{"id":2,"date":"2016-01-22T14:16:08","date_gmt":"2016-01-22T13:16:08","guid":{"rendered":"http:\/\/wp-systeme.lip6.fr\/prosecco\/?page_id=2"},"modified":"2019-02-06T14:02:44","modified_gmt":"2019-02-06T13:02:44","slug":"page-d-exemple","status":"publish","type":"page","link":"https:\/\/wp-systeme.lip6.fr\/prosecco\/page-d-exemple\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>Publications<\/p>\n<ul>\n<li>Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Mo\u00ebllic, Jean-Baptiste Rigaud and Jean-Luc Danger. \u00a0<em>Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller.<\/em>\u00a0IEEE International Symposium on Hardware Oriented Security and Trust (HOST), May 2019.<\/li>\n<li>Jean-Baptiste Br\u00e9jon, Karine Heydemann, Emmanuelle Encrenaz, Quentin Meunier, Son-Tuan Vu. <em><em><em>Fault attack vulnerability assessment of binary code.\u00a0<\/em><\/em><\/em>6th Workshop on\u00a0Cryptography and Security in Computing Systems (CS2 \u201919@HIPEAC2019), January 2019.<\/li>\n<li>Nicolas Belleville, \u00a0Damien Courouss\u00e9, Karine Heydemann and Henri-Pierre Charles.\u00a0<em>Automated software protection for the masses against side-channel attacks<\/em>. ACM Transaction on Architecture and Code Optimization. Volume 15 Issue 4, January 2019,\u00a0Article No. 47<\/li>\n<li>Nicolas Belleville, Karine Heydemann, Damien Courouss\u00e9, Thierno Barry, Bruno Robisson, Abderra- mane Seriai, and Henri-Pierre Charles. <em>The Multiple Ways to Automate the Application of Software Countermeasures against Physical Attacks : Pitfalls and Guidelines.<\/em> Forthcoming. Springer, 2018.<\/li>\n<li>I. Ben El Ouahma, Q. Meunier, K. Heydemann, E. Encrenaz. <i> Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes <\/i>. PROOFS: Security Proofs for Embedded Systems, 2017.<\/li>\n<li>T. Barry, D. Courouss\u00e9, B. Robisson. <i>Compilation of a Countermeasure Against Instruction-Skip Fault Attacks.<\/i> 3rd Workshop on Cryptography and Security in Computing Systems, HIPEAC conference. Jan 2016.<\/li>\n<li>L. Goubet,, K. Heydemann, E. Encrenaz, R. De Keulanaer, <i>Efficient Design and Evaluation of Countermeasures Against Fault Attacks with Formal Verification. <\/i>14th Smart Card Research and Advanced Application Conference, Nov 2015.<\/li>\n<\/ul>\n<p>Pr\u00e9sentations<\/p>\n<ul>\n<li>Nicolas Belleville, Damien Courouss\u00e9, Karine Heydeman, and Henri-Pierre Charles. <em>Automated software protection for the masses against side-channel attacks<\/em>. Workshop on Practical Hardware Innovation in Security and Characterization (PHISIC), May 2018.<\/li>\n<li>In\u00e8s Ben El Ouahma, Quentin L. Meunier, Karine Heydemann, and Emmanuelle Encrenaz. <em>Side-channel robustness analysis of masked programs.<\/em> Workshop on Practical Hardware Innovations in Security Implementation and Characterization (PHISIC), May 2018.<\/li>\n<li>Brice Colombier and Pierre-Alain Moellic. <em>Security evaluation of countermeasures against physical at- tacks inserted at compilation time.<\/em> Workshop for Cryptographic architectures embedded in logic devices (CryptArchi), June 2018.<\/li>\n<li>N. Belleville, T. Barry, A. Seriai, D. Courouss\u00e9, K. Heydemann, H-P. Charles and B. Robisson. \u201cThe Multiple Ways to Automate the Application of Software Countermeasures against Physical Attacks : Pitfalls and Guidelines\u201d Cyber-Physical Security Education Workshop, Paris, France, July 2017<\/li>\n<li>Thierno Barry, Damien Courouss\u00e9, Karine Heydemann, and Bruno Robisson. <em>Automated combination of tolerance and control flow integrity countermeasures against multiple fault attacks.<\/em> 2017 European LLVM Developers Meeting, March 2017.\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Publications Brice Colombier, Alexandre Menu, Jean-Max Dutertre, Pierre-Alain Mo\u00ebllic, Jean-Baptiste Rigaud and Jean-Luc Danger. \u00a0Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller.\u00a0IEEE International Symposium on Hardware Oriented Security and Trust (HOST), May 2019. Jean-Baptiste Br\u00e9jon, Karine Heydemann, Emmanuelle Encrenaz, Quentin Meunier, Son-Tuan Vu. Fault attack vulnerability assessment of binary code.\u00a06th Workshop &hellip; <a href=\"https:\/\/wp-systeme.lip6.fr\/prosecco\/page-d-exemple\/\" class=\"more-link\">Continuer la lecture de <span class=\"screen-reader-text\">Publications<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/wp-systeme.lip6.fr\/prosecco\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp-systeme.lip6.fr\/prosecco\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wp-systeme.lip6.fr\/prosecco\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wp-systeme.lip6.fr\/prosecco\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/wp-systeme.lip6.fr\/prosecco\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":19,"href":"https:\/\/wp-systeme.lip6.fr\/prosecco\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":151,"href":"https:\/\/wp-systeme.lip6.fr\/prosecco\/wp-json\/wp\/v2\/pages\/2\/revisions\/151"}],"wp:attachment":[{"href":"https:\/\/wp-systeme.lip6.fr\/prosecco\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}