Cost-effective IoT/Hardware protections: Publications & Conferences

Conferences
  • Ihab Alshaer_, Brice Colombiery, Christophe Deleuze_, Vincent Beroulle_, Paolo Maistri, Microarchitecture-aware Fault Models: Experimental Evidence and Cross-Layer Inference Methodology
    16th IEEE International Conference on Design & Technology of Integrated System in Nanoscale Era. DTIS 2021
  • J. Marconot, D. Hely, F. Pebay-Peyroula. Motivation and Contribution for Novel Digital Disorder based Strong PUF Design'
    ISVLSI  2019
  • Baptiste Pestourie, Vincent Beroulle, and Nicolas Fourty.Clock skew-based physical authentication protocol for 802.15.4 IR-UWB indoor positioning
    In Proceedings of the 10th International Conference on the Internet of Things (IoT '20). Association for Computing Machinery, New York, NY, USA, Article 8, 1–8.,
  • Z. Kazemi, M. Fazeli, D. Hely and V. Beroulle. Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
    2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS), Napoli, Italy, pp. 1-6,,
  • DAO Manh-Hiep; Beroulle Vincent; Kieffer, Yann; Tran Xuan-Tu. How to develop ECC-based low cost RFID tags robust against Side-Channel Attacks
    7th EAI International Conference on Industrial Networks and Intelligent Systems, INISCOM April 22-23, 2021, Hanoi, Vietnam
  • Ihab Alshaer, Brice Colombier, Christophe Deleuze, Vincent Beroulle, Paolo Maistri. Microarchitecture-aware Fault Models: Experimental Evidence and Cross-Layer Inference Methodology
    16th IEEE International Conference on Design & Technology of Integrated System in Nanoscale Era. DTIS 2021,
  • Nikolaos Foivos Polychronou, Pierre-Henri Thevenon, Maxime Puys, Vincent Beroulle. Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities
    19TH IEEE INTERREGIONAL NEWCAS CONFERENCE Newcass 2021
  • C. Bresch, R. Lysecky and D. Hély. BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers
    2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020, pp. 1606-1609
  • Aerabi, Ehsan; Hély, David; Bresch, Cyril; Papadimitriou, Athanasios; Fazeli, Mahdi. CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes
    2021, Cryptography 5, no. 2: 13
  • Johan Marconot, Florian Pebay-Peyroula, David Hély. IoT Components LifeCycle based Security Analysis
    20st Euromicro Conference on Digital System Design (DSD), september 2017.
  • G. Surya, Paolo Maistri, Sriram Sankaran. Local Clock Glitching Fault Injection with Application to the ASCON Cipher
    IEEE International Symposium on Smart Electronic Systems, iSES 2020, Chennai, India, December 14-16, 2020
  • Etienne Boespflug, Cristian Ene, Laurent Mounier, Marie-Laure Potet, Countermeasures Optimization in Multiple Fault-Injection Context
    Workshop on Fault Diagnosis and Tolerance in Cryptography, (FDTC 2020)
  • Amir Alipour, Athanasios Papadimitriou, Vincent Beroulle, Ehsan Aerabi and David Hely. “On The Performance Of Non-Profiled Differential Deep Learning Attacks Against An Aes Encryption Algorithm Protected Using A Correlated Noise Hiding Countermeasure"
    Design Automation & Test in Europe (DATE), 2020
  • Cyril Bresch, David Hély and Roman Lysecky, “Backflow: Backward Edge Control Flow Enforcement For Low End Arm Microcontrollers”,
    Design Automation & Test in Europe (DATE), 2020
  • J. Marconot, D. Hely, and F. Pebay-Peyroula, “SPN-DPUF: Substitution-Permutation Network Based Secure Circuit for Digital PUF",
    IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019
  • C. Bresch, D. Hély, S. Chollet, and I. Parissis, “TrustFlow: A Trusted Memory Support for Data Flow Integrity"
    IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2019
  • P.Maistri, A Comprehensive Approach to a Trusted Test Infrastructure
    4th International Verification and Security Workshop, July 1-3, 2019
  • E. Aerabi, A. Papadimitriou, and D. Hely, “On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations,”
    25th International Symposium on On-Line Testing and Robust System Design (IOLTSD), Jul 2019
  • A. Sensaoui, D. Hely and O. Aktouf, "Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices,"
    2019 15th European Dependable Computing Conference (EDCC)
  • M. Mohammadinodoushan, B. Cambou, C. Philabaum, D. Hely and D. D. Booher, "Implementation of Password Management System Using Ternary Addressable PUF Generator,"
    2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)
  • Souhir Gabsi, Vincent Beroulle, Hamdi Bilgacem, Mohsen Machhout. Architectural Choices for Implementing a Secure ECC-based Lightweight RFID Tag
    2019 IEEE International Conference on Design & Test of Integrated Micro & Nano-Systems (DTS), Apr 2019, Gammarth-Tunis, Tunisia. pp.1-5
  • Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hély, Mahdi Fazeli. Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
    2019 IEEE 4th International Verification and Security Workshop (IVSW), Jul 2019, Rhodes Island, Greece. pp.49-54
  • Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty. Security Evaluation with an Indoor UWB Localization Open Platform: Acknowledgment Attack Case Study
    2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Sep 2019, Istanbul, Turkey. pp.1-7
  • Z. Kazemi, A. Papadimitriou, D. Hély, M. Fazeli, et V. Beroulle, “On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks,”
    2019 IEEE 4th International Verification and Security Workshop (IVSW)
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula, Athanasios Papadimitriou. Cross-layer analysis of software fault models and countermeasures against hardware fault attacks in a RISC-V processor
    Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2019, 71, pp.102862
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula. Fault Injection on Hidden Registers in a RISC-V Rocket Processor and Software Countermeasures
    Design, Automation & Test in Europe Conference & Exhibition (DATE), Mar 2019, Florence, Italy. pp.252-255, 2019
  • Baptiste Pestourie, Vincent Beroulle, Nicolas Fourty, Guidelines for the Choice of a Wireless Secure Positioning and Communication System,
    International Workshop on Secure Internet of Things (SIoT), September 6 2018
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan De Castro, Faber Louis-Barthelemy, et al., Laser fault injection at the CMOS 28 nm technology node: an analysis of the fault model,
    14th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), September 2018, Amsterdam, Netherlands.
  • Yassine Naija, Vincent Beroulle, Mohsen Machhout, ElectroMagnetic Attack Test Platform for Validating RFID Tag Architectures,
    Eurasip RFID 2018, Brno, Czech Republic, September 11-12, 2018
  • Johan Laurent, Vincent Beroulle, Christophe Deleuze, Florian Pebay-Peyroula and Athanasios Papadimitriou, On the Importance of Analysing Microarchitecture for Accurate Software Fault Models,
    Euromicro DSD/SEAA 2018, August 29 – 31, 2018 Prague (Czech Republic)
  • Cyril Bresch, Stéphanie Chollet, David Hély, Towards an Inherently Secure Run-Time Environment for Medical Devices,
    in 2018 IEEE International Congress on Internet of Things (ICIOT), July 2018, p. 140–147
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Louis-Barthelemy Faber, Marie-Lise Flottes et al., The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks,
    IOLTS: International Symposium on On-Line Testing and Robust System Design, Jul 2018, Platja d’Aro, Spain.
  • Zahra Kazemi, Athanasios Papadimitriou, David Hély, Mahdi Fazcli, Vincent Beroulle, Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT,
    in 2018 IEEE 3rd International Verification and Security Workshop (IVSW), July 2018, p. 87-92
  • Mosabbah Mushir Ahmed, David Hely, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Fredric Garet, Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique,
    in 2018 IEEE 3rd International Verification and Security Workshop (IVSW), July 2018, p. 25-3
  • Aymane Bouzafour, Marc Renaudin, Hubert Garavel, Radu Mateescu, Wendelin Serwe, Model-checking Synthesizable SystemVerilog Descriptions of Asynchronous Circuits,
    ASYNC'18 - 24th IEEE International Symposium on Asynchronous Circuits and Systems, May 2018, Vienne, Austria
  • Olivier Alphand, Michele Amoretti, Timothy Claeys, Simone Dall 'Asta, Andrzej Duda, Gianluigi Ferrari, Franck Rousseau, Bernard Tourancheau, Luca Veltri, Francesco Zanichelli, IoTChain: A Blockchain Security Architecture for the Internet of Things,
    IEEE Wireless Communications and Networking Conference, Apr 2018, Barcelona, Spain
  • Rahma Ben Fraj, Vincent Beroulle, Nicolas Fourty , Aref Meddeb, An approach to enhance the safety and security of EPC Class-1 generation-2 UHF RFID systems,
    2018 2nd International Conference on Inventive Systems and Control (ICISC), 19-20 Jan. 2018, Coimbatore, India INSPEC Accession Number: 17894327 , DOI: 10.1109/ICISC.2018.8398977
  • Timothy Claeys, Franck Rousseau, Bernard Tourancheau, Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment,
    International Workshop on Secure Internet of Things (SIOT), Sep 2017, Oslo, Norway
Publications
  • Gabsi, S.; Beroulle, V.; Kieffer, Y.; Dao, H.M.; Kortli, Y.; Hamdi, B. Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
    Sensors 2021, 21, 5824. https://doi.org/10.3390/ s21175824
  • Ph. Elbaz-Vincent, C. Hugounenq, S. Riou. SPAE : a mode of operation for AES on low-cost hardware
  • M. M. Ahmed, E. Perret, D. Hély, R. Siragusa, and N. Barbot,Electromagnetic Wave Technique for IC Authentication
    Sensors 2020, 20, 2041.
  • M. M. Ahmed, D. Hély, E. Perret, N. Barbot, R. Siragusa, M. Bernier, F. Garet. Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions,
    Journal of Hardware and Systems Security, pp. 1–16, 2019.
  • Kazemi, Z.; Hely, D.; Fazeli, M.; Beroulle, V.A Review on Evaluation and Configuration of Fault Injection Attack Instruments to Design Attack Resistant MCU-Based IoT Applications
    Electronics, 16 July 2020
  • C. Bresch, D. Hély, S. Chollet and R. Lysecky. SecPump: A Connected Open-Source Infusion Pump for Security Research Purposes
    IEEE Embedded Systems Letters, vol. 13, no. 1, pp. 21-24, March 2021
  • Cyril Bresch, David Hély, Roman Lysecky, Stéphanie Chollet, and Ioannis Parissis. TrustFlow-X: A Practical Framework for Fine-grained Control-flow Integrity in Critical Systems. ACM Trans
    Embed. Comput. Syst. 19, 5, Article 36 (November 2020), 26 pages.
  • B. Cambou, D. Hély, and S. Assiri,Cryptography with Analog Scheme Using Memristors
    ACM Journal of Emerging Technology Computer Systems 16, 4, Article 40 (October 2020), 30 pages.
  • E. Aerabi, M. Bohlouli, M. H. A. Livany, M. Fazeli, A. Papadimitriou, and D. Hély. Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUs,
    ACM Trans. Embed. Comput. Syst., vol. 19, no. 3, p. 19:1-19:34, 2020
  • M. Cunche and A. Ratel. IoT & Privacy - Comment assurer la confidentialité sur les réseaux sans fil ? L'exemple du BLE
  • Radu Mateescu, Wendelin Serwe, Aymane Bouzafour, and Marc Renaudin, Modeling an Asynchronous Circuit Dedicated to the Protection Against Physical Attacks
    Proceedings of the 4th Workshop on Models for Formal Analysis of Real Systems MARS'2020, Dublin, Ireland
  • Amir Alipour, David Hely, Vincent Beroulle, and Giorgio Di Natale; Power of Prediction: Advantages of Deep Learning Modeling as Replacement for Traditional PUF CRP Enrollment
    Trudevice 2020, forthcoming Mar 2020
  • Zahra Kazemi, Cyril Bresch, Mahdi Fazeli, David Hely, and Vincent Beroulle; A Systematic Approach for Hardware Security Assessment of Secured IoT Applications
    Trudevice 2020, forthcoming Mar 2020
  • Ezinam Bertrand Talaki, Mathieu Bouvier Des Noes, Olivier Savry, and David Hely; Side-channel Leakage Assessment On RISC-V Architecture
    Trudevice 2020, forthcoming Mar 2020
  • CONFISCA : SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes
    IEEE Embedded system Letters, forthcoming 2020
  • SecPump: A Connected Open Source Infusion Pump for Security Purposes
    IEEE Embedded system Letters, forthcoming 2020
  • TrustFlow-X: A Practical Framework for Fine-Grained Data Flow Integrity in Critical Systems
    ACM Transactions on Embedded Computing Systems (TECS) (submitted)
  • "Conception and Evaluation of Secure Circuits for Strong Digital PUF"
    IEEE Transactions on Computers (submitted)
  • Aerabi, Milad Bohlouli, MohammadHasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hely, « Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs »
    ACM Transactions on Embedded Computing Systems, Feb 2020
  • D. Hely, P. Flikkema and B. Cambou; “Physical Unclonable Function-Based On-Chip Data Integrity”
    Patent, submitted Jun 2019
  • D. Hely, and B. Cambou; “Secure Enrollment for PUFs”;
    Patent, submitted Jun 2019
  • Mosabbah Mushir Ahmed, David Hély, Etienne Perret and Romain Siragusa, “Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions"
    Journal of Hardware and Systems Security
  • A. Sensaoui, O.-E.-K. Aktouf, D. Hely, and S. Di Vito, “An In-depth Study of MPU-Based Isolation Techniques,”
    Journal of Hardware and Systems Security, Nov. 2019. 3: 365. https://doi.org/10.1007/s41635-019-00078-6
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan De Castro, Louis-Barthelemy Faber et al., Sensitivity to Laser Fault Injection: CMOS FD-SOI vs. CMOS bulk,
    IEEE Transactions on Device and Materials Reliability, Institute of Electrical and Electronics Engineers, 2018, DOI:10.1109/TDMR.2018.288646
  • Yassine Naija, Vincent Beroulle, Mohsen Machhout, Security Enhancements of a Mutual Authentication Protocol used in a HF Full-Fledged RFID Tag,
    Journal of Electronic Testing: Theory and Applications, June 2018, Volume 34, Issue 3, pp 291–304
  • Arash Nejat, David Hely and Vincent Beroulle, ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods,
    Journal of Hardware and Systems Security, March 2018, Volume 2, Issue 1, pp 83–96, DOI 10.1007/s41635-018-0033-6
  • Ahmed, M., Hely, D., Perret, E. et al. Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions
    Journal of Hardware Systems and Security (2019). DOI 10.1007/s41635-019-00072-y
  • E.Aerabi, A.Papadimitriou, D.Hely, On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations,
    25th IEEE International Symposium on On-Line Testing and Robust System Design, July 1-3, 2019
  • Zahra Kazemi, Athanasios Papadimitriou, Ehsan Aerabi, Mosabbah Mushir Ahmed, David Hely and Vincent Beroulle, A low Cost and Practical Framework for Security Assessment of the Cyber-Physical Systems,
    4th International Verification and Security Workshop (IVSW) July 1-3, 2019
  • Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hely (Univ. Grenoble Alpes France), and Mahdi Fazeli (Iran Univ. of Science and Technology, Iran), Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection,
    4th International Verification and Security Workshop (IVSW), July 1-3, 2019
  • Cyril Bresch, David Hely and Stephanie Chollet, TrustFlow: A Trusted Memory Support for Data Flow Integrity IEEE Computer Society Annual Symposium on VLSI, Miami, Florida, U.S.A., July 15-17, 2019
  • Johan Marconot, David Hely and Florian Pebay-Peyroula, SPN-DPUF: Substitution-Permutation Network based Secure Circuit for Digital PUF,
    IEEE Computer Society Annual Symposium on VLSI, Miami, Florida, U.S.A., July 15-17, 2019
  • Abderrahmane Sensaoui, David Hely and Oum-El-Kheir Aktouf, Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices,
    15th European Dependable Computing Conference,17-20 September 2019