2023) Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. have reported that fault injection attacks…”
Get full text
Journal Article -
17
μARCHIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections
Published in 2023 Formal Methods in Computer-Aided Design (FMCAD) (24-10-2023)“…This paper introduces μARCHiFI, an open-source tool dedicated to the formal modeling and verification of microarchitecture-level fault injections and their…”
Get full text
Conference Proceeding -
18
Exploration of Fault Effects on Formal RISC-V Microarchitecture Models
Published in 2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) (01-09-2022)“…This paper introduces a formal workflow for modeling software/hardware systems in order to explore the effects of fault injections and evaluate the robustness…”
Get full text
Conference Proceeding -
19
Secure Optimization Through Opaque Observations
Published 15-01-2021“…Secure applications implement software protections against side-channel and physical attacks. Such protections are meaningful at machine code or…”
Get full text
Journal Article -
20
Studying EM Pulse Effects on Superscalar Microarchitectures at ISA Level
Published 06-03-2019“…In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of attention as simpler micro-controllers. We try to model the…”
Get full text
Journal Article