National audienceAmong other threats, secure components are subjected to physical attacks whose aim is to recover the secret information they store. Most of the work carried out to protect these components generally consists in developing protections (or countermeasures) taken one by one. But this ``countermeasure-centered'' approach drastically decreases the performance of the chip in terms of power, speed and availability. In order to overcome this limitation, we propose a complementary approach: smart dynamic management of the whole set of countermeasures embedded in the component. Two main specifications for such management are required in a real world application (for example, a conditional access system for Pay-TV): it has to provide...
Abstract — As the demand on smart cards is increasing nowadays, a whole family of attacks are also p...
Remote attestation is the process of securely verifying internal state of a remote hardware platform...
Many zero-day and polymorphic cyberattacks effectively evade signature-based defenses. This thesis b...
International audienceAmong other threats, secure components are subjected tophysical attacks whose ...
International audienceAmong other threats, secure components are subjected to physical attacks whose...
International audienceAmong other threats, secure components aresubjected to physical attacks whose ...
National audienceAmong other threats, secure components are subjected to physical attacks whose aim ...
Among other threats, secure components are subjected to physical attacks whose aim is to recover the...
Abstract. Among other threats, secure components are subjected to physical attacks whose aim is to r...
International audienceSecure components are subject to physical attacks whose aim is to recover the ...
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructi...
Remote attestation is the process of securely veri-fying internal state of a remote hardware platfor...
Abstract — As the demand on smart cards is increasing nowadays, a whole family of attacks are also p...
Remote attestation is the process of securely verifying internal state of a remote hardware platform...
Many zero-day and polymorphic cyberattacks effectively evade signature-based defenses. This thesis b...
International audienceAmong other threats, secure components are subjected tophysical attacks whose ...
International audienceAmong other threats, secure components are subjected to physical attacks whose...
International audienceAmong other threats, secure components aresubjected to physical attacks whose ...
National audienceAmong other threats, secure components are subjected to physical attacks whose aim ...
Among other threats, secure components are subjected to physical attacks whose aim is to recover the...
Abstract. Among other threats, secure components are subjected to physical attacks whose aim is to r...
International audienceSecure components are subject to physical attacks whose aim is to recover the ...
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructi...
Remote attestation is the process of securely veri-fying internal state of a remote hardware platfor...
Abstract — As the demand on smart cards is increasing nowadays, a whole family of attacks are also p...
Remote attestation is the process of securely verifying internal state of a remote hardware platform...
Many zero-day and polymorphic cyberattacks effectively evade signature-based defenses. This thesis b...