David Hely
Home
Publications
Research
Teaching
Contact
Vincent Beroulle
Latest
ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods
Laser fault injection at the CMOS 28 nm technology node: an analysis of the fault model
The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks
Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors
Analysis of laser-induced errors: RTL fault models versus layout locality characteristics
Clock generator behavioral modeling for supply voltage glitch attack effects analysis
Comparison of RTL fault models for the robustness evaluation of aerospace FPGA devices
ECDSA Passive Attacks, Leakage Sources, and Common Design Mistakes
High output hamming-distance achievement by a greedy logic masking approach
How logic masking can improve path delay analysis for Hardware Trojan detection
Implementation of a secured digital ultralight 14443-type A RFID tag with an FPGA platform
On fault injections for early security evaluation vs. laser-based attacks
On the development of a new countermeasure based on a laser attack RTL fault model
Reusing logic masking to facilitate path-delay-based hardware Trojan detection
Facilitating side channel analysis by obfuscation for Hardware Trojan detection
Validation of RTL laser fault injection model with respect to layout information
A multiple fault injection methodology based on cone partitioning towards RTL modeling of laser attacks
Emulation based fault injection on UHF RFID transponder
Fault tolerance evaluation of RFID tags
Laser-Induced Fault Effects in Security-Dedicated Circuits
Laser-induced fault effects in security-dedicated circuits
On error models for RTL security evaluations
Voltage Glitch Attacks on Mixed-Signal Systems
An UHF RFID emulation platform with fault injection and real time monitoring capabilities
Assertion based on-line fault detection applied on UHF RFID tag
EPC Class 1 GEN 2 UHF RFID tag emulator for robustness evaluation and improvement
Increasing the security level of analog IPs by using a dedicated vulnerability analysis methodology
Evaluation of a new RFID system performance monitoring approach
RFID System On-line Testing Based on the Evaluation of the Tags Read-Error-Rate
Read rate profile monitoring for defect detection in RFID Systems
Towards an unified IP verification and robustness analysis platform
Cite
×