My research interests span the areas of hardware security, embedded system security and trusted computing. I have a specific interest in hardware support for system security, security evaluation of embedded system and secure Integrated circuit design and verification.
PhD in Computer Engineering, 2005
Univ. Montpellier
MEng in Electrical and Computer Engineering, 2002
National Institute of Applied Sciences, Lyon
Hardware Support for Software Security
Software bugs, memory corruptions-based attacks and malicious (or natural) at the hardware level can modify either the control flow or the data flow of a program inducing major vulnerabilities. We thus aim at providing hardware-based mechanisms to increase the trust in software execution. With a focus on resource constrained devices used in critical application, the mechanisms are optimized to minimize their footprints but also to be easily integrated at the software level (minimizing or avoiding dedicated software).
Recent publications in the topic:Hardware Threat Modeling and Countermeasures Design and Validation:
Side channel attacks, fault attacks have been proven to be efficient against embedded system security in order to either reveal secret information or to hijack a system. As a result, IC designers and software developers need tools to quickly evaluate their systems against such threats and to validate their countermeasures. Our work aims thus at developing tools to assist hardware designers and software developers in hardware security evaluation. Meantime, we propose optimized countermeasures to overcome such threats.
Recent publications in the topic:System-On Chip and Embedded Systems Life Cycle Security
Trust management through the whole life cycle requires to guarantee the trustworthiness of the device and components but also to manage the stakeholders authentication and access rights (which might change through le life cycle). Physically Unclonable Functions provide valuable hardware primitives to build efficient secure services such authentication schemes. Nevertheless, there are still challenges to address at both hardware and system levels to ease the integration of PUF based security mechanisms. We are notably working on different efficient and robust PUF primitives but also working on the system integration of PUF within secure schemes (from enrollment to use in mission mode).
Recent publications in the topic:I am teaching the following courses at Grenoble INP Esisar:
+++