Sledovat
Damien Couroussé
Damien Couroussé
CEA LIST
E-mailová adresa ověřena na: cea.fr - Domovská stránka
Název
Citace
Citace
Rok
Micro-architectural simulation of in-order and out-of-order arm microprocessors with gem5
FA Endo, D Couroussé, HP Charles
2014 international conference on embedded computer systems: Architectures …, 2014
772014
Micro-architectural simulation of embedded core heterogeneity with gem5 and mcpat
FA Endo, D Couroussé, HP Charles
Proceedings of the 2015 Workshop on Rapid Simulation and Performance …, 2015
632015
Compilation of a countermeasure against instruction-skip fault attacks
T Barry, D Couroussé, B Robisson
Proceedings of the Third Workshop on Cryptography and Security in Computing …, 2016
542016
A basic gesture and motion format for virtual reality multisensory applications
A Luciani, M Evrard, D Couroussé, N Castagné, C Cadoz, JL Florens
arXiv preprint arXiv:1005.4564, 2010
452010
Ergotic sounds: A new way to improve playability, believability and presence of virtual musical instruments
A Luciani, JL Florens, D Couroussé, J Castet
Journal of New Music Research 38 (3), 309-323, 2009
392009
Automated software protection for the masses against side-channel attacks
N Belleville, D Couroussé, K Heydemann, HP Charles
ACM Transactions on Architecture and Code Optimization (TACO) 15 (4), 1-27, 2018
372018
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
D Couroussé, T Barry, B Robisson, P Jaillon, O Potin, JL Lanet
10th WISTP International Conference on Information Security Theory and …, 2016
302016
deGoal a Tool to Embed Dynamic Code Generators into Applications
HP Charles, D Couroussé, V Lomüller, FA Endo, R Gauguey
Compiler Construction: 23rd International Conference, CC 2014, Held as Part …, 2014
252014
Ergotic sounds: A new way to improve playability, believability and presence of digital musical instruments
A Luciani, JL Florens, D Couroussé, C Cadoz
Proceedings of the 4th International Conference on Enactive Interfaces, 373-376, 2007
252007
Deep Learning Side-Channel Analysis on Large-Scale Traces: A Case Study on a Polymorphic AES
L Masure, N Belleville, E Cagli, MA Cornelie, D Couroussé, C Dumas, ...
European Symposium on Research in Computer Security, 440-460, 2020
242020
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures
KM Abdellatif, D Couroussé, O Potin, P Jaillon
Proceedings of the Fourth Workshop on Cryptography and Security in Computing …, 2017
162017
Exploration of fault effects on formal RISC-V microarchitecture models
S Tollec, M Asavoae, D Couroussé, K Heydemann, M Jan
2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 73-83, 2022
142022
A template attack against VERIFY PIN algorithms
H Le Bouder, T Barry, D Couroussé, JL Lanet, R Lashermes
SECRYPT 2016, 231-238, 2016
142016
SCI-FI: Control signal, code, and control flow integrity against fault injection attacks
T Chamelot, D Couroussé, K Heydemann
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 556-559, 2022
112022
Automatic application of software countermeasures against physical attacks
N Belleville, K Heydemann, D Couroussé, T Barry, B Robisson, A Seriai, ...
Cyber-Physical Systems Security, 135-155, 2018
102018
Fault-resistant partitioning of secure cpus for system co-verification against faults
S Tollec, V Hadži, P Nasahl, M Asavoae, R Bloem, D Couroussé, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (4 …, 2024
92024
Method of encryption with dynamic diffusion and confusion layers
H Noura, D Courousse
US Patent 10,903,978, 2021
92021
MAFIA: Protecting the microarchitecture of embedded systems against fault injection attacks
T Chamelot, D Couroussé, K Heydemann
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2023
82023
Idols with Feet of clay: on the security of bootloaders and firmware updaters for the IoT
L Morel, D Couroussé
2019 17th IEEE International New Circuits and Systems Conference (NEWCAS), 1-4, 2019
82019
Software acceleration of floating-point multiplication using runtime code generation—Student paper
C Aracil, D Couroussé
2013 4th Annual International Conference on Energy Aware Computing Systems …, 2013
72013
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20