Publications & Conferences

Resilient critical infrastructures for Factory 4.0

Conferences
Publications

Cryptographie

Conferences
Publications
  • Jean-Guillaume Dumas, Erich L. Kaltofen, Clément Pernet & David Lucas, Elimination-based certificates for triangular equivalence and rank profiles ,
    Journal of Symbolic Computation. 25 pages, in press., July 2019
  • Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila & Pascal Thoniel, LocalPKI: An Interoperable and IoT Friendly PKI,
    Communications in Computer and Information Science. Volume 990, pages 224--252, Feb 2019
  • Jean-Guillaume Dumas, Pascal Lafourcade, Julio Ernesto López Fenner, David Lucas, Jean-Baptiste Orfila, Clément Pernet & Maxime Puys, Secure Multi-Party Matrix Multiplication Based on Strassen-Winograd Algorithm,
    Lecture Notes in Computer Science, Advances in Information and Computer Security, Volume 11689, pages 67--88, Springer 2019
  • Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki & Hideaki Sone, Interactive Physical Zero-Knowledge Proof for Norinori,
    Lecture Notes in Computer Science, Volume 11653, pages 166--177, Springer 2019
  • Serge Fehr, Pierre Karpman, Bart Mennink, Short Non-Malleable Codes from Related-Key Secure Block Ciphers,
    IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2018, pp.336-352.
  • Jean-Guillaume Dumas, Pascal Lafourcade, Ariane Tichit and Sébastien Varrette, Les blockchains en 50 questions,
    Dunod, 304 pages, September 2018.
  • Jean-Guillaume Dumas, Jean-Louis Roch, Éric Tannier and Sébastien Varrette, Théorie des codes : Compression, Cryptage, Correction,
    Dunod, 415 pages, 3e édition, June 2018.
  • Jean-Guillaume Dumas, Pascal Lafourcade, Julio López Fenner, David Lucas, Jean-Baptiste Orfila, Clément Pernet and Maxime Puys, Secure Multi-Party Matrix Multiplication Based on Strassen-Winograd Algorithm,
    Rapport de Recherche IMAG, April 2018

Cost-effective IoT/Hardware protections

Conferences
Publications
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan De Castro, Louis-Barthelemy Faber et al., Sensitivity to Laser Fault Injection: CMOS FD-SOI vs. CMOS bulk,
    IEEE Transactions on Device and Materials Reliability, Institute of Electrical and Electronics Engineers, 2018, DOI:10.1109/TDMR.2018.288646
  • Yassine Naija, Vincent Beroulle, Mohsen Machhout, Security Enhancements of a Mutual Authentication Protocol used in a HF Full-Fledged RFID Tag,
    Journal of Electronic Testing: Theory and Applications, June 2018, Volume 34, Issue 3, pp 291–304
  • Arash Nejat, David Hely and Vincent Beroulle, ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods,
    Journal of Hardware and Systems Security, March 2018, Volume 2, Issue 1, pp 83–96, DOI 10.1007/s41635-018-0033-6
  • Ahmed, M., Hely, D., Perret, E. et al. Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions
    Journal of Hardware Systems and Security (2019). DOI 10.1007/s41635-019-00072-y
  • E.Aerabi, A.Papadimitriou, D.Hely, On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations,
    25th IEEE International Symposium on On-Line Testing and Robust System Design, July 1-3, 2019
  • Zahra Kazemi, Athanasios Papadimitriou, Ehsan Aerabi, Mosabbah Mushir Ahmed, David Hely and Vincent Beroulle, A low Cost and Practical Framework for Security Assessment of the Cyber-Physical Systems,
    4th International Verification and Security Workshop (IVSW) July 1-3, 2019
  • Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hely (Univ. Grenoble Alpes France), and Mahdi Fazeli (Iran Univ. of Science and Technology, Iran), Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection,
    4th International Verification and Security Workshop (IVSW), July 1-3, 2019
  • Cyril Bresch, David Hely and Stephanie Chollet, TrustFlow: A Trusted Memory Support for Data Flow Integrity IEEE Computer Society Annual Symposium on VLSI, Miami, Florida, U.S.A., July 15-17, 2019
  • Johan Marconot, David Hely and Florian Pebay-Peyroula, SPN-DPUF: Substitution-Permutation Network based Secure Circuit for Digital PUF,
    IEEE Computer Society Annual Symposium on VLSI, Miami, Florida, U.S.A., July 15-17, 2019
  • Abderrahmane Sensaoui, David Hely and Oum-El-Kheir Aktouf, Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices,
    15th European Dependable Computing Conference,17-20 September 2019

Cybersecurity and AI

Conferences
  • Jean-Marie Flaus, Revue des approches pour la détection d’intrusion à base de machine learning pour les systèmes de commande industriels,
    C&SAR 2018 - Intelligence Artificielle et Cybersécurité, Rennes, France, November 19-21 2018

Cybersecurity and Privacy

Publications

Prevention & Reaction to attacks

Conferences
  • Coline Boniface, Imane Fouad, Nataliia Bielova, Cédric Lauradoux, Cristiana Santos, Security Analysis of Subject Access Request procedures,
    Annual Privacy Forum 2019, Rome, Italy, June 12-14 2019
  • Karine Bannelier, Due Diligence: a Strategic Norm of Responsible Behaviour for the EU Cyber Diplomacy Toolbox?,
    Inaugural meeting of the European Cyber Diplomacy Dialogue, EU Cyber Direct, European University Institute, School of Transnational Governance, Florence, 28-29 January 2019
  • Karine Bannelier, Private Sector ‘Hack Back’: Where is The Limit?,
    OECD Open Forum CyberSecurity Best Practices, Internet Governance Forum, UNESCO, Paris, November 12th - 14th 2018
  • Karine Bannelier, ‘Don’t trust me, test me’. Analyse critique du Manuel de Tallinn 2.0,
    Conférence annuelle des conseillers juridiques, Ministère des Armées, Ecole de Guerre, Paris, September 24th 2018
  • Karine Bannelier, Between Certainty and Flexibility : Obligations of Conduct and Variability Factors in the Due Diligence Principle,
    CyCon X : Maximizing Effects, 10th International Conference on Cyber Conflict, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn, May 30th – June 1st 2018
  • Karine Bannelier, Aspects juridiques des cyber-opérations,
    Conférence des Legal Advisors (LEGAD) de l’Armée de l’air, Centre National des Opérations Aériennes (CNOA), Base aérienne 942 Lyon-Mont Verdun, May 22nd 2018
Publications

Social Impact & Regulation

Conferences
  • Delphine Deschaux-Dutard, Can the EU cope with cyber challenges? Potentials and limits of the EU cybersecurity architecture,
    International Studies Association (ISA) Convention, Toronto, March 27th - 30th 2019
  • Sabine Saurugger and Fabien Terpan, Explaining the Transformations of Law - the Cases of Migration, Cybersecurity and Economic Governance,
    Workshop on Normative Transformations in the EU, Grenoble, 18-19 october 2018
  • Theodore Christakis, Enabling International Cooperation: Evidence and Equities,
    Building Common Approaches for Cybersecurity and Privacy in a Globalized World, Transatlantic Conference, NYU Center For Cybersecurity & Humboldt Institute for Internet and Society, October 1-3 2018, New York
  • Theodore Christakis, Interview: Surveillance de masse et CEDH,
    Next INPACT, September 19th 2018
  • Karine Bannelier, Between Certainty and Flexibility : Obligations of Conduct and Variability Factors in the Due Diligence Principle,
    CyCon X : Maximizing Effects, 10th International Conference on Cyber Conflict, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn, May 30th – June 1st 2018
  • Theodore Christakis, Law Enforcement Cross-border Access to Data and Human Rights,
    CyCon X : Maximizing Effects, 10th International Conference on Cyber Conflict, NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), Tallinn, May 30th – June 1st 2018
  • Sabine Saurugger and Fabien Terpan, Explaining the Transformations of Law - the Cases of Migration, Cybersecurity and Economic Governance,
    Standing Group on European Union, European Consortium of Political Research, Paris, 12-14 April 2018
  • Sabine Saurugger and Fabien Terpan, Explaining the Transformations of Law - the Cases of Migration, Cybersecurity and Economic Governance,
    25th international conference of europeanists, Chicago, 28-30 March 2018
  • Karine Bannelier, How to Use International Law to Shape Responsible State Behavior in Cyber Space,
    Expert Level Round Table: Shaping Responsible State Behavior in Cyber Space, The German Marshall Fund of the United States, Paris, Maison de l’Amérique Latine, February 13th 2018
  • Karine Bannelier and Theodore Christakis, Masterclass Regulation of Cyber-Attacks after the Failure of the UN GGE and Wannacry,
    10th International Forum on Cybersecurity (FIC 2018), Lille, January 23rd - 24th 2018
  • Delphine Deschaux-Dutard, EU Cybersecurity and Cyberdefence Policy : Can We Cope Facing Cyber Threats?,
    UACES Conference, Krakow, September 4th - 6th 2017 (represented)
  • Delphine Deschaux-Dutard, EU and US cyber security strategies in comparison: how does strategic culture matter when it comes to cyber-security?,
    International Studies Association (ISA) Convention, Baltimore, February 23rd - 25th 2017
Publications

Software vulnerabilities

Conferences
Publications