default search action
David Hély
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c80]Amalia-Artemis Koufopoulou, Athanasios Papadimitriou, Mihalis Psarakis, David Hély:
Automated Hardware Security Countermeasure Integration Inside High Level Synthesis. DATE 2024: 1-2 - [c79]Aghiles Douadi, Elena Ioana Vatajelu, Paolo Maistri, David Hély, Vincent Beroulle, Giorgio Di Natale:
Modeling Thermal Effects For Biasing PUFs. ETS 2024: 1-4 - 2023
- [c78]Amalia-Artemis Koufopoulou, Athanasios Papadimitriou, Aggelos Pikrakis, Mihalis Psarakis, David Hély:
On the Prediction of Hardware Security Properties of HLS Designs Using Graph Neural Networks. DFT 2023: 1-6 - [i5]Amalia-Artemis Koufopoulou, Kalliopi Xevgeni, Athanasios Papadimitriou, Mihalis Psarakis, David Hély:
Security and Reliability Evaluation of Countermeasures implemented using High-Level Synthesis. CoRR abs/2312.06268 (2023) - [i4]Amalia-Artemis Koufopoulou, Athanasios Papadimitriou, Aggelos Pikrakis, Mihalis Psarakis, David Hély:
On the Prediction of Hardware Security Properties of HLS Designs Using Graph Neural Networks. CoRR abs/2312.07594 (2023) - 2022
- [j27]Amir Ali Pour, Fatemeh Afghah, David Hély, Vincent Beroulle, Giorgio Di Natale, Ashwija Reddy Korenda, Bertrand Cambou:
Helper Data Masking for Physically Unclonable Function-Based Key Generation Algorithms. IEEE Access 10: 40150-40164 (2022) - [j26]Amin Norollah, Zahra Kazemi, Hakem Beitollahi, David Hély:
Hardware Support for Efficient and Low-Power Data Sorting in Massive Data Application: The 3-D Sorting Method. IEEE Consumer Electron. Mag. 11(3): 87-94 (2022) - [j25]Ezinam Bertrand Talaki, Olivier Savry, Mathieu Bouvier Des Noes, David Hély:
A Memory Hierarchy Protected against Side-Channel Attacks. Cryptogr. 6(2): 19 (2022) - [j24]Arthur Desuert, Stéphanie Chollet, Laurent Pion, David Hély:
Refillable PUF authentication protocol for constrained devices. J. Ambient Intell. Smart Environ. 14(3): 195-212 (2022) - [j23]Ehsan Aerabi, Mahdi Fazeli, David Hély:
CyEnSe: Cyclic energy-aware scheduling for energy-harvested embedded systems. Microprocess. Microsystems 89: 104421 (2022) - [c77]Amir Ali Pour, David Hély, Vincent Beroulle, Giorgio Di Natale:
Elaborating on Sub-Space Modeling as an Enrollment Solution for Strong PUF. DCOSS 2022: 394-399 - [c76]Arthur Desuert, Stéphanie Chollet, Laurent Pion, David Hély:
A Middleware for Secure Integration of Heterogeneous Edge Devices. EDGE 2022: 83-92 - [c75]Amalia-Artemis Koufopoulou, Kalliopi Xevgeni, Athanasios Papadimitriou, Mihalis Psarakis, David Hély:
Security and Reliability Evaluation of Countermeasures implemented using High-Level Synthesis. IOLTS 2022: 1-8 - [c74]Zahra Kazemi, Amin Norollah, Mahdi Fazeli, David Hély, Vincent Beroulle:
An Offline Hardware Security Assessment Approach using Symbol Assertion and Code Shredding. ISQED 2022: 1 - [c73]Amir Ali Pour, David Hély, Vincent Beroulle, Giorgio Di Natale:
Sub-Space Modeling: An Enrollment Solution for XOR Arbiter PUF using Machine Learning. ISQED 2022: 1 - [c72]Amir Ali Pour, David Hély, Vincent Beroulle, Giorgio Di Natale:
An Efficient Approach to Model Strong PUF with Multi-Layer Perceptron using Transfer Learning. ISQED 2022: 1-6 - [c71]Amir Ali Pour, Fatemeh Afghah, David Hély, Vincent Beroulle, Giorgio Di Natale:
Secure PUF-based Authentication and Key Exchange Protocol using Machine Learning. ISVLSI 2022: 386-389 - 2021
- [j22]Ehsan Aerabi, David Hély, Cyril Bresch, Athanasios Papadimitriou, Mahdi Fazeli:
CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes. Cryptogr. 5(2): 13 (2021) - [j21]Cyril Bresch, David Hély, Stéphanie Chollet, Roman Lysecky:
SecPump: A Connected Open-Source Infusion Pump for Security Research Purposes. IEEE Embed. Syst. Lett. 13(1): 21-24 (2021) - [j20]Florent Bonnefoy, Maxime Bernier, Etienne Perret, Nicolas Barbot, Romain Siragusa, David Hély, Eiji Kato, Frédéric Garet:
Video-Rate Identification of High-Capacity Low-Cost Tags in the Terahertz Domain. Sensors 21(11): 3692 (2021) - [c70]Romain Liévin, Jean-Paul Jamont, David Hély:
CLASA : a Cross-Layer Agent Security Architecture for networked embedded systems. COINS 2021: 1-8 - [c69]Zahra Kazemi, Amin Norollah, Afef Kchaou, Mahdi Fazeli, David Hély, Vincent Beroulle:
An In-Depth Vulnerability Analysis of RISC-V Micro-Architecture Against Fault Injection Attack. DFT 2021: 1-6 - [c68]Antoine Linarès, David Hély, Frank Lhermet, Giorgio Di Natale:
Design Space Exploration Applied to Security. DTIS 2021: 1-4 - [c67]Amin Norollah, Zahra Kazemi, Niloufar Sayadi, Hakem Beitollahi, Mahdi Fazeli, David Hély:
Efficient Scheduling of Dependent Tasks in Many-Core Real-Time System Using a Hardware Scheduler. HPEC 2021: 1-7 - [c66]Arthur Desuert, Stéphanie Chollet, Laurent Pion, David Hély:
PUF-Based Protocol for Securing Constrained Devices. Intelligent Environments 2021: 1-8 - 2020
- [j19]Bertrand Cambou, David Hély, Sareh Assiri:
Cryptography with Analog Scheme Using Memristors. ACM J. Emerg. Technol. Comput. Syst. 16(4): 40:1-40:30 (2020) - [j18]Mosabbah Mushir Ahmed, Etienne Perret, David Hély, Romain Siragusa, Nicolas Barbot:
Guided Electromagnetic Wave Technique for IC Authentication. Sensors 20(7): 2041 (2020) - [j17]Johan Marconot, David Hély, Florian Pebay-Peyroula:
Conception and Evaluation of Secure Circuits for Strong Digital PUF. SN Comput. Sci. 1(5): 259 (2020) - [j16]Ehsan Aerabi, Milad Bohlouli, Mohammad Hasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hély:
Design Space Exploration for Ultra-Low-Energy and Secure IoT MCUs. ACM Trans. Embed. Comput. Syst. 19(3): 19:1-19:34 (2020) - [j15]Cyril Bresch, David Hély, Roman Lysecky, Stéphanie Chollet, Ioannis Parissis:
TrustFlow-X: A Practical Framework for Fine-grained Control-flow Integrity in Critical Systems. ACM Trans. Embed. Comput. Syst. 19(5): 36:1-36:26 (2020) - [c65]Amir Alipour, Athanasios Papadimitriou, Vincent Beroulle, Ehsan Aerabi, David Hély:
On the Performance of Non-Profiled Differential Deep Learning Attacks against an AES Encryption Algorithm Protected using a Correlated Noise Generation based Hiding Countermeasure. DATE 2020: 614-617 - [c64]Cyril Bresch, Roman Lysecky, David Hély:
BackFlow: Backward Edge Control Flow Enforcement for Low End ARM Microcontrollers. DATE 2020: 1606-1609 - [c63]Athanasios Papadimitriou, Konstantinos Nomikos, Mihalis Psarakis, Ehsan Aerabi, David Hély:
You can detect but you cannot hide: Fault Assisted Side Channel Analysis on Protected Software-based Block Ciphers. DFT 2020: 1-6 - [c62]Amir Alipour, Vincent Beroulle, Bertrand Cambou, Jean-Luc Danger, Giorgio Di Natale, David Hély, Sylvain Guilley, Naghmeh Karimi:
PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community. ETS 2020: 1-10 - [c61]Francesco Regazzoni, Shivam Bhasin, Amir Alipour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, Vincent Beroulle, Giorgio Di Natale, Paul D. Franzon, David Hély, Naofumi Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, Ilia Polian, Seetal Potluri, Rei Ueno, Elena Ioana Vatajelu, Ville Yli-Mäyry:
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-. ICCAD 2020: 141:1-141:6 - [c60]Zahra Kazemi, Mahdi Fazeli, David Hély, Vincent Beroulle:
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application. IOLTS 2020: 1-6 - [c59]Amin Norollah, Zahra Kazemi, David Hély:
3D-Sorter: 3D Design of a Resource-Aware Hardware Sorter for Edge Computing Platforms Under Area and Energy Consumption Constraints. ISVLSI 2020: 42-47 - [c58]Yuxuan Zhu, Bertrand Cambou, David Hély, Sareh Assiri:
Extended Protocol Using Keyless Encryption Based on Memristors. SAI (3) 2020: 494-510 - [i3]Ehsan Aerabi, Milad Bohlouli, Mohammad Hasan Ahmadi Livany, Mahdi Fazeli, Athanasios Papadimitriou, David Hély:
Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs. IACR Cryptol. ePrint Arch. 2020: 218 (2020) - [i2]Ehsan Aerabi, Athanasios Papadimitriou, David Hély:
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations. IACR Cryptol. ePrint Arch. 2020: 250 (2020)
2010 – 2019
- 2019
- [j14]Mosabbah Mushir Ahmed, David Hély, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Frédéric Garet:
Robust and Noninvasive IC Authentication Using Radiated Electromagnetic Emissions. J. Hardw. Syst. Secur. 3(3): 273-288 (2019) - [j13]Abderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hély, Stephane Di Vito:
An In-depth Study of MPU-Based Isolation Techniques. J. Hardw. Syst. Secur. 3(4): 365-381 (2019) - [c57]Abderrahmane Sensaoui, David Hély, Oum-El-Kheir Aktouf:
Toubkal: A Flexible and Efficient Hardware Isolation Module for Secure Lightweight Devices. EDCC 2019: 31-38 - [c56]Ehsan Aerabi, Athanasios Papadimitriou, David Hély:
On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations. IOLTS 2019: 103-108 - [c55]Abderrahmane Sensaoui, Oum-El-Kheir Aktouf, David Hély:
SHCoT: Secure (and Verified) Hybrid Chain of Trust to Protect from Malicious Software in LightWeight Devices. ISSRE Workshops 2019: 434-439 - [c54]Johan Marconot, David Hély, Florian Pebay-Peyroula:
SPN-DPUF: Substitution-Permutation Network Based Secure Circuit for Digital PUF. ISVLSI 2019: 49-54 - [c53]Cyril Bresch, David Hély, Stéphanie Chollet, Ioannis Parissis:
TrustFlow: A Trusted Memory Support for Data Flow Integrity. ISVLSI 2019: 308-313 - [c52]Zahra Kazemi, Athanasios Papadimitriou, Ioanna Souvatzoglou, Ehsan Aerabi, Mosabbah Mushir Ahmed, David Hély, Vincent Beroulle:
On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks. IVSW 2019: 7-12 - [c51]Arash Nejat, Zahra Kazemi, Vincent Beroulle, David Hély, Mahdi Fazeli:
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection. IVSW 2019: 49-54 - [c50]Mohammad Mohammadinodoushan, Bertrand Cambou, Christopher Robert Philabaum, David Hély, Duane Booher:
Implementation of Password Management System Using Ternary Addressable PUF Generator. SECON 2019: 1-8 - 2018
- [j12]Cyril Bresch, David Hély, Athanasios Papadimitriou, Adrien Michelet-Gignoux, Laurent Amato, Thomas Meyer:
Stack Redundancy to Thwart Return Oriented Programming in Embedded Systems. IEEE Embed. Syst. Lett. 10(3): 87-90 (2018) - [j11]M. A. Nourian, Mahdi Fazeli, David Hély:
Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing. J. Electron. Test. 34(4): 461-470 (2018) - [j10]Arash Nejat, David Hély, Vincent Beroulle:
ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods. J. Hardw. Syst. Secur. 2(1): 83-96 (2018) - [c49]Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan De Castro, Louis-Barthelemy Faber, Marie-Lise Flottes, Philippe Gendrier, David Hély, Régis Leveugle, Paolo Maistri, Giorgio Di Natale, Athanasios Papadimitriou, Bruno Rouzeyre:
Laser Fault Injection at the CMOS 28 nm Technology Node: an Analysis of the Fault Model. FDTC 2018: 1-6 - [c48]Cyril Bresch, Stéphanie Chollet, David Hély:
Towards an Inherently Secure Run-Time Environment for Medical Devices. ICIOT 2018: 140-147 - [c47]Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Louis-Barthelemy Faber, Marie-Lise Flottes, Philippe Gendrier, David Hély, Régis Leveugle, Paolo Maistri, Giorgio Di Natale, Athanasios Papadimitriou, Bruno Rouzeyre:
The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks. IOLTS 2018: 214-219 - [c46]Mosabbah Mushir Ahmed, David Hély, Etienne Perret, Nicolas Barbot, Romain Siragusa, Maxime Bernier, Frédéric Garet:
Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique. IVSW 2018: 25-30 - [c45]Zahra Kazemi, Athanasios Papadimitriou, David Hély, Mahdi Fazeli, Vincent Beroulle:
Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT. IVSW 2018: 87-92 - 2017
- [j9]Brice Colombier, Lilian Bossuet, Viktor Fischer, David Hély:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. IEEE Trans. Inf. Forensics Secur. 12(8): 1988-2002 (2017) - [j8]Jerry Backer, David Hély, Ramesh Karri:
Secure and Flexible Trace-Based Debugging of Systems-on-Chip. ACM Trans. Design Autom. Electr. Syst. 22(2): 31:1-31:25 (2017) - [c44]Jeremy Dubeuf, David Hély, Vincent Beroulle:
Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors. COSADE 2017: 65-82 - [c43]Johan Marconot, Florian Pebay-Peyroula, David Hély:
IoT Components LifeCycle Based Security Analysis. DSD 2017: 295-298 - [c42]Brice Colombier, Lilian Bossuet, Ugo Mureddu, David Hély:
A comprehensive hardware/software infrastructure for IP cores design protection. FPT 2017: 263-266 - [c41]Brice Colombier, Lilian Bossuet, David Hély:
Centrality Indicators for Efficient and Scalable Logic Masking. ISVLSI 2017: 98-103 - [c40]Cyril Bresch, Adrien Michelet, Laurent Amato, Thomas Meyer, David Hély:
A red team blue team approach towards a secure processor design with hardware shadow stack. IVSW 2017: 57-62 - 2016
- [j7]Noemie Beringuier-Boher, Vincent Beroulle, David Hély, Joel Damiens, Philippe Candelier:
Clock generator behavioral modeling for supply voltage glitch attack effects analysis. Microprocess. Microsystems 47: 37-43 (2016) - [j6]Brice Colombier, Lilian Bossuet, David Hély:
From secured logic to IP protection. Microprocess. Microsystems 47: 44-54 (2016) - [j5]Athanasios Papadimitriou, David Hély, Vincent Beroulle, Paolo Maistri, Régis Leveugle:
Analysis of laser-induced errors: RTL fault models versus layout locality characteristics. Microprocess. Microsystems 47: 64-73 (2016) - [j4]Xiaofei Guo, Chenglu Jin, Chi Zhang, Athanasios Papadimitriou, David Hély, Ramesh Karri:
Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults? IEEE Trans. Emerg. Top. Comput. 4(3): 363-373 (2016) - [j3]Jeremy Dubeuf, David Hély, Vincent Beroulle:
ECDSA Passive Attacks, Leakage Sources, and Common Design Mistakes. ACM Trans. Design Autom. Electr. Syst. 21(2): 31:1-31:24 (2016) - [c39]Charalampos Ananiadis, Athanasios Papadimitriou, David Hély, Vincent Beroulle, Paolo Maistri, Régis Leveugle:
On the development of a new countermeasure based on a laser attack RTL fault model. DATE 2016: 445-450 - [c38]Yassine Naija, Vincent Beroulle, David Hély, Mohsen Machhout:
Implementation of a secured digital ultralight 14443-type A RFID tag with an FPGA platform. DTIS 2016: 1-3 - [c37]Seyyed Mohammad Saleh Samimi, Ehsan Aerabi, Arash Nejat, Mahdi Fazeli, David Hély, Vincent Beroulle:
High output hamming-distance achievement by a greedy logic masking approach. EWDTS 2016: 1-4 - [c36]Arash Nejat, David Hély, Vincent Beroulle:
How logic masking can improve path delay analysis for Hardware Trojan detection. ICCD 2016: 424-427 - [c35]Romain Champon, Vincent Beroulle, Athanasios Papadimitriou, David Hély, Gilles Genévrier, Frédéric Cézilly:
Comparison of RTL fault models for the robustness evaluation of aerospace FPGA devices. IOLTS 2016: 23-24 - [c34]Arash Nejat, David Hély, Vincent Beroulle:
Reusing logic masking to facilitate path-delay-based hardware Trojan detection. IOLTS 2016: 191-192 - [c33]Régis Leveugle, A. Chahed, Paolo Maistri, Athanasios Papadimitriou, David Hély, Vincent Beroulle:
On fault injections for early security evaluation vs. laser-based attacks. IVSW 2016: 1-6 - [i1]Brice Colombier, Lilian Bossuet, David Hély, Viktor Fischer:
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. IACR Cryptol. ePrint Arch. 2016: 939 (2016) - 2015
- [c32]Jerry Backer, David Hély, Ramesh Karri:
On enhancing the debug architecture of a system-on-chip (SoC) to detect software attacks. DFTS 2015: 29-34 - [c31]Athanasios Papadimitriou, Marios Tampas, David Hély, Vincent Beroulle, Paolo Maistri, Régis Leveugle:
Validation of RTL laser fault injection model with respect to layout information. HOST 2015: 78-81 - [c30]Arash Nejat, David Hély, Vincent Beroulle:
Facilitating side channel analysis by obfuscation for Hardware Trojan detection. IDT 2015: 129-134 - [c29]Jerry Backer, Sk Subidh Ali, Kurt Rosenfeld, David Hély, Ozgur Sinanoglu, Ramesh Karri:
A secure design-for-test infrastructure for lifetime security of SoCs. ISCAS 2015: 37-40 - [c28]Brice Colombier, Lilian Bossuet, David Hély:
Reversible Denial-of-Service by Locking Gates Insertion for IP Cores Design Protection. ISVLSI 2015: 210-215 - [c27]Jerry Backer, David Hély, Ramesh Karri:
Secure design-for-debug for Systems-on-Chip. ITC 2015: 1-8 - 2014
- [c26]Athanasios Papadimitriou, David Hély, Vincent Beroulle, Paolo Maistri, Régis Leveugle:
A multiple fault injection methodology based on cone partitioning towards RTL modeling of laser attacks. DATE 2014: 1-4 - [c25]Omar Abdelmalek, David Hély, Vincent Beroulle:
Emulation based fault injection on UHF RFID transponder. DDECS 2014: 254-257 - [c24]Jerry Backer, David Hély, Ramesh Karri:
Reusing the IEEE 1500 design for test infrastructure for security monitoring of Systems-on-Chip. DFT 2014: 52-56 - [c23]Noemie Beringuier-Boher, Kamil Gomina, David Hély, Jean-Baptiste Rigaud, Vincent Beroulle, Assia Tria, Joel Damiens, Philippe Gendrier, Philippe Candelier:
Voltage Glitch Attacks on Mixed-Signal Systems. DSD 2014: 379-386 - [c22]Pierre Vanhauwaert, Paolo Maistri, Régis Leveugle, Athanasios Papadimitriou, David Hély, Vincent Beroulle:
On error models for RTL security evaluations. DTIS 2014: 1-6 - [c21]Omar Abdelmalek, David Hély, Vincent Beroulle:
Fault tolerance evaluation of RFID tags. LATW 2014: 1-6 - [c20]Régis Leveugle, Paolo Maistri, Pierre Vanhauwaert, Feng Lu, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Athanasios Papadimitriou, David Hély, Vincent Beroulle, Guillaume Hubert, Stephan De Castro, Jean-Max Dutertre, Alexandre Sarafianos, Noemie Boher, Mathieu Lisart, Joel Damiens, Philippe Candelier, Clément Tavernier:
Laser-induced fault effects in security-dedicated circuits. VLSI-SoC 2014: 1-6 - [c19]Vincent Beroulle, Philippe Candelier, Stephan De Castro, Giorgio Di Natale, Jean-Max Dutertre, Marie-Lise Flottes, David Hély, Guillaume Hubert, Régis Leveugle, Feng Lu, Paolo Maistri, Athanasios Papadimitriou, Bruno Rouzeyre, Clément Tavernier, Pierre Vanhauwaert:
Laser-Induced Fault Effects in Security-Dedicated Circuits. VLSI-SoC (Selected Papers) 2014: 220-240 - 2013
- [c18]Omar Abdelmalek, David Hély, Vincent Beroulle:
EPC Class 1 GEN 2 UHF RFID tag emulator for robustness evaluation and improvement. DTIS 2013: 20-24 - [c17]Jeremy Dubeuf, David Hély, Ramesh Karri:
Run-time detection of hardware Trojans: The processor protection unit. ETS 2013: 1-6 - [c16]Omar Abdelmalek, David Hély, Vincent Beroulle, Ibrahim Mezzah:
An UHF RFID emulation platform with fault injection and real time monitoring capabilities. IDT 2013: 1-2 - [c15]Ibrahim Mezzah, Omar Kermia, Hamimi Chemali, Omar Abdelmalek, Vincent Beroulle, David Hély:
Assertion based on-line fault detection applied on UHF RFID tag. IDT 2013: 1-5 - [c14]Noemie Beringuier-Boher, David Hély, Vincent Beroulle, Joel Damiens, Philippe Candelier:
Increasing the security level of analog IPs by using a dedicated vulnerability analysis methodology. ISQED 2013: 531-537 - [c13]David Hély, Julien Martin, Gerson Dario Piraquive Triana, Simon Piroux Mounier, Elie Riviere, Thibault Sahuc, Jeremy Savonet, Laura Soundararadjou:
Experiences in side channel and testing based Hardware Trojan detection. VTS 2013: 1-4 - 2012
- [c12]Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hély:
Evaluation of a new RFID system performance monitoring approach. DATE 2012: 1439-1442 - [c11]David Hély, Maurin Augagneur, Yves Clauzel, Jeremy Dubeuf:
Malicious key emission via hardware Trojan against encryption system. ICCD 2012: 127-130 - [c10]David Hély, Maurin Augagneur, Yves Clauzel, Jeremy Dubeuf:
A physical unclonable function based on setup time violation. ICCD 2012: 135-138 - 2011
- [j2]Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, Minh Duc Nguyen, David Hély:
RFID System On-line Testing Based on the Evaluation of the Tags Read-Error-Rate. J. Electron. Test. 27(3): 267-276 (2011) - [c9]David Hély, Vincent Beroulle, Feng Lu, José Ramón García Oya:
Towards an unified IP verification and robustness analysis platform. DDECS 2011: 53-58 - [c8]Minh-Duc Nguyen, Gilles Fritz, Oum-El-Kheir Aktouf, Vincent Beroulle, David Hély:
Towards middleware-based fault-tolerance in RFID systems. EWDC 2011: 49-52 - [c7]Gilles Fritz, Boutheina Maaloul, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hély:
Read rate profile monitoring for defect detection in RFID Systems. RFID-TA 2011: 89-94 - [c6]Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hély:
SystemC modeling of RFID systems for robustness analysis. SoftCOM 2011: 1-5
2000 – 2009
- 2007
- [j1]David Hély, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre:
Securing Scan Control in Crypto Chips. J. Electron. Test. 23(5): 457-464 (2007) - 2006
- [c5]David Hély, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre:
A secure scan design methodology. DATE 2006: 1177-1178 - [c4]David Hély, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre:
Secure Scan Techniques: A Comparison. IOLTS 2006: 119-124 - [c3]David Hély, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre:
Scan Pattern Watermarking. LATW 2006: 63-67 - 2005
- [c2]David Hély, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre:
Test control for secure scan designs. ETS 2005: 190-195 - 2004
- [c1]David Hély, Marie-Lise Flottes, Frédéric Bancel, Bruno Rouzeyre, Nicolas Bérard, Michel Renovell:
Scan Design and Secure Chip. IOLTS 2004: 219-226
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint