Skip to main content

Cost-effective IoT/Hardware protections: Publications & Conferences

Publications

  • Michele Portolan, Emanuele Valea, Paolo Maistri, Giorgio Di Natale
    Flexible and Portable Management of Secure Scan Implementations Exploiting P1687.1 Extensions,
    IEEE Design & Test, accepted for publication
  • Mohamed Elshamy, Giorgio Di Natale, Alhassan Sayed, Antonios Pavlidis, Marie-Minerve Loue ̈rat, Hassan Aboushady, Haralampos-G. Stratigopoulos
    Digital-to-Analog Hardware Trojan Attacks,
    IEEE Transactions on Circuits and Systems I, accepted for publication
  • Dar G., Di Natale G., Keren O.
    Nonlinear Code-based Low-Overhead Fine-Grained Control Flow Checking,
    IEEE Transactions on Computer, doi: 10.1109/TC.2021.3057132
  • Gabsi, S.; Beroulle, V.; Kieffer, Y.; Dao, H.M.; Kortli, Y.; Hamdi, B. Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
    Sensors 2021, 21, 5824. https://doi.org/10.3390/ s21175824
  • Ph. Elbaz-Vincent, C. Hugounenq, S. Riou. SPAE : a mode of operation for AES on low-cost hardware
  • M. M. Ahmed, E. Perret, D. Hély, R. Siragusa, and N. Barbot,Electromagnetic Wave Technique for IC Authentication
    Sensors 2020, 20, 2041.
  • M. M. Ahmed, D. Hély, E. Perret, N. Barbot, R. Siragusa, M. Bernier, F. Garet. Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions,
    Journal of Hardware and Systems Security, pp. 1–16, 2019.
  • Kazemi, Z.; Hely, D.; Fazeli, M.; Beroulle, V.A Review on Evaluation and Configuration of Fault Injection Attack Instruments to Design Attack Resistant MCU-Based IoT Applications
    Electronics, 16 July 2020
  • C. Bresch, D. Hély, S. Chollet and R. Lysecky. SecPump: A Connected Open-Source Infusion Pump for Security Research Purposes
    IEEE Embedded Systems Letters, vol. 13, no. 1, pp. 21-24, March 2021
  • Cyril Bresch, David Hély, Roman Lysecky, Stéphanie Chollet, and Ioannis Parissis. TrustFlow-X: A Practical Framework for Fine-grained Control-flow Integrity in Critical Systems. ACM Trans
    Embed. Comput. Syst. 19, 5, Article 36 (November 2020), 26 pages.
  • B. Cambou, D. Hély, and S. Assiri,Cryptography with Analog Scheme Using Memristors
    ACM Journal of Emerging Technology Computer Systems 16, 4, Article 40 (October 2020), 30 pages.
  • E. Aerabi, M. Bohlouli, M. H. A. Livany, M. Fazeli, A. Papadimitriou, and D. Hély. Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUs,
    ACM Trans. Embed. Comput. Syst., vol. 19, no. 3, p. 19:1-19:34, 2020
  • M. Cunche and A. Ratel. IoT & Privacy - Comment assurer la confidentialité sur les réseaux sans fil ? L'exemple du BLE
  • Amir Alipour, David Hely, Vincent Beroulle, and Giorgio Di Natale; Power of Prediction: Advantages of Deep Learning Modeling as Replacement for Traditional PUF CRP Enrollment
    Trudevice 2020, forthcoming Mar 2020
  • Zahra Kazemi, Cyril Bresch, Mahdi Fazeli, David Hely, and Vincent Beroulle; A Systematic Approach for Hardware Security Assessment of Secured IoT Applications
    Trudevice 2020, forthcoming Mar 2020
  • Ezinam Bertrand Talaki, Mathieu Bouvier Des Noes, Olivier Savry, and David Hely; Side-channel Leakage Assessment On RISC-V Architecture
    Trudevice 2020, forthcoming Mar 2020
  • CONFISCA : SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
    IEEE Embedded system Letters, forthcoming 2020
  • SecPump: A Connected Open Source Infusion Pump for Security Purposes
    IEEE Embedded system Letters, forthcoming 2020
  • TrustFlow-X: A Practical Framework for Fine-Grained Data Flow Integrity in Critical Systems
    ACM Transactions on Embedded Computing Systems (TECS) (submitted)
  • "Conception and Evaluation of Secure Circuits for Strong Digital PUF"
    IEEE Transactions on Computers (submitted)
  • Aerabi, Milad Bohlouli, MohammadHasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hely, « Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs »
    ACM Transactions on Embedded Computing Systems, Feb 2020
  • D. Hely, P. Flikkema and B. Cambou; “Physical Unclonable Function-Based On-Chip Data Integrity”
    Patent, submitted Jun 2019
  • D. Hely, and B. Cambou; “Secure Enrollment for PUFs”;
    Patent, submitted Jun 2019
  • Mosabbah Mushir Ahmed, David Hély, Etienne Perret and Romain Siragusa, “Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions"
    Journal of Hardware and Systems Security
  • A. Sensaoui, O.-E.-K. Aktouf, D. Hely, and S. Di Vito, “An In-depth Study of MPU-Based Isolation Techniques,”
    Journal of Hardware and Systems Security, Nov. 2019. 3: 365. https://doi.org/10.1007/s41635-019-00078-6
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan De Castro, Louis-Barthelemy Faber et al., Sensitivity to Laser Fault Injection: CMOS FD-SOI vs. CMOS bulk,
    IEEE Transactions on Device and Materials Reliability, Institute of Electrical and Electronics Engineers, 2018, DOI:10.1109/TDMR.2018.288646
  • E.Aerabi, A.Papadimitriou, D.Hely, On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations,
    25th IEEE International Symposium on On-Line Testing and Robust System Design, July 1-3, 2019
  • Zahra Kazemi, Athanasios Papadimitriou, Ehsan Aerabi, Mosabbah Mushir Ahmed, David Hely and Vincent Beroulle, A low Cost and Practical Framework for Security Assessment of the Cyber-Physical Systems,
    4th International Verification and Security Workshop (IVSW) July 1-3, 2019
  • Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hely (Univ. Grenoble Alpes France), and Mahdi Fazeli (Iran Univ. of Science and Technology, Iran), Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection,
    4th International Verification and Security Workshop (IVSW), July 1-3, 2019
  • Cyril Bresch, David Hely and Stephanie Chollet, TrustFlow: A Trusted Memory Support for Data Flow Integrity IEEE Computer Society Annual Symposium on VLSI, Miami, Florida, U.S.A., July 15-17, 2019
  • Johan Marconot, David Hely and Florian Pebay-Peyroula, SPN-DPUF: Substitution-Permutation Network based Secure Circuit for Digital PUF,
    IEEE Computer Society Annual Symposium on VLSI, Miami, Florida, U.S.A., July 15-17, 2019
  • Abderrahmane Sensaoui, David Hely and Oum-El-Kheir Aktouf, Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices,
    15th European Dependable Computing Conference,17-20 September 2019

Conferences

  • Michele Portolan, Vincent Reynaud, Paolo Maistri, Regis Leveugle and Giorgio Di Natale
    Security EDA Extension through P1687.1 and 1687 Callbacks,
    IEEE International Test Conference (ITC21), October 2021
  • Antoine Linares, David Hely, Frank Lhermet, Giorgio Di Natale
    Design Space Exploration Applied to Security,
    2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), DOI:10.1109/DTIS53253.2021.9505151
  • Honorio Martin, Elena-Ioana Vatajelu, Giorgio Di Natale
    Identification of Hardware Devices based on Sensors and Switching Activity: a Preliminary Study,
    IEEE 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), DOI:10.23919/DATE51398.2021.9474173
  • Amine Jaamoum, Thomas Hiscock, Giorgio Di Natale
    Scramble Cache: An Efficient Cache Architecture for Randomized Set Permutation,
    IEEE 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), DOI:10.23919/DATE51398.2021.9473919
  • Di Natale G., Regazzoni F., Albanese V., Lhermet F., Loisel Y., Sensaoui A., Pagliarini S.
    Latest Trends in Hardware Security and Privacy,
    IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'20), Rome (Italy)
  • Ali Pour A., Beroulle V., Cambou B., Danger J.-L., Di Natale G., Hély D., Guilley S., Karimi N.
    PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community,
    IEEE European Test Symposium (ETS'20), May 2020, Tallin, Estonia, DOI: 10.1109/ETS48528.2020.9131578
  • Di Natale G., Keren O.
    Nonlinear Codes for Control Flow Checking,
    IEEE European Test Symposium (ETS'20), May 2020, Tallin, Estonia, DOI: 10.1109/ETS48528.2020.9131592
  • L.Maingault, S. Anceau, M. Sulmont, L.Salvo, J. Clediere, P. Lhuissier, E.Beliard, J.L. Rainard, "Laboratory X-rays operando single bit attacks on flash memory cells"
    Cardis 21, 20th Smart Card Research and Advanced Application Conference,  November 11-12, 2021
  • Z. Kazemi, A. Norollah, A. Kchaou, M. Fazeli, D. Hely and V. Beroulle, "An In-Depth Vulnerability Analysis of RISC-V Micro-Architecture Against Fault Injection Attack,"
    2021 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2021, pp. 1-6, doi: 10.1109/DFT52944.2021.9568318.
  • A. Desuert, S. Chollet, L. Pion and D. Hély, "PUF-Based Protocol for Securing Constrained Devices,"
    2021 17th International Conference on Intelligent Environments (IE), 2021, pp. 1-8, doi: 10.1109/IE51775.2021.9486492.
  • A. Linarès, D. Hely, F. Lhermet and G. Di Natale, "Design Space Exploration Applied to Security,"
    2021 16th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2021, pp. 1-4, doi: 10.1109/DTIS53253.2021.9505151.
  • Ihab Alshaer_, Brice Colombiery, Christophe Deleuze_, Vincent Beroulle_, Paolo Maistri, Microarchitecture-aware Fault Models: Experimental Evidence and Cross-Layer Inference Methodology
    16th IEEE International Conference on Design & Technology of Integrated System in Nanoscale Era. DTIS 2021
  • J. Marconot, D. Hely, F. Pebay-Peyroula. Motivation and Contribution for Novel Digital Disorder based Strong PUF Design'
    ISVLSI  2019
  • Baptiste Pestourie, Vincent Beroulle, and Nicolas Fourty.Clock skew-based physical authentication protocol for 802.15.4 IR-UWB indoor positioning
    In Proceedings of the 10th International Conference on the Internet of Things (IoT '20). Association for Computing Machinery, New York, NY, USA, Article 8, 1–8.,
  • Z. Kazemi, M. Fazeli, D. Hely and V. Beroulle. Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
    2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), Napoli, Italy, pp. 1-6,,
  • DAO Manh-Hiep; Beroulle Vincent; Kieffer, Yann; Tran Xuan-Tu. How to develop ECC-based low cost RFID tags robust against Side-Channel Attacks
    7th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM April 22-23, 2021, Hanoi, Vietnam
  • Ihab Alshaer, Brice Colombier, Christophe Deleuze, Vincent Beroulle, Paolo Maistri. Microarchitecture-aware Fault Models: Experimental Evidence and Cross-Layer Inference Methodology
    16th IEEE International Conference on Design & Technology of Integrated System in Nanoscale Era. DTIS 2021,
  • Nikolaos Foivos Polychronou, Pierre-Henri Thevenon, Maxime Puys, Vincent Beroulle. Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities
    19TH IEEE INTERREGIONAL NEWCAS CONFERENCE Newcass 2021
  • C. Bresch, R. Lysecky and D. Hély. BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers
    2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020, pp. 1606-1609
  • Aerabi, Ehsan; Hély, David; Bresch, Cyril; Papadimitriou, Athanasios; Fazeli, Mahdi. CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes
    2021, Cryptography 5, no. 2: 13
  • Johan Marconot, Florian Pebay-Peyroula, David Hély. IoT Components LifeCycle based Security Analysis
    20st Euromicro Conference on Digital System Design (DSD), september 2017.
  • G. Surya, Paolo Maistri, Sriram Sankaran. Local Clock Glitching Fault Injection with Application to the ASCON Cipher
    IEEE International Symposium on Smart Electronic Systems, iSES 2020, Chennai, India, December 14-16, 2020
  • Etienne Boespflug, Cristian Ene, Laurent Mounier, Marie-Laure Potet, Countermeasures Optimization in Multiple Fault-Injection Context
    Workshop on Fault Diagnosis and Tolerance in Cryptography, (FDTC 2020)
  • Amir Alipour, Athanasios Papadimitriou, Vincent Beroulle, Ehsan Aerabi and David Hely. “On The Performance Of Non-Profiled Differential Deep Learning Attacks Against An Aes Encryption Algorithm Protected Using A Correlated Noise Hiding Countermeasure"
    Design Automation & Test in Europe (DATE), 2020
  • Cyril Bresch, David Hély and Roman Lysecky, “Backflow: Backward Edge Control Flow Enforcement For Low End Arm Microcontrollers”,
    Design Automation & Test in Europe (DATE), 2020
  • J. Marconot, D. Hely, and F. Pebay-Peyroula, “SPN-DPUF: Substitution-Permutation Network Based Secure Circuit for Digital PUF",
    IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019
  • C. Bresch, D. Hély, S. Chollet, and I. Parissis, “TrustFlow: A Trusted Memory Support for Data Flow Integrity"
    IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019
  • P.Maistri, A Comprehensive Approach to a Trusted Test Infrastructure
    4th International Verification and Security Workshop, July 1-3, 2019
  • E. Aerabi, A. Papadimitriou, and D. Hely, “On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations,”
    25th International Symposium on On-Line Testing and Robust System Design (IOLTSD), Jul 2019
  • A. Sensaoui, D. Hely and O. Aktouf, "Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices,"
    2019 15th European Dependable Computing Conference (EDCC)
  • M. Mohammadinodoushan, B. Cambou, C. Philabaum, D. Hely and D. D. Booher, "Implementation of Password Management System Using Ternary Addressable PUF Generator,"
    2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
  • Souhir Gabsi, Vincent Beroulle, Hamdi Bilgacem, Mohsen Machhout. Architectural Choices for Implementing a Secure ECC-based Lightweight RFID Tag
    2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), Apr 2019, Gammarth-Tunis, Tunisia. pp.1-5
  • Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hély, Mahdi Fazeli. Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
    2019 IEEE 4th International Verification and Security Workshop (IVSW), Jul 2019, Rhodes Island, Greece. pp.49-54
  • Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty. Security Evaluation with an Indoor UWB Localization Open Platform: Acknowledgment Attack Case Study
    2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Sep 2019, Istanbul, Turkey. pp.1-7
  • Z. Kazemi, A. Papadimitriou, D. Hély, M. Fazeli, et V. Beroulle, “On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks,”
    2019 IEEE 4th International Verification and Security Workshop (IVSW)
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula, Athanasios Papadimitriou. Cross-layer analysis of software fault models and countermeasures against hardware fault attacks in a RISC-V processor
    Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 71, pp.102862
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula. Fault Injection on Hidden Registers in a RISC-V Rocket Processor and Software Countermeasures
    Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2019, Florence, Italy. pp.252-255, 2019
  • Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty, Guidelines for the Choice of a Wireless Secure Positioning and Communication System,
    International Workshop on Secure Internet of Things (SIoT), September 6 2018

Submitted on March 26, 2024

Updated on March 26, 2024