Publications HAL de aktouf;beroulle;chollet;deleuze;fourty;hely;jean;kieffer;parissis du labo/EPI LCIS

Journal articles

2020

ref_biblio
David Hely, Cyril Bresch, Stéphanie Chollet, Roman Lysecky. SecPump: A Connected Open Source Infusion Pump for Security Research Purposes. IEEE Embedded Systems Letters, 2020, pp.1-1. ⟨10.1109/LES.2020.2979595⟩. ⟨hal-02543562⟩
Accès au bibtex
BibTex
ref_biblio
Ehsan Aerabi, Milad Bohlouli, Mohammad Hasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, et al.. Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUs. ACM Transactions on Embedded Computing Systems (TECS), 2020, 19 (3), pp.1-34. ⟨10.1145/3384446⟩. ⟨hal-02953457⟩
Accès au bibtex
BibTex
ref_biblio
Zahra Kazemi, David Hely, Mahdi Fazeli, Vincent Beroulle. A Review on Evaluation and Configuration of Fault Injection Attack Instruments to Design Attack Resistant MCU-Based IoT Applications. Electronics, 2020, 9 (7), pp.1153. ⟨10.3390/electronics9071153⟩. ⟨hal-02953431⟩
Accès au bibtex
BibTex
ref_biblio
Zeshan Ali, Etienne Perret, Nicolas Barbot, Romain Siragusa, David Hely, et al.. Authentication Using Metallic Inkjet-Printed Chipless RFID Tags. IEEE Transactions on Antennas and Propagation, 2020, 68 (5), pp.4137 - 4142. ⟨10.1109/TAP.2019.2948740⟩. ⟨hal-02337466⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02337466/file/Authentication%20Using%20Metallic%20Inkjet-Printed%20Chipless%20RFID%20Tags%20-%20Preprint.pdf BibTex
ref_biblio
Johan Marconot, David Hely, Florian Pebay-Peyroula. Conception and Evaluation of Secure Circuits for Strong Digital PUF. SN Computer Science, 2020, 1 (5), ⟨10.1007/s42979-020-00274-0⟩. ⟨hal-02953425⟩
Accès au bibtex
BibTex
ref_biblio
Bertrand Cambou, David Hely, Sareh Assiri. Cryptography with Analog Scheme Using Memristors. ACM Journal on Emerging Technologies in Computing Systems, 2020, 16 (4), pp.1-30. ⟨10.1145/3412439⟩. ⟨hal-02953417⟩
Accès au bibtex
BibTex
ref_biblio
Cyril Bresch, David Hely, Roman Lysecky, Stéphanie Chollet, Ioannis Parissis. TrustFlow-X. ACM Transactions on Embedded Computing Systems (TECS), 2020, 19 (5), pp.1-26. ⟨10.1145/3398327⟩. ⟨hal-02954381⟩
Accès au bibtex
BibTex

2019

ref_biblio
Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula, Athanasios Papadimitriou. Cross-layer analysis of software fault models and countermeasures against hardware fault attacks in a RISC-V processor. Microprocessors and Microsystems: Embedded Hardware Design , 2019, 71, pp.102862. ⟨10.1016/j.micpro.2019.102862⟩. ⟨hal-02426107⟩
Accès au texte intégral et bibtex
https://hal.univ-grenoble-alpes.fr/hal-02426107/file/S0141933118304745.pdf BibTex
ref_biblio
Abderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hely, Stéphane Di Vito. An In-depth Study of MPU-based Isolation Techniques. Journal of Hardware and Systems Security, 2019, 3, pp.365-381. ⟨10.1007/s41635-019-00078-6⟩. ⟨hal-02335716⟩
Accès au bibtex
BibTex
ref_biblio
Rahma Benfraj, Vincent Beroulle, Nicolas Fourty, Aref Meddeb. An Optimized NS2 Module for UHF Passive RFID Systems. Journal of Electronic Testing: : Theory and Applications, 2019, 35 (1), pp.45-58. ⟨10.1007/s10836-018-5769-y⟩. ⟨hal-02426108⟩
Accès au bibtex
BibTex
ref_biblio
Zeshan Ali, Etienne Perret, Nicolas Barbot, Romain Siragusa, David Hely, et al.. Detection of Natural Randomness by Chipless RFID Approach and Its Application to Authentication. IEEE Transactions on Microwave Theory and Techniques, 2019, pp.1-15. ⟨10.1109/TMTT.2019.2914102⟩. ⟨hal-02132612⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02132612/file/Detection%20of%20Natural%20Randomness%20by%20Chipless%20RFID%20Approach%20and%20its%20Application%20to%20Authentication%20-%20Preprint.pdf BibTex
ref_biblio
Mosabbah Mushir Ahmed, David Hely, Etienne Perret, Nicolas Barbot, Romain Siragusa, et al.. Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions. Journal of Hardware and Systems Security, 2019, 3 (3), pp.273-288. ⟨10.1007/s41635-019-00072-y⟩. ⟨hal-02296583⟩
Accès au bibtex
BibTex
ref_biblio
J.-M. Dutertre, Vincent Beroulle, Philippe Candelier, Stephan de Castro, Louis-Barthelemy Faber, et al.. Sensitivity to Laser Fault Injection: CMOS FD-SOI vs. CMOS bulk. IEEE Transactions on Device and Materials Reliability, 2019, 19 (1), pp.6-15. ⟨10.1109/TDMR.2018.2886463⟩. ⟨hal-01971932⟩
Accès au bibtex
BibTex

2018

ref_biblio
Cyril Bresch, David Hely, Athanasios Papadimitriou, Adrien Michelet-Gignoux, Laurent Amato, et al.. Stack Redundancy to Thwart Return Oriented Programming in Embedded Systems. IEEE Embedded Systems Letters, 2018, pp.1 - 1. ⟨10.1109/LES.2018.2819983⟩. ⟨hal-01829397⟩
Accès au bibtex
BibTex
ref_biblio
David Hely, M. Nourian, M. Fazeli, D. Hély. Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing. Journal of Electronic Testing: : Theory and Applications, 2018, 34 (4), pp.461 - 470. ⟨10.1007/s10836-018-5739-4⟩. ⟨hal-01877451⟩
Accès au bibtex
BibTex
ref_biblio
Arash Nejat, David Hely, Vincent Beroulle. ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods. Journal Hardware and Systems Security, 2018, 2, pp.83-96. ⟨10.1007/s41635-018-0033-6⟩. ⟨hal-01724155⟩
Accès au bibtex
BibTex
ref_biblio
Tran Thanh Kha, Hamed Yahoui, Denis Genon-Catalot, Nicolas Siauve, Fourty Nicolas, et al.. Concept of Power Line Communication solution for Mesh DC Micro grid based on CAN protocol. International Journal of Engineering & Technology, 2018, 7 (2.6), pp.171. ⟨10.14419/ijet.v7i2.6.10562⟩. ⟨hal-02478828⟩
Accès au bibtex
BibTex
ref_biblio
Yassine Naija, Vincent Beroulle, Mohsen Machhout. Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag. Journal of Electronic Testing: : Theory and Applications, 2018, 34 (3), pp.291 - 304. ⟨10.1007/s10836-018-5725-x⟩. ⟨hal-01899794⟩
Accès au bibtex
BibTex
ref_biblio
Zeshan Ali, Nicolas Barbot, Romain Siragusa, Etienne Perret, D. Hély, et al.. Detection of Minimum Geometrical Variation by Free-Space-Based Chipless Approach and its Application to Authentication. IEEE Microwave and Wireless Components Letters, 2018, 28 (4), pp.323 - 325. ⟨10.1109/LMWC.2018.2805858⟩. ⟨hal-01800580⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01800580/file/Detection%20of%20Minimum%20Geometrical%20Variation%20by%20Free%20Space%20Based%20Chipless%20Approach%20and%20its%20Application%20to%20Authentication%20-%20Preprint.pdf BibTex

2017

ref_biblio
Yassine Naija, Vincent Beroulle, Mohsen Machhout. Low Cost Countermeasure at Authentication Protocol Level against Electromagnetic Side Channel Attacks on RFID Tags. International journal of advanced computer science and applications (IJACSA), 2017, 8 (11), ⟨10.14569/IJACSA.2017.081109⟩. ⟨hal-01663566⟩
Accès au bibtex
BibTex
ref_biblio
Brice Colombier, Lilian Bossuet, Viktor Fischer, David Hely. Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. IEEE Transactions on Information Forensics and Security, 2017, 12 (8), pp.1988-2002. ⟨10.1109/TIFS.2017.2689726⟩. ⟨ujm-01575582⟩
Accès au texte intégral et bibtex
https://ujm.hal.science/ujm-01575582/file/2017_TIFS_Colombier.pdf BibTex
ref_biblio
Mosabbah Mushir Ahmed, David Hely, Nicolas Barbot, Romain Siragusa, Etienne Perret, et al.. Radiated Electromagnetic Emission for Integrated Circuit Authentication. IEEE Microwave and Wireless Components Letters, 2017, 27 (11), pp.1028 - 1030. ⟨10.1109/LMWC.2017.2750078⟩. ⟨hal-01724143⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01724143/file/C11%20Radiated%20Electromagnetic%20Emission%20for%20Integrated%20Circuit%20Authentication.pdf BibTex
ref_biblio
Philippe Lalanda, Denis Morand, Stéphanie Chollet. Autonomic Mediation Middleware for Smart Manufacturing. IEEE Internet Computing, 2017. ⟨hal-01898625⟩
Accès au bibtex
BibTex
ref_biblio
Vincent Beroulle, Oum-El-Kheir Aktouf, David Hely. SafeRFID Project: A complete Framework for the Improvement of UHF RFID System Dependability. International Journal On Advances in Networks and Services, 2017, 10 (1&2). ⟨hal-01617627⟩
Accès au bibtex
BibTex

2016

ref_biblio
Backer Jerry, David Hely, Ramesh Karri. Secure and Flexible Trace-Based Debugging of Systems-on-Chip. ACM Transactions on Design Automation of Electronic Systems, 2016, ⟨10.1145/2994601⟩. ⟨hal-01424899⟩
Accès au bibtex
BibTex
ref_biblio
Dubeuf Jérémy, David Hely, Vincent Beroulle. ECDSA Passive Attacks, Leakage Sources, and Common Design Mistakes . ACM Transactions on Design Automation of Electronic Systems, 2016, ⟨10.1145/2820611⟩. ⟨hal-01398724⟩
Accès au bibtex
BibTex
ref_biblio
Brice Colombier, Lilian Bossuet, David Hely. From Secured Logic to IP Protection. Microprocessors and Microsystems: Embedded Hardware Design , 2016, 47 (Part A), pp.44-54. ⟨10.1016/j.micpro.2016.02.010⟩. ⟨hal-01280195⟩
Accès au bibtex
BibTex
ref_biblio
Athanasios Papadimitriou, David Hely, Vincent Beroulle, Paolo Maistri, Régis Leveugle. Analysis of laser-induced errors: RTL fault models versus layout locality characteristics. Microprocessors and Microsystems: Embedded Hardware Design , 2016, ⟨10.1016/j.micpro.2016.01.018⟩. ⟨hal-01299277⟩
Accès au bibtex
BibTex
ref_biblio
Béringuier-Boher Noemie, Vincent Beroulle, David Hély, Joël Damiens, Philippe Candelier. Clock generator behavioral modeling for supply voltage glitch attack effects analysis. Microprocessors and Microsystems: Embedded Hardware Design , 2016. ⟨hal-01390988⟩
Accès au bibtex
BibTex

Conference papers

2020

ref_biblio
Emilia Cioroaica, Thomas Kuhn, Stanislav Chren, Oum-El-Kheir Aktouf, Alf Larsson, et al.. Towards Creation of Automated Prediction Systems for Trust and Dependability Evaluation. The 28 th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2020), Sep 2020, Hvar, Croatia. ⟨hal-02929752⟩
Accès au bibtex
BibTex
ref_biblio
Amir Alipour, Athanasios Papadimitriou, Vincent Beroulle, Ehsan Aerabi, David Hely. On the Performance of Non-Profiled Differential Deep Learning Attacks against an AES Encryption Algorithm Protected using a Correlated Noise Generation based Hiding Countermeasure. 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2020, Grenoble, France. pp.614-617, ⟨10.23919/DATE48585.2020.9116387⟩. ⟨hal-03136631⟩
Accès au bibtex
BibTex
ref_biblio
Julie Roux, Vincent Beroulle, Katell Morin-Allory, Régis Leveugle, Lilian Bossuet, et al.. Cross Layer Fault Simulations for Analyzing the Robustness of RTL Designs in Airborne Systems. 23rd International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS), Apr 2020, Novi Sad, Serbia. pp.1-4, ⟨10.1109/DDECS50862.2020.9095559⟩. ⟨hal-02937868⟩
Accès au bibtex
BibTex
ref_biblio
Amir Ali Pour, Vincent Beroulle, Bertrand Cambou, Jean-Luc Danger, Giorgio Di Natale, et al.. PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community. IEEE European Test Symposium (ETS 2020), May 2020, Tallinn, Estonia. pp.1-10. ⟨hal-02999226⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02999226/file/ETS2020_PUF.pdf BibTex
ref_biblio
Cyril Bresch, Roman Lysecky, David Hely. BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers. 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2020, Grenoble, France. pp.1606-1609, ⟨10.23919/DATE48585.2020.9116396⟩. ⟨hal-02883750⟩
Accès au bibtex
BibTex
ref_biblio
Zahra Kazemi, Mahdi Fazeli, David Hely, Vincent Beroulle. Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application. 2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), Jul 2020, Napoli, France. pp.1-6, ⟨10.1109/IOLTS50870.2020.9159739⟩. ⟨hal-02953435⟩
Accès au bibtex
BibTex
ref_biblio
F. Regazzoni, S. Bhasin, Amir Ali Pour, Ihab Alshaer, F. Aydin, et al.. Machine Learning and Hardware security: Challenges and Opportunities. International Conference on Computer-Aided Design (ICCAD 2020), Nov 2020, San Diego, United States. ⟨hal-02999327⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02999327/file/ICCAD_Paper.pdf BibTex
ref_biblio
Khadija Hadj Salem, Yann Kieffer. An Experimental Study on Symmetry Breaking Constraints Impact for the One Dimensional Bin-Packing Problem. 13th International Workshop on Computational Optimization (Fedcsis-WCO 2020), Sep 2020, Sofia, Bulgaria. pp.317-326, ⟨10.15439/2020f19⟩. ⟨hal-03006103⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03006103/file/19_WCO2020.pdf BibTex
ref_biblio
Thanh Bình Lê Thị, Mariem Allagui, Oum-El-Kheir Aktouf, Ioannis Parissis, Binh Nguyen Thanh. Experience report on developing a crowdsourcing test platform for mobile applications. 12th International Conference on Computational Collective Intelligence, Nov 2020, Da Nang, Vietnam. ⟨hal-02895680⟩
Accès au bibtex
BibTex
ref_biblio
Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty. Clock skew-based physical authentication protocol for 802.15.4 IR-UWB indoor positioning. In Proceedings of the 10th International Conference on the Internet of Things, 2020, New York, United States. ⟨hal-03136636⟩
Accès au bibtex
BibTex
ref_biblio
Amir Ali Pour, David Hely, Vincent Beroulle, Giorgio Di Natale. Power of Prediction: Advantages of Deep Learning Modeling as Replacement for Traditional PUF CRP Enrollment. TrueDevice2020, Mar 2020, Grenoble, France. ⟨hal-02954099⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02954099/file/TrueDevice_Power_Of_Prediction_Cam_Ready_Final.pdf BibTex
ref_biblio
Julie Roux, Vincent Beroulle, Katell Morin-Allory, Régis Leveugle, Lilian Bossuet, et al.. High Level Fault Injection Method for Evaluating Critical System Parameter Ranges. 2020 27th IEEE International Conference on Electronics, Circuits and Systems (ICECS), Nov 2020, Glasgow, United Kingdom. pp.1-4, ⟨10.1109/ICECS49266.2020.9294821⟩. ⟨hal-03136621⟩
Accès au bibtex
BibTex

2019

ref_biblio
Thanh-Kha Tran, Hamed Yahoui, Denis Genon-Catalot, Nicolas Siauve, Nicolas Fourty. G3 Power Line Communication for controlling an autonomous DC micro grid. IEEE ECTI-CON, Jul 2019, Pattaya, Thailand. ⟨hal-02478903⟩
Accès au bibtex
BibTex
ref_biblio
Viken Kojakian, Denis Genon-Catalot, Nicolas Fourty, Baptiste Pestourie, Réjane Dalcé, et al.. Firefighter indoor localization (POUCET). IEEE Radio and Antenna Days of the Indian Ocean (RADIO 2019), Sep 2019, La Réunion, France. pp.0. ⟨hal-02495457⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02495457/file/kojakian_25037.pdf BibTex
ref_biblio
Johan Marconot, David Hely, Florian Pebay-Peyroula. SPN-DPUF: Substitution-Permutation Network Based Secure Circuit for Digital PUF. 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Jul 2019, Miami, France. pp.49-54, ⟨10.1109/ISVLSI.2019.00018⟩. ⟨hal-02296579⟩
Accès au bibtex
BibTex
ref_biblio
Lina Marsso, Radu Mateescu, Ioannis Parissis, Wendelin Serwe. Asynchronous Testing of Synchronous Components in GALS Systems. IFM'2019 - 15th International Conference on Integrated Formal Methods, Dec 2019, Bergen, Norway. pp.360-378, ⟨10.1007/978-3-030-34968-4_20⟩. ⟨hal-02394989⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02394989/file/Marsso-Mateescu-Parissis-Serwe-09.pdf BibTex
ref_biblio
Souhir Gabsi, Vincent Beroulle, Hamdi Bilgacem, Mohsen Machhout. Architectural Choices for Implementing a Secure ECC-based Lightweight RFID Tag. 2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), Apr 2019, Gammarth-Tunis, Tunisia. pp.1-5, ⟨10.1109/DTSS.2019.8914902⟩. ⟨hal-02426112⟩
Accès au bibtex
BibTex
ref_biblio
Johan Laurent, Christophe Deleuze, Vincent Beroulle, Florian Pebay-Peyroula. Analyzing Software Security Against Complex Fault Models with Frama-C Value Analysis. 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), Aug 2019, Atlanta, United States. pp.33-40, ⟨10.1109/FDTC.2019.00013⟩. ⟨hal-02426133⟩
Accès au bibtex
BibTex
ref_biblio
Mosabbah Mushir Ahmed, Etienne Perret, Romain Siragusa, David Hély, Frédéric Garet, et al.. Implementation of RF communication subsets on common low frequency clocked FPGA. 2019 49th European Microwave Conference (EuMC), Oct 2019, Paris, France. pp.742-745, ⟨10.23919/EuMC.2019.8910837⟩. ⟨hal-02429327⟩
Accès au bibtex
BibTex
ref_biblio
Abderrahmane Sensaoui, David Hely, Oum-El-Kheir Aktouf. A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices. 2019 15th European Dependable Computing Conference (EDCC), Sep 2019, Naples, Italy. ⟨hal-02335739⟩
Accès au bibtex
BibTex
ref_biblio
Le Thanh Long, T .B. Nguyen, Ioannis Parissis. Neural Network-Based Generation of Test Data for Interactive Multimodal Applications. 2019 IEEE-RIVF International Conference on Computing and Communication Technologies (RIVF), Mar 2019, Danang, Vietnam. pp.1-5, ⟨10.1109/RIVF.2019.8713675⟩. ⟨hal-02394972⟩
Accès au bibtex
BibTex
ref_biblio
Arthur Darroux, Jean-Paul Jamont, Oum-El-Kheir Aktouf, Annabelle Mercier. An Energy Aware Approach to Trust Management Systems for Embedded Multi-Agent Systems. 11th International Workshop, SERENE 2019 Naples, Italy, September 17, 2019 Proceedings, Sep 2019, Naples, Italy. ⟨hal-02340508⟩
Accès au bibtex
BibTex
ref_biblio
Arthur Baudet, Oum-El-Kheir Aktouf, Annabelle Mercier, Jean-Paul Jamont. Toward testing self-organizations in multi-embedded-agent systems. 11th International Workshop, SERENE 2019 Naples, Italy, September 17, 2019 Proceedings, Sep 2019, Naples, Italy. ⟨hal-02340510⟩
Accès au bibtex
BibTex
ref_biblio
Florent Bonnefoy, Maxime Bernier, Frédéric Garet, Nicolas Barbot, David Hely, et al.. Diffraction grating tags structures dedicated to authentication in the THz. French-German THz Conference 2019, Apr 2019, Kaiserslautern, Germany. ⟨hal-02436662⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02436662/file/hal-02436662v1.pdf BibTex
ref_biblio
Mohammad Mohammadinodoushan, Bertrand Cambou, Christopher Philabaum, David Hely, D. Duane Booher. Implementation of Password Management System Using Ternary Addressable PUF Generator. 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Jun 2019, Boston, France. pp.1-8, ⟨10.1109/SAHCN.2019.8824792⟩. ⟨hal-02296576⟩
Accès au bibtex
BibTex
ref_biblio
Mosabbah Mushir Ahmed, Etienne Perret, Romain Siragusa, Nicolas Barbot, David Hely, et al.. Développement d'une plateforme RF flexible et reconfigurable basée sur un FPGA. 21ème Journées Nationales Microondes, May 2019, Caen, France. ⟨hal-02051698⟩
Accès au bibtex
BibTex
ref_biblio
Cyril Bresch, David Hely, Stéphanie Chollet, Ioannis Parissis. TrustFlow: A Trusted Memory Support for Data Flow Integrity. 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Jul 2019, Miami, France. pp.308-313, ⟨10.1109/ISVLSI.2019.00063⟩. ⟨hal-02296581⟩
Accès au bibtex
BibTex
ref_biblio
Zahra Kazemi, Athanasios Papadimitriou, Ioanna Souvatzoglou, Ehsan Aerabi, Mosabbah Mushir Ahmed, et al.. On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks. 2019 IEEE 4th International Verification and Security Workshop (IVSW), Jul 2019, Rhodes Island, Greece. pp.7-12, ⟨10.1109/IVSW.2019.8854391⟩. ⟨hal-02426130⟩
Accès au bibtex
BibTex
ref_biblio
Khadija Hadj Salem, Yann Kieffer. Nouvelle formulation en PLNE pour le problème classique du Bin Packing. Congrès Annuel de la Société Française de Recherche Opérationnelle et Aide à la Décision (ROADEF 2019), Feb 2019, Le Havre, France. ⟨hal-03006116⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03006116/file/ROADEF2019_ShortPaper.pdf BibTex
ref_biblio
Abderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hely. Shcot: Secure (and verified) Hybrid Chain of Trust to protect from malicious software in lightweight devices. The 1st Annual International Workshop on Software Hardware Interaction Faults, co-located with ISSRE 2019, Oct 2019, Berlin, Germany. ⟨hal-02335773⟩
Accès au bibtex
BibTex
ref_biblio
Abderrahmane Sensaoui, David Hely, Oum-El-Kheir Aktouf. Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices. 2019 15th European Dependable Computing Conference (EDCC), Sep 2019, Naples, Italy. ⟨hal-02342738⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02342738/file/toubkal.pdf BibTex
ref_biblio
Florent Bonnefoy, Maxime Bernier, Frédéric Garet, Hamdi Maher, Etienne Perret, et al.. Identification temps réel d'un tag THID bas coût dans le domaine THz. 21èmes Journées Nationales Microondes, May 2019, Caen, France. ⟨hal-02017114⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02017114/file/hal-02017114v1.pdf BibTex
ref_biblio
Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty. Open 802.15.4 IR-UWB Modular Platform For Localization Protocols Evaluation. 2019 IEEE Radio and Antenna Days of the Indian Ocean (RADIO), Sep 2019, Reunion, France. pp.1-2, ⟨10.23919/RADIO46463.2019.8968940⟩. ⟨hal-03136633⟩
Accès au bibtex
BibTex
ref_biblio
Zeshan Ali, Romain Siragusa, Etienne Perret, Nicolas Barbot, David Hely, et al.. Méthode d’authentification basée sur des tags RFID sans puce imprimés par jet d’encre conductrice. 21èmes Journées Nationales Microondes, May 2019, Caen, France. ⟨hal-02017120⟩
Accès au bibtex
BibTex
ref_biblio
Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty. Security Evaluation with an Indoor UWB Localization Open Platform: Acknowledgment Attack Case Study. 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Sep 2019, Istanbul, Turkey. pp.1-7, ⟨10.1109/PIMRC.2019.8904224⟩. ⟨hal-02426131⟩
Accès au bibtex
BibTex
ref_biblio
Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hély, Mahdi Fazeli. Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection. 2019 IEEE 4th International Verification and Security Workshop (IVSW), Jul 2019, Rhodes Island, Greece. pp.49-54, ⟨10.1109/IVSW.2019.8854402⟩. ⟨hal-02426128⟩
Accès au bibtex
BibTex
ref_biblio
Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula. Fault Injection on Hidden Registers in a RISC-V Rocket Processor and Software Countermeasures. 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2019, Florence, Italy. pp.252-255, ⟨10.23919/DATE.2019.8715158⟩. ⟨hal-02426113⟩
Accès au bibtex
BibTex

2018

ref_biblio
Zeshan Ali, Nicolas Barbot, Romain Siragusa, David Hely, Maxime Bernier, et al.. Chipless RFID Tag Discrimination and the Performance of Resemblance Metrics to be used for it. IEEE/MTT-S International Microwave Symposium - IMS 2018, Jun 2018, Philadelphia, United States. ⟨10.1109/MWSYM.2018.8439855⟩. ⟨hal-01888533⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01888533/file/Chipless%20RFID%20Tag%20Discrimination%20and%20the%20Performance%20of%20Resemblance%20-%20Preprint.pdf BibTex
ref_biblio
Maher Hamdi, Florent Bonnefoy, Maxime Bernier, Frédéric Garet, Etienne Perret, et al.. Identification in the Terahertz Domain using Low Cost Tags with a Fast Spectrometer. ASID 2018: 12th IEEE International Conference on Anti-counterfeiting, Security, and Identification, Nov 2018, Xiamen, China. ⟨10.1109/ICASID.2018.8693209⟩. ⟨hal-02015383⟩
Accès au texte intégral et bibtex
https://hal.univ-grenoble-alpes.fr/hal-02015383/file/hal-02015383v1.pdf BibTex
ref_biblio
Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Louis-Barthelemy Faber, Marie-Lise Flottes, et al.. The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks. IOLTS: International On-Line Testing Symposium, Jul 2018, Platja d’Aro, Spain. pp.214-219, ⟨10.1109/IOLTS.2018.8474230⟩. ⟨emse-01856000⟩
Accès au texte intégral et bibtex
https://hal-emse.ccsd.cnrs.fr/emse-01856000/file/HAL_Dutertre_The_case_of_using_CMOS_FD_SOI_rather_than_CMOS_bulk_to_harden%20_ICs%20against_laser_attacks.pdf BibTex
ref_biblio
Mosabbah Mushir Ahmed, David Hely, Etienne Perret, Nicolas Barbot, Romain Siragusa, et al.. Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique. 2018 IEEE 3rd International Verification and Security Workshop (IVSW), Jul 2018, Platja d’Aro, Spain. pp.25-30, ⟨10.1109/IVSW.2018.8494883⟩. ⟨hal-02014214⟩
Accès au texte intégral et bibtex
https://hal.science/hal-02014214/file/D5%20Authentication%20of%20Microcontroller%20board%20using%20non-invasive%20EM%20emission%20technique.pdf BibTex
ref_biblio
Rahma Ben Fraj, Vincent Beroulle, Nicolas Fourty, Aref Meddeb. An Evaluation of UHF RFID Anti-Collision Protocols with NS2. 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Feb 2018, Paris, France. ⟨10.1109/NTMS.2018.8328679⟩. ⟨hal-01899812⟩
Accès au bibtex
BibTex
ref_biblio
Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan de Castro, Louis-Barthelemy Faber, et al.. Laser fault injection at the CMOS 28 nm technology node: an analysis of the fault model. FDTC: Fault Diagnosis and Tolerance in Cryptography, Sep 2018, Amsterdam, Netherlands. pp.1-6, ⟨10.1109/FDTC.2018.00009⟩. ⟨emse-01856008⟩
Accès au texte intégral et bibtex
https://hal-emse.ccsd.cnrs.fr/emse-01856008/file/HAL_2018_laser_accuracy_jmdutertre.pdf BibTex
ref_biblio
Zahra Kazemi, Athanasios Papadimitriou, David Hély, Mahdi Fazeli, Vincent Beroulle. Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT. 2018 IEEE 3rd International Verification and Security Workshop (IVSW), Jul 2018, Costa Brava, France. pp.87-92, ⟨10.1109/IVSW.2018.8494843⟩. ⟨hal-02426115⟩
Accès au bibtex
BibTex
ref_biblio
Rahma Ben Fraj, Vincent Beroulle, Nicolas Fourty, Aref Meddeb. Time Modeling with NS2 in UHF RFID Anti-Collision Protocols. 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), May 2018, Krakow, France. ⟨10.1109/AINA.2018.00016⟩. ⟨hal-01899806⟩
Accès au bibtex
BibTex
ref_biblio
Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula, Athanasios Papadimitriou. On the Importance of Analysing Microarchitecture for Accurate Software Fault Models. 2018 21st Euromicro Conference on Digital System Design (DSD), Aug 2018, Prague, France. ⟨10.1109/DSD.2018.00097⟩. ⟨hal-01899800⟩
Accès au bibtex
BibTex
ref_biblio
Rahma Ben Fraj, Vincent Beroulle, Nicolas Fourty, Aref Meddeb. An approach to enhance the safety and security of EPC Class-1 generation-2 UHF RFID systems. 2018 2nd International Conference on Inventive Systems and Control (ICISC), Jan 2018, Coimbatore, France. ⟨10.1109/ICISC.2018.8398977⟩. ⟨hal-01899809⟩
Accès au bibtex
BibTex
ref_biblio
Cyril Bresch, Stéphanie Chollet, David Hely. Towards an Inherently Secure Run-Time Environment for Medical Devices.. 2018 IEEE International Congress on Internet of Things, ICIOT 2018, Jul 2018, San Francisco, United States. ⟨hal-01898660⟩
Accès au bibtex
BibTex
ref_biblio
Stéphanie Chollet, Laurent Pion, Nicolas Barbot. Secure IoT for a Pervasive Platform. 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2018, Mar 2018, Athènes, Greece. ⟨hal-01898651⟩
Accès au bibtex
BibTex
ref_biblio
Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty. Guidelines for the Choice of a Wireless Secure Positioning and Communication System. 2018 International Workshop on Secure Internet of Things (SIoT), Sep 2018, Barcelona, Spain. pp.1-7, ⟨10.1109/SIoT.2018.00007⟩. ⟨hal-02426120⟩
Accès au bibtex
BibTex
ref_biblio
Yassine Naija, Vincent Beroulle, Mohsen Machhout. ElectroMagnetic Attack Test Platform for Validating RFID Tag Architectures. 2018 6th International EURASIP Workshop on RFID Technology (EURFID), Sep 2018, Brno, Czech Republic. pp.1-7, ⟨10.1109/EURFID.2018.8611655⟩. ⟨hal-02426123⟩
Accès au bibtex
BibTex

2017

ref_biblio
Rahma Ben Fraj, Vincent Beroulle, Nicolas Fourty, Aref Meddeb. A global approach for the improvement of UHF RFID safety and security. Design & Technology of Integrated Systems In Nanoscale Era (DTIS), 2017 12th International Conference on, Apr 2017, Palma de Mallorca, Spain. ⟨hal-01663938⟩
Accès au bibtex
BibTex
ref_biblio
Rania Ben Hadj, Catherine Hamon, Stéphanie Chollet, German Eduardo Vega Baez, Philippe Lalanda. Context-based conflict management in pervasive platforms. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017, Mar 2017, Kona, Big Island, HI, United States. ⟨hal-01898642⟩
Accès au bibtex
BibTex
ref_biblio
Cyril Bresch, David Hely, Adrien Michelet, Laurent Amato, Thomas Meyer. A red team blue team approach towards a secure processor design with hardware shadow stack. 2017 IEEE 2nd International Verification and Security Workshop (IVSW), Jul 2017, Thessaloniki, France. ⟨10.1109/IVSW.2017.8031545⟩. ⟨hal-01724169⟩
Accès au bibtex
BibTex
ref_biblio
Adrien van den Bossche, Nicolas Fourty, Jean-Paul Jamont. A Trusted Lightweight Synchronisation Protocol for Wireless Ad-hoc Networks. IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Application (CIVEMSA 2017), Jun 2017, Annecy, France. pp. 1, ⟨10.1109/CIVEMSA.2017.7995305⟩. ⟨hal-01913991⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01913991/file/vandenbossche_19104.pdf BibTex
ref_biblio
Le van Phol, T .B. Nguyen, Ioannis Parissis. Mutants Generation For Testing Lustre Programs. the Eighth International Symposium, Dec 2017, Nha Trang City, Vietnam. pp.425-430, ⟨10.1145/3155133.3155155⟩. ⟨hal-02394975⟩
Accès au bibtex
BibTex
ref_biblio
Brice Colombier, Lilian Bossuet, David Hely. Centrality Indicators for Efficient and Scalable Logic Masking. IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2017), IEEE, Jul 2017, Bochum, Germany. pp.98-103, ⟨10.1109/ISVLSI.2017.26⟩. ⟨ujm-01570080⟩
Accès au texte intégral et bibtex
https://ujm.hal.science/ujm-01570080/file/ISVLSI_2017.pdf BibTex
ref_biblio
Philippe Lalanda, Gerbert-Gaillard Eva, Stéphanie Chollet. Self-Aware Context in Smart Home Pervasive Platforms. 14th IEEE International Conference on Autonomic Computing (ICAC 2017), Jul 2017, Columbus, OH, United States. ⟨hal-01674695⟩
Accès au bibtex
BibTex
ref_biblio
Gerbert-Gaillard Eva, Philippe Lalanda, Stéphanie Chollet, Demarchez Jérémie. A self-aware approach to context management in pervasive platforms. PerCom Workshops 2017, Mar 2017, Kona, Big Island, HI, United States. ⟨10.1109/PERCOMW.2017.7917568⟩. ⟨hal-01535547⟩
Accès au bibtex
BibTex
ref_biblio
Brice Colombier, Ugo Mureddu, Lilian Bossuet, David Hely. A comprehensive hardware/software infrastructure for IP cores design protection. IEEE International Conference on Field-Programmable Technology, ICFPT 2017, Dec 2017, Melbourne, Australia. ⟨hal-01632978⟩
Accès au bibtex
BibTex
ref_biblio
Brice Colombier, Lilian Bossuet, David Hely. Centrality Indicators for Efficient and Scalable Logic Masking. In International CryptArchi Workshop 2017, Jun 2017, Smolenice, Slovakia. ⟨hal-01586818⟩
Accès au bibtex
BibTex
ref_biblio
Mosabbah Mushir Ahmed, David Hely, Nicolas Barbot, Romain Siragusa, Etienne Perret, et al.. Towards a robust and efficient EM based authentication of FPGA against counterfeiting and recycling. 19th International Symposium on Computer Architecture and Digital Systems (CADS), Dec 2017, Kish Island, Iran. pp.1-6, ⟨10.1109/CADS.2017.8310673⟩. ⟨hal-02014230⟩
Accès au texte intégral et bibtex
https://hal.univ-grenoble-alpes.fr/hal-02014230/file/D6%20Towards%20a%20robust%20and%20efficient%20EM%20based.pdf BibTex
ref_biblio
Zeshan Ali, Florent Bonnefoy, Romain Siragusa, Nicolas Barbot, David Hély, et al.. Potential of chipless authentication based on randomness inherent in fabrication process for RF and THz. 11th European Conference on Antennas and Propagation (EUCAP), Mar 2017, Paris, France. ⟨10.23919/EuCAP.2017.7928647⟩. ⟨hal-01800579⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01800579/file/Potential%20of%20Chipless%20Authentication%20Based%20on%20Randomness%20Inherent%20in%20Fabrication%20Process%20for%20RF%20and%20THz%20-%20Preprint.pdf BibTex
ref_biblio
Johan Marconot, David Hely, Florian Pebay-Peyroula. IoT Components LifeCycle Based Security Analysis. 2017 Euromicro Conference on Digital System Design (DSD), Aug 2017, Vienna, France. ⟨10.1109/DSD.2017.44⟩. ⟨hal-01724164⟩
Accès au bibtex
BibTex
ref_biblio
Florent Bonnefoy, Maher Hamdi, Maxime Bernier, Nicolas Barbot, Romain Siragusa, et al.. Authentication in the THz domain: a new tool to fight couterfeiting. 9th THz days, Jun 2017, Dunkerque, France. ⟨hal-02014053⟩
Accès au texte intégral et bibtex
https://hal.univ-grenoble-alpes.fr/hal-02014053/file/hal-02014053v1.pdf BibTex
ref_biblio
Camille Barnier, Oum-El-Kheir Aktouf, Annabelle Mercier, Jean-Paul Jamont. Toward an Embedded Multi-Agent System Methodology and Positioning on Testing. The second International Workshop on Software Faults (IWSF'17) colocated with ISSRE 2017 (28th International Symposium on Software Reliability Engineering), Oct 2017, TOULOUSE, France. ⟨hal-01646857⟩
Accès au bibtex
BibTex
ref_biblio
Jeremy Dubeuf, David Hély, Vincent Beroulle. Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors. Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, COSADE 2017, Apr 2017, Paris, France. pp.65-82, ⟨10.1007/978-3-319-64647-3_5⟩. ⟨hal-02426126⟩
Accès au bibtex
BibTex
ref_biblio
Khadija Hadj Salem, Yann Kieffer, Stéphane Mancini. Minimisation du temps total de traitement pour optimiser le fonctionnement d’un contrôleur de buffers pour les systèmes de vision embarquée. 18ème édition du congrès annuel de la Société Française de Recherche Opérationnelle et d'Aide à la Décision (ROADEF 2017), Feb 2017, Metz, France. ⟨hal-01756876⟩
Accès au bibtex
BibTex

2016

ref_biblio
Arash Nejat, David Hely, Vincent Beroulle. How logic masking can improve path delay analysis for Hardware Trojan detection. 2016 IEEE 34th International Conference on Computer Design (ICCD), Oct 2016, Phenix, United States. ⟨10.1109/ICCD.2016.7753319⟩. ⟨hal-01418432⟩
Accès au bibtex
BibTex
ref_biblio
Yassine Naija, Vincent Beroulle, David Hely, Mohsen Machhout. Design and Validation of a Secured Digital Ultralight 14443-Type A RFID tag with a FPGA Platform. 11th Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS 2016) , 2016, Istanbul, Turkey. ⟨hal-01391006⟩
Accès au bibtex
BibTex
ref_biblio
K. Hadj Salem, Y. Kieffer, Stéphane Mancini. Memory Management in Embedded Vision Systems: Optimization Problems and Solution Methods. The Conference on Design, Architectures for Signal and Image Processing (DASIP'16), Oct 2016, Rennes, France. ⟨hal-01445017⟩
Accès au bibtex
BibTex
ref_biblio
Y. Kieffer, K. Hadj Salem, Stéphane Mancini. Multi-objective optimization for the scheduling of embedded vision accelerators. The 29th Conference of the European Chapter on Combinatorial Optimization (ECCO'16), May 2016, Budapest, Hungary. ⟨hal-01445006⟩
Accès au bibtex
BibTex
ref_biblio
Philippe Lalanda, Stéphanie Chollet, Catherine Hamon. Linked models@runtime to ease the administration of pervasive applications. 13th International Workshop on Managing Communications and Services. Part of PerCom 2016, Mar 2016, Sydney, Australia. ⟨hal-01289448⟩
Accès au bibtex
BibTex
ref_biblio
Colin Aygalinc, Gerbert-Gaillard Eva, German Vega, Philippe Lalanda, Stéphanie Chollet. Autonomic Service-Oriented Context for Pervasive Applications. 13th IEEE International Conference on Services Computing, Jun 2016, San Fransisco, CA, United States. ⟨10.1109/SCC.2016.70⟩. ⟨hal-01370442⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01370442/file/SCC-2016-context-final.pdf BibTex
ref_biblio
K. Hadj Salem, Y. Kieffer, Stéphane Mancini. Minimisation des accès mémoires dans un cache intelligent pour les systèmes de vision embarquée. 17ème Congrès Annuel de la Société Française de Recherche Opérationnelle et Aide à la Décision, Feb 2016, Compiègne, France. pp.1-2. ⟨hal-01445004⟩
Accès au bibtex
BibTex
ref_biblio
Seyyed Mohammad Saleh Samimi, Ehsan Aerabi, Arash Nejat, Mahdi Fazeli, David Hely, et al.. High output hamming-distance achievement by a greedy logic masking approach. 2016 IEEE East-West Design & Test Symposium (EWDTS), Oct 2016, Yerevan, France. ⟨10.1109/EWDTS.2016.7807657⟩. ⟨hal-01724174⟩
Accès au bibtex
BibTex
ref_biblio
Philippe Lalanda, Stéphanie Chollet, Catherine Hamon, Vincent Lestideau. Architectural Models to Simplify Administration of Service-Oriented Applications. IEEE International Conference on Services Computing, SCC 2016, Jun 2016, San Francisco, United States. ⟨hal-01898599⟩
Accès au bibtex
BibTex
ref_biblio
Vincent Beroulle, Oum-El-Kheir Aktouf, David Hely. System-Level Simulation for the Dependability Improvement of UHF RFID Systems. ICWMC 2016 : The Twelfth International Conference on Wireless and Mobile Communications (includes QoSE WMC 2016), IARIA, Nov 2016, Barcelone, Spain. ⟨hal-01432066⟩
Accès au bibtex
BibTex
ref_biblio
C. Ananiadis, A. Papadimitriou, D. Hély, V. Beroulle, Paolo Maistri, et al.. On the development of a new countermeasure on a laser attack RTL fault model. Design, Automation and Test in Europe Conference (DATE'16), Mar 2016, Dresden, Germany. ⟨hal-01414728⟩
Accès au bibtex
BibTex
ref_biblio
Mouna Tka Mnad, Christophe Deleuze, Ioannis Parissis, Jackie Launay, Jean-Baptiste Gning. Automated test generation for synchronous controllers. 11th International Workshop on Automation of Software (AST) , May 2016, Austin, TX, United States. ⟨hal-01424800⟩
Accès au bibtex
BibTex
ref_biblio
Arash Nejat, David Hely, Vincent Beroulle. Reusing logic masking to facilitate path-delay-based hardware Trojan detection. 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), Jul 2016, Sant Felliu, Spain. ⟨10.1109/IOLTS.2016.7604696⟩. ⟨hal-01412412⟩
Accès au bibtex
BibTex
ref_biblio
Long Le Thanh, Binh Nguyen Thanh, Ioannis Parissis. Testing Multimodal Interactive Applications by Means of the TTT Language. International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn (AMARETTO), Feb 2016, Rome, Italy. ⟨hal-01424798⟩
Accès au bibtex
BibTex
ref_biblio
K. Hadj Salem, Y. Kieffer, Stéphane Mancini. Optimisation du Fonctionnement d’un Contrôleur de Buffers pour les Systèmes de Vision Embarquée. Conférence d’informatique en Parallélisme, Architecture et Système (ComPAS'16), Jul 2016, Lorient, France. ⟨hal-01445013⟩
Accès au bibtex
BibTex
ref_biblio
Mosabbah Mushir Ahmed, David Hely, Romain Siragusa, Nicolas Barbot, Etienne Perret, et al.. Authentication of IC based on Electromagnetic Signature. 6th Conference on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2016), Nov 2016, Barcelone, Spain. ⟨hal-02014251⟩
Accès au texte intégral et bibtex
https://hal.univ-grenoble-alpes.fr/hal-02014251/file/D16%20Authentication%20of%20IC%20based%20on%20Electromagnetic.pdf BibTex
ref_biblio
K. Hadj Salem, Y. Kieffer, Stéphane Mancini. Efficient Algorithms for Memory Management in Embedded Vision Systems. The 11th IEEE International Symposium on Industrial Embedded Systems (SIES-WIP'16), May 2016, Krakow, Poland. ⟨hal-01445010⟩
Accès au bibtex
BibTex
ref_biblio
Rania Ben Hadj, Stéphanie Chollet, Philippe Lalanda, Catherine Hamon. Sharing Devices between Applications with Autonomic Conflict Management. 2016 IEEE International Conference on Autonomic Computing (ICAC 2016), Jul 2016, Wuerzburg, Germany. ⟨hal-01898615⟩
Accès au bibtex
BibTex
ref_biblio
Le Thanh Long, T .B. Nguyen, Ioannis Parissis. TTTEST: The tool support for testing interactive multimodal application. 2016 International Conference on Electronics, Information, and Communications (ICEIC), Jan 2016, Danang, Vietnam. ⟨10.1109/ELINFOCOM.2016.7562942⟩. ⟨hal-01717436⟩
Accès au bibtex
BibTex
ref_biblio
Gerbert-Gaillard Eva, Stéphanie Chollet, Philippe Lalanda. Model-driven approach for self-aware pervasive systems. 15th IEEE/ICIS International Conference on Computer and Information Science (ICIS 2016), Jun 2016, Okayama, Japan. ⟨hal-01898591⟩
Accès au bibtex
BibTex
ref_biblio
Colin Aygalinc, Eva Gerbert-Gaillard, German Vega, Philippe Lalanda, Stéphanie Chollet. A model-based approach to context management in pervasive platforms. 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom 2016), Mar 2016, Sydney, Australia. pp.258-264, ⟨10.1109/PERCOMW.2016.7457109⟩. ⟨hal-01370467⟩
Accès au texte intégral et bibtex
https://hal.science/hal-01370467/file/2016_CoMoRea_v1.1.pdf BibTex
ref_biblio
Romain Champon, Vincent Beroulle, Athanasios Papadimitriou, David Hély, Gilles Grenevrier, et al.. Comparison of RTL Fault Models for the Robustness Evaluation of Aerospace FPGA devices. 22nd IEEE international Symposium on On-Line Testing and Robust System Design (IOLTS 2016), Jul 2016, San Feliu de Guiwols, Spain. ⟨hal-01391000⟩
Accès au bibtex
BibTex
ref_biblio
Régis Leveugle, A. Chahed, Paolo Maistri, A. Papadimitriou, D. Hély, et al.. On Fault Injections for Early Security Evaluation vs. Laser-based Attacks. 1st IEEE International Verification and Security Workshop, Jul 2016, St Feliu de Guixols, Spain. pp.33-38. ⟨hal-01444970⟩
Accès au bibtex
BibTex
ref_biblio
K. Hadj Salem, Y. Kieffer, Stéphane Mancini. Formulation and Practical Solution for the Optimization of Memory Accesses in Embedded Vision Systems. The 9th International Workshop on Computational Optimization (WCO'16), Sep 2016, Gdansk, Poland. ⟨hal-01445015⟩
Accès au bibtex
BibTex
ref_biblio
Brice Colombier, Lilian Bossuet, David Hely, Viktor Fischer. Key Reconciliation Protocols: an Alternative for Lightweight Authentication of Integrated Circuits. International CryptArchi Workshop , Jun 2016, La Grande-Motte, France. ⟨hal-01382983⟩
Accès au bibtex
BibTex

Book sections

2020

ref_biblio
Khadija Hadj Salem, Yann Kieffer. New Symmetry-less ILP Formulation for the Classical One Dimensional Bin-Packing Problem. Donghyun Kim; R. N. Uma; Zhipeng Cai; Dong Hoon Lee. Computing and Combinatorics. 26th International Conference, COCOON 2020, Atlanta, GA, USA, August 29–31, 2020, Proceedings, 12273, Springer, pp.423-434, 2020, Lecture Notes in Computer Science, 978-3-030-58149-7. ⟨10.1007/978-3-030-58150-3_34⟩. ⟨hal-03006106⟩
Accès au texte intégral et bibtex
https://hal.science/hal-03006106/file/New%20Symmetry-less%20ILP%20Formulation%20for%20the%20Classical%20One%20Dimensional%20Bin-Packing%20Problem.pdf BibTex

2017

ref_biblio
Philippe Lalanda, Stéphanie Chollet, Catherine Hamon. Leveraging Design and Runtime Architecture Models to Support Self-awareness. Self-Aware Computing Systems, 2017. ⟨hal-01898636⟩
Accès au bibtex
BibTex
ref_biblio
Brice Colombier, Lilian Bossuet, David Hély. Turning Electronic Circuits Features into On-Chip Locks. Lilian Bossuet; Lionel Torres. Foundations of Hardware IP Protection, Springer International Publishing, pp.15-36, 2017, 978-3-319-50378-3. ⟨10.1007/978-3-319-50380-6_2⟩. ⟨hal-02426141⟩
Accès au bibtex
BibTex
ref_biblio
Brice Colombier, Lilian Bossuet, David Hely. Logic Modification-Based IP Protection Methods: An Overview and a Proposal. Bossuet, Lilian, Torres, Lionel. Foundations of Hardware IP Protection, 2, Springer, pp.30-64, 2017, 978-3-319-50378-3. ⟨ujm-01570115⟩
Accès au texte intégral et bibtex
https://ujm.hal.science/ujm-01570115/file/Springer_2017.pdf BibTex

Other publications

2019

ref_biblio
Abderrahmane Sensaoui, David Hely, Oum-El-Kheir Aktouf. Hardware-based Isolation and Attestation Architecture for a RISC-V Core. 2019. ⟨hal-02335812⟩
Accès au bibtex
BibTex
ref_biblio
Oum-El-Kheir Aktouf, Annabelle Mercier, Jean-Paul Jamont. Resilience Study of Embedded Multi-Agent Systems. 2019. ⟨hal-02335891⟩
Accès au bibtex
BibTex

Poster communications

2019

ref_biblio
Abderrahmane Sensaoui, David Hely, Oum-El-Kheir Aktouf. Hardware-based Isolation and Attestation Architecture for a RISC-V Core. 2019 CySep and EuroS&P, Jun 2019, Stockholm, Sweden. ⟨hal-02335793⟩
Accès au bibtex
BibTex
ref_biblio
Abderrahmane Sensaoui, David Hely, Oum-El-Kheir Aktouf. Hardware-based Isolation and Attestation Architecture for a RISC-V Core. 2019 15th European Dependable Computing Conference (EDCC), Sep 2019, Naples, Italy. ⟨hal-02335800⟩
Accès au bibtex
BibTex