Embedded systems are used in several domains and are parts of our daily life : we use them when we use our smartphones or when we drive our modern cars embeddingGPS, light/rain sensors and other electronic assistance mechanisms. These systems process sensitive data (such as credit card numbers, critical information about the host system and so on) which must be protected against external attacks as these data are transmitted through a communication link where the attacker can connect to extract sensitive information or inject malicious code within the system. Unfortunately, embedded systems containmore andmore components which make more and more security breaches that can be exploited to provoke attacks. One of the goals of this thesis is t...
Cooperative intelligent transportation systems (C-ITS) have the opportunity to enhance road safety, ...
Whether in automotive with heat stress or in aerospace and nuclear field subjected to cosmic,neutron...
The always increasing performance demands of applications such as cryptography, scientific simulatio...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Web services allow the communication of heterogeneous systems on the Web. These facilities make them...
Even if a cryptographic algortihm could be mathematically secure, its physical implementation could ...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
Face identification systems are growing rapidly and invade the consumer market with security product...
The power supply current of a smart card exhibits significant correlations with the data processed b...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Cooperative intelligent transportation systems (C-ITS) have the opportunity to enhance road safety, ...
Whether in automotive with heat stress or in aerospace and nuclear field subjected to cosmic,neutron...
The always increasing performance demands of applications such as cryptography, scientific simulatio...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
This thesis focuses on the security of embedded programs against fault injection attacks. Due to the...
Side-channel attacks are the most efficient attacks against cryptosystems. While the classical black...
Web services allow the communication of heterogeneous systems on the Web. These facilities make them...
Even if a cryptographic algortihm could be mathematically secure, its physical implementation could ...
Implementations of cryptosystems are vulnerable to physical attacks, and thus need to be protected a...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
Face identification systems are growing rapidly and invade the consumer market with security product...
The power supply current of a smart card exhibits significant correlations with the data processed b...
Since the late 90s, the implementation of cryptosystems on smart card faces two kinds of attacks : s...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
Security protocols are programs that secure communications by defining exchange rules on a network. ...
Cooperative intelligent transportation systems (C-ITS) have the opportunity to enhance road safety, ...
Whether in automotive with heat stress or in aerospace and nuclear field subjected to cosmic,neutron...
The always increasing performance demands of applications such as cryptography, scientific simulatio...