Number of documents

81

David HELY


Journal articles16 documents

  • Zeshan Ali, Etienne Perret, Nicolas Barbot, Romain Siragusa, David Hely, et al.. Detection of Natural Randomness by Chipless RFID Approach and Its Application to Authentication. IEEE Transactions on Microwave Theory and Techniques, Institute of Electrical and Electronics Engineers, 2019, pp.1-15. ⟨10.1109/TMTT.2019.2914102⟩. ⟨hal-02132612⟩
  • J.-M. Dutertre, Vincent Beroulle, Philippe Candelier, Stephan de Castro, Louis-Barthelemy Faber, et al.. Sensitivity to Laser Fault Injection: CMOS FD-SOI vs. CMOS bulk. IEEE Transactions on Device and Materials Reliability, Institute of Electrical and Electronics Engineers, 2019, 19 (1), pp.6-15. ⟨10.1109/TDMR.2018.2886463⟩. ⟨hal-01971932⟩
  • Arash Nejat, David Hely, Vincent Beroulle. ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods. Journal Hardware and Systems Security, Springer, In press, ⟨10.1007/s41635-018-0033-6⟩. ⟨hal-01724155⟩
  • David Hely, Cyril Bresch, Athanasios Papadimitriou, Adrien Michelet-Gignoux, Laurent Amato, et al.. Stack Redundancy to Thwart Return Oriented Programming in Embedded Systems. IEEE Embedded Systems Letters, Institute of Electrical and Electronics Engineers, 2018, pp.1 - 1. ⟨10.1109/LES.2018.2819983⟩. ⟨hal-01829397⟩
  • Zeshan Ali, Nicolas Barbot, Romain Siragusa, Etienne Perret, D. Hély, et al.. Detection of Minimum Geometrical Variation by Free-Space-Based Chipless Approach and its Application to Authentication. IEEE Microwave and Wireless Components Letters, Institute of Electrical and Electronics Engineers, 2018, 28 (4), pp.323 - 325. ⟨10.1109/LMWC.2018.2805858⟩. ⟨hal-01800580⟩
  • David Hely, M. Nourian, M. Fazeli, D. Hély. Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing. Journal of Electronic Testing, Springer Verlag, 2018, 34 (4), pp.461 - 470. ⟨10.1007/s10836-018-5739-4⟩. ⟨hal-01877451⟩
  • Vincent Beroulle, Oum-El-Kheir Aktouf, David Hely. SafeRFID Project: A complete Framework for the Improvement of UHF RFID System Dependability. International Journal On Advances in Networks and Services, IARIA, 2017, 10 (1&2). ⟨hal-01617627⟩
  • Mosabbah Mushir Ahmed, David Hely, Nicolas Barbot, Romain Siragusa, Etienne Perret, et al.. Radiated Electromagnetic Emission for Integrated Circuit Authentication. IEEE Microwave and Wireless Components Letters, Institute of Electrical and Electronics Engineers, 2017, 27 (11), pp.1028 - 1030. ⟨10.1109/LMWC.2017.2750078⟩. ⟨hal-01724143⟩
  • Brice Colombier, Lilian Bossuet, Viktor Fischer, David Hely. Key Reconciliation Protocols for Error Correction of Silicon PUF Responses. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2017, 12 (8), pp.1988-2002. ⟨10.1109/TIFS.2017.2689726⟩. ⟨ujm-01575582⟩
  • Dubeuf Jérémy, David Hely, Vincent Beroulle. ECDSA Passive Attacks, Leakage Sources, and Common Design Mistakes . ACM Transactions on Design Automation of Electronic Systems, Association for Computing Machinery, 2016, ⟨10.1145/2820611⟩. ⟨hal-01398724⟩
  • Backer Jerry, David Hely, Ramesh Karri. Secure and Flexible Trace-Based Debugging of Systems-on-Chip. ACM Transactions on Design Automation of Electronic Systems, Association for Computing Machinery, 2016, ⟨10.1145/2994601⟩. ⟨hal-01424899⟩
  • Athanasios Papadimitriou, David Hely, Vincent Beroulle, Paolo Maistri, Regis Leveugle. Analysis of laser-induced errors: RTL fault models versus layout locality characteristics. Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2016, ⟨10.1016/j.micpro.2016.01.018⟩. ⟨hal-01299277⟩
  • Brice Colombier, Lilian Bossuet, David Hely. From Secured Logic to IP Protection. Microprocessors and Microsystems: Embedded Hardware Design (MICPRO), Elsevier, 2016, 47 (Part A), pp.44-54. ⟨http://www.sciencedirect.com/science/article/pii/S0141933116000417⟩. ⟨10.1016/j.micpro.2016.02.010⟩. ⟨hal-01280195⟩
  • Guo Xiaofei, Jin Chenglu, Athanasios Papadimitriou, David Hely, Ramesh Karri. Can Algorithm Diversity in Stream Cipher Implementation Thwart (Natural and) Malicious Faults?. IEEE Transactions on Emerging Topics in Computing, Institute of Electrical and Electronics Engineers, 2015, ⟨10.1109/TETC.2015.2434103⟩. ⟨hal-01205402⟩
  • Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, Minh Duc Nguyen, David Hely. RFID System On-line Testing Based on the Evaluation of the Tags Read-Error-Rate. Journal of Electronic Testing, Springer Verlag, 2010, pp.1. ⟨10.1007/s10836-010-5191-6⟩. ⟨hal-00575585⟩
  • David Hely, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre. Securing Scan Control in Crypto Chips. Journal of Electronic Testing, Springer Verlag, 2007, 23 (5), pp.457-464. ⟨10.1007/s10836-007-5000-z⟩. ⟨lirmm-00186353⟩

Conference papers64 documents

  • Mosabbah Mushir Ahmed, Etienne Perret, Romain Siragusa, Nicolas Barbot, David Hely, et al.. Développement d'une plateforme RF flexible et reconfigurable basée sur un FPGA. 21ème Journées Nationales Microondes, May 2019, Caen, France. ⟨hal-02051698⟩
  • Zeshan Ali, Romain Siragusa, Etienne Perret, Nicolas Barbot, David Hely, et al.. Méthode d’authentification basée sur des tags RFID sans puce imprimés par jet d’encre conductrice. 21èmes Journées Nationales Microondes, May 2019, Caen, France. ⟨hal-02017120⟩
  • Florent Bonnefoy, Maxime Bernier, Frédéric Garet, Hamdi Maher, Etienne Perret, et al.. Identification temps réel d’un tag THID bas coût dans le domaine THz. 21èmes Journées Nationales Microondes, May 2019, Caen, France. ⟨hal-02017114⟩
  • Mosabbah Mushir Ahmed, David Hely, Etienne Perret, Nicolas Barbot, Romain Siragusa, et al.. Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique. 2018 IEEE 3rd International Verification and Security Workshop (IVSW), Jul 2018, Costa Brava, Spain. pp.25-30, ⟨10.1109/IVSW.2018.8494883⟩. ⟨hal-02014214⟩
  • Maher Hamdi, Florent Bonnefoy, Maxime Bernier, Frédéric Garet, Etienne Perret, et al.. Identification in the Terahertz Domain using Low Cost Tags with a Fast Spectrometer. ASID 2018: 12th IEEE International Conference on Anti-counterfeiting, Security, and Identification, Oct 2018, Xiamen, China. ⟨hal-02015383⟩
  • Zeshan Ali, Nicolas Barbot, Romain Siragusa, David Hely, Maxime Bernier, et al.. Chipless RFID Tag Discrimination and the Performance of Resemblance Metrics to be used for it. IEEE/MTT-S International Microwave Symposium - IMS 2018, Jun 2018, Philadelphia, United States. ⟨10.1109/MWSYM.2018.8439855⟩. ⟨hal-01888533⟩
  • Cyril Bresch, Stéphanie Chollet, David Hely. Towards an Inherently Secure Run-Time Environment for Medical Devices.. 2018 IEEE International Congress on Internet of Things, ICIOT 2018, Jul 2018, San Francisco, United States. ⟨hal-01898660⟩
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Louis-Barthelemy Faber, Marie-Lise Flottes, et al.. The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks. IOLTS: International On-Line Testing Symposium, Jul 2018, Platja d’Aro, Spain. pp.214-219, ⟨10.1109/IOLTS.2018.8474230⟩. ⟨emse-01856000⟩
  • Jean-Max Dutertre, Vincent Beroulle, Philippe Candelier, Stephan de Castro, Louis-Barthelemy Faber, et al.. Laser fault injection at the CMOS 28 nm technology node: an analysis of the fault model. FDTC: Fault Diagnosis and Tolerance in Cryptography, Sep 2018, Amsterdam, Netherlands. pp.1-6, ⟨10.1109/FDTC.2018.00009⟩. ⟨emse-01856008⟩
  • Brice Colombier, Lilian Bossuet, David Hely. Centrality Indicators for Efficient and Scalable Logic Masking. In International CryptArchi Workshop 2017, Jun 2017, Smolenice, Slovakia. ⟨hal-01586818⟩
  • Florent Bonnefoy, Maher Hamdi, Maxime Bernier, Nicolas Barbot, Romain Siragusa, et al.. Authentication in the THz domain: a new tool to fight couterfeiting. 9th THz days, Jun 2017, Dunkerque, France. ⟨hal-02014053⟩
  • Mosabbah Mushir Ahmed, David Hely, Nicolas Barbot, Romain Siragusa, Etienne Perret, et al.. Towards a robust and efficient EM based authentication of FPGA against counterfeiting and recycling. 19th International Symposium on Computer Architecture and Digital Systems (CADS), Dec 2017, Kish Island, Iran. pp.1-6. ⟨hal-02014230⟩
  • Brice Colombier, Ugo Mureddu, Lilian Bossuet, David Hely. A comprehensive hardware/software infrastructure for IP cores design protection. IEEE International Conference on Field-Programmable Technology, ICFPT 2017, Dec 2017, Melbourne, Australia. ⟨hal-01632978⟩
  • Johan Marconot, David Hely, Florian Pebay-Peyroula. IoT Components LifeCycle Based Security Analysis. 2017 Euromicro Conference on Digital System Design (DSD), Aug 2017, Vienna, France. ⟨10.1109/DSD.2017.44⟩. ⟨hal-01724164⟩
  • Cyril Bresch, David Hely, Adrien Michelet, Laurent Amato, Thomas Meyer. A red team blue team approach towards a secure processor design with hardware shadow stack. 2017 IEEE 2nd International Verification and Security Workshop (IVSW), Jul 2017, Thessaloniki, France. ⟨10.1109/IVSW.2017.8031545⟩. ⟨hal-01724169⟩
  • F. Bonnefoy, M. Hamdi, M. Bernier, Nicolas Barbot, Romain Siragusa, et al.. Authentication in the THz domain: a new tool to fight counterfeiting. 9th TeraHertz Days, Jun 2017, Dunkerque, France. ⟨hal-02068073⟩
  • Brice Colombier, Lilian Bossuet, David Hely. Centrality Indicators for Efficient and Scalable Logic Masking. IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2017), IEEE, Jul 2017, Bochum, Germany. pp.98-103, ⟨10.1109/ISVLSI.2017.26⟩. ⟨ujm-01570080⟩
  • Mosabbah Mushir Ahmed, David Hely, Romain Siragusa, Nicolas Barbot, Etienne Perret, et al.. Authentication of IC based on Electromagnetic Signature. 6th Conference on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE 2016), Nov 2016, Barcelone, Spain. ⟨hal-02014251⟩
  • Arash Nejat, David Hely, Vincent Beroulle. Reusing logic masking to facilitate path-delay-based hardware Trojan detection. 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design (IOLTS), Jul 2016, Sant Felliu, Spain. ⟨10.1109/IOLTS.2016.7604696⟩. ⟨hal-01412412⟩
  • R. Leveugle, A. Chahed, P. Maistri, A. Papadimitriou, D. Hély, et al.. On Fault Injections for Early Security Evaluation vs. Laser-based Attacks. 1st IEEE International Verification and Security Workshop, Jul 2016, St Feliu de Guixols, Spain. pp.33-38. ⟨hal-01444970⟩
  • C. Ananiadis, A. Papadimitriou, D. Hély, V. Beroulle, P. Maistri, et al.. On the development of a new countermeasure on a laser attack RTL fault model. Design, Automation and Test in Europe Conference (DATE'16), Mar 2016, Dresden, Germany. ⟨hal-01414728⟩
  • Arash Nejat, David Hely, Vincent Beroulle. How logic masking can improve path delay analysis for Hardware Trojan detection. 2016 IEEE 34th International Conference on Computer Design (ICCD), Oct 2016, Phenix, United States. ⟨10.1109/ICCD.2016.7753319⟩. ⟨hal-01418432⟩
  • Vincent Beroulle, Oum-El-Kheir Aktouf, David Hely. System-Level Simulation for the Dependability Improvement of UHF RFID Systems. ICWMC 2016 : The Twelfth International Conference on Wireless and Mobile Communications (includes QoSE WMC 2016), IARIA, Nov 2016, Barcelone, Spain. ⟨hal-01432066⟩
  • Seyyed Mohammad Saleh Samimi, Ehsan Aerabi, Arash Nejat, Mahdi Fazeli, David Hely, et al.. High output hamming-distance achievement by a greedy logic masking approach. 2016 IEEE East-West Design & Test Symposium (EWDTS), Oct 2016, Yerevan, France. ⟨10.1109/EWDTS.2016.7807657⟩. ⟨hal-01724174⟩
  • Brice Colombier, Lilian Bossuet, David Hely, Viktor Fischer. Key Reconciliation Protocols: an Alternative for Lightweight Authentication of Integrated Circuits. International CryptArchi Workshop , Jun 2016, La Grande-Motte, France. ⟨hal-01382983⟩
  • A. Papadimitriou, M. Tampas, D. Hély, V. Beroulle, P. Maistri, et al.. Validation of RTL laser fault injection model with respect to layout information. IEEE International Symposium on Hardware Oriented Security and Trust (HOST'15), May 2015, McLean, VA, United States. pp.78-81. ⟨hal-01393414⟩
  • A. Papadimitriou, D. Hély, V. Beroulle, P. Maistri, R. Leveugle. Analysis of laser-induced errors: RTL fault model versus layout locality characteristics. Third Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'15), Mar 2015, Grenoble, France. ⟨hal-01393406⟩
  • Brice Colombier, Lilian Bossuet, David Hely. Reversible Denial-of-Service by Locking Gates Insertion for IP Cores Design Protection. Computer Society Annual Symposium on VLSI, CNRS-LIRMM, France, Jul 2015, Montpellier, France. ⟨ujm-01180564⟩
  • Backer Jerry, Ali Subidh, Kurt Rosenfeld, David Hely, Karri Ramesh, et al.. A secure design-for-test infrastructure for lifetime security of SoCs. Circuits and Systems (ISCAS), 2015 IEEE International Symposium on, IEEE, May 2015, Lisbonna, Portugal. ⟨10.1109/ISCAS.2015.7168564⟩. ⟨hal-01205397⟩
  • Backer Jerry, David Hely, Ramesh Karri. On enhancing the debug architecture of a system-on-chip (SoC) to detect software attacks. Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), 2015 IEEE International Symposium on, IEEE, Oct 2015, Amherst, United States. ⟨10.1109/DFT.2015.7315131⟩. ⟨hal-01398767⟩
  • Brice Colombier, David Hely, Lilian Bossuet. Reversible Denial-of-Service by Locking Gates Insertion for IP Cores Design Protection. International CryptArchi Workshop 2015, Jun 2015, Leuven, Belgium. ⟨hal-01382976⟩
  • Pierre Vanhauwaert, P. Maistri, R. Leveugle, Athanasios Papadimitriou, David Hely, et al.. On error models for RTL security evaluations. 9th Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS) 2014, May 2014, Santorini, Greece. pp.1-6. ⟨hal-01010314⟩
  • Noémie Boher, Kamil Gomina, David Hely, Vincent Beroulle, Jean-Baptiste Rigaud, et al.. Voltage Glitch Attacks on Mixed Signal Systems. 17th Euromicro Conference on Digital Systems Design, Aug 2014, Verone, Italy. pp.1-6. ⟨hal-01063664⟩
  • Omar Abdelmalek, David Hely, Vincent Beroulle. Fault Tolerance Evaluation of RFID Tags. 15th IEEE Latin America Test Workshop, Mar 2014, Fortaleza, Brazil. pp.1-6. ⟨hal-00958582⟩
  • Omar Abdelmalek, David Hely, Vincent Beroulle. Emulation Based Fault Injection on UHF RFID Transponder. 17th IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, Apr 2014, Varsaw, Poland. pp.1-4. ⟨hal-01010294⟩
  • Athanasios Papadimitriou, David Hely, Vincent Beroulle, P. Maistri, R. Leveugle. A multiple fault injection methodology based on cone partitioning towards RTL modeling of laser attacks. Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014, Mar 2014, Germany. pp.1-4, ⟨10.7873/DATE2014.219⟩. ⟨hal-00981848⟩
  • Vincent Beroulle, Philippe Candelier, Stephan de Castro, Giorgio Di Natale, Jean-Max Dutertre, et al.. Laser-Induced Fault Effects in Security-Dedicated Circuits. VLSI-SoC: Very Large Scale Integration and System-on-Chip, Oct 2014, Playa del Carmen, Mexico. pp.220-240, ⟨10.1007/978-3-319-25279-7_12⟩. ⟨hal-01383737⟩
  • P. Papavramidou, D. Hély, V. Beroulle, P. Maistri, R. Leveugle. FPGA emulation of laser attacks against secure deep submicron integrated circuits. Second Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'14), May 2014, Paderborn, Germany. ⟨hal-01132405⟩
  • Ibrahim Mezzah, Omar Kermia, Hamimi Chemali, Omar Abdelmalek, David Hely, et al.. Assertion based on-line fault detection applied on UHF RFID tag. 8th IEEE International Design & Test Symposium 2013, Dec 2013, Marrakesh, Morocco. pp.1-5, ⟨10.1109/IDT.2013.6727091⟩. ⟨hal-00950130⟩
  • Omar Abdelmalek, David Hely, Vincent Beroulle. EPC Class 1 GEN 2 UHF RFID tag emulator for robustness evaluation and improvement. Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2013 8th International Conference on, Mar 2013, Marrakesh, Morocco. pp.20-24, ⟨10.1109/DTIS.2013.6527771⟩. ⟨hal-00950128⟩
  • A. Papadimitriou, D. Hély, V. Beroulle, P. Maistri, R. Leveugle. FPGA emulation of laser attacks against secure deep submicron integrated circuits. 7ème Colloque du GdR SoC-SiP, Jun 2013, Lyon, France. ⟨hal-01400108⟩
  • David Hely, Vincent Beroulle, Abdelmalek Omar. Triggering Hardware Trojans in EPC C1G2 RFID Tags. Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2013, May 2013, Avignon, France. ⟨hal-00958199⟩
  • Noémie Boher, David Hely, Vincent Beroulle, Joël Damiens, Philippe Candelier. Increasing the security level of analog IPs by using a dedicated vulnerability analysis methodology.. Quality Electronic Design (ISQED), 2013 14th International Symposium on, Mar 2013, United States. pp.531-537, ⟨10.1109/ISQED.2013.6523662⟩. ⟨hal-00861556⟩
  • David Hely, Dubeuf Jérémy, Karri Ramesh. Run-time detection of hardware Trojans: The processor protection unit. 18th IEEE European Test Symposium, May 2013, Avignon, France. pp.1-6. ⟨hal-00861554⟩
  • Noémie Boher, David Hely, Vincent Beroulle, Kamil Gomina, Joël Damiens, et al.. Evaluating and Enhancing the Security of Analog and Mixed IPs in Complex System On Chip. Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2013, May 2013, Avignon, France. ⟨hal-01010298⟩
  • David Hely, Simon Piroux Mounier, Rivière Elie, Triana Gerson, Martin Julien, et al.. Experiences in side channel and testing based Hardware Trojan detection. IEEE VLSI Test Symposium 2013, Apr 2013, United States. pp.1-4. ⟨hal-00857603⟩
  • Lilian Bossuet, David Hely. SALWARE: Salutary Hardware to design Trusted IC.. Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2013, May 2013, Avignon, France. ⟨ujm-00833871⟩
  • Omar Abdelmalek, David Hely, Vincent Beroulle. An UHF RFID Emulation Platform with Fault Injection and real time Monitoring capabilities. 8th IEEE International Design & Test Symposium 2013, Dec 2013, Marrakesh, Morocco. pp.1-2, ⟨10.1109/IDT.2013.6727143⟩. ⟨hal-00933386⟩
  • David Hely, Augagneur Maurin, Clauzel Yves, Dubeuf Jérémy. Malicious Key Emission via Hardware Trojan Against Encryption System. ICCD, Oct 2012, France. pp.100-104. ⟨hal-00739571⟩
  • David Hely, Dubeuf Jérémy, Augagneur Maurin, Clauzel Yves. A Physical Unclonable Function Based on Setup Time Violation. ICCD 2012, Oct 2012, Montréal, Canada. ⟨hal-00739575⟩
  • Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hély. Evaluation of a new RFID system performance monitoring approach. Design Automation & Test in Europe, 2012, Dresden, Germany. ⟨hal-01105361⟩
  • Minh Duc Nguyen, Gilles Fritz, Oum-El-Kheir Aktouf, Vincent Beroulle, David Hely. Towards middleware-based fault-tolerance in RFID systems. 13th European Workshop on Dependable Computing, EWDC 2011, May 2011, Pise, Italy. pp.5. ⟨hal-00580368⟩
  • David Hely, Kurt Rosenfeld, Ramesh Karri. Security challenges during VLSI test. New Circuits and Systems Conference (NEWCAS), 2011 IEEE 9th International, Jun 2011, Bordeaux, France. pp 486 - 489, ⟨10.1109/NEWCAS.2011.5981325⟩. ⟨hal-00619524⟩
  • Gilles Fritz, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hely. SystemC Modeling of RFID Systems for Robustness Analysis. 19th International Conference on Software, Telecommunications and Computer Networks IEEE SoftCOM, Sep 2011, Hvar (Split), Croatia. pp.ISBN : 978-953-290-027-9. ⟨hal-00628789⟩
  • Gilles Fritz, Boutheina Maaloul, Vincent Beroulle, Oum-El-Kheir Aktouf, David Hely. Read rate profile monitoring for defect detection in RFID Systems. IEEE International Conference on RFID-Technologies and Applications (RFID-TA 2011), Sep 2011, Sitges (Barcelona), Spain. pp. 89-94. ⟨hal-00628783⟩
  • David Hely, Vincent Beroulle, Feng Lu, Jose Ramon Garcia Oya. Towards an unified IP verification and robustness analysis platform. 14th IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2011, Apr 2011, France. ⟨hal-00593524⟩
  • Minh Duc Nguyen, Gilles Fritz, Oum-El-Kheir Aktouf, Vincent Beroulle, David Hély. Towards middleware-based fault-tolerance in RFID systems. 13th European Workshop on Dependable Computing (EWDC 2011), May 2011, Pise, Italy. pp.49-52. ⟨hal-00593732⟩
  • David Hély, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre. A Secure Scan Design Methodology. LATW'06: 7th IEEE Latin American Test Workshop, Mar 2006, Buenos Aires, Argentina. pp.81-86. ⟨lirmm-00102752⟩
  • David Hély, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre. Secure Scan Techniques: a Comparison. IOLTS: International On-Line Testing Symposium, Jul 2006, Como, Italy. pp.119-124, ⟨10.1109/IOLTS.2006.55⟩. ⟨lirmm-00102857⟩
  • David Hely, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre. Scan Pattern Watermarking. LATW'06: 7th IEEE Latin American Test Workshop, Mar 2006, Buenos Aires, pp.63-67. ⟨lirmm-00102753⟩
  • David Hély, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre. A secure Scan Design Methodology. DATE: Design, Automation and Test in Europe, Mar 2006, Munich, Germany. pp.1177-1178, ⟨10.1109/DATE.2006.244019⟩. ⟨lirmm-00132516⟩
  • David Hely, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre. Scan Design and Secure Chips : Can They Work Together. SAME'05: Sophia-Antipolis Forum on MicroElectronics, Oct 2005, Sophia-Antipolis, France. ⟨lirmm-00106546⟩
  • David Hely, Frédéric Bancel, Marie-Lise Flottes, Bruno Rouzeyre. Test Control for Secure Scan Designs. ETS: European Test Symposium, May 2005, Tallinn, Estonia. pp.190-195. ⟨lirmm-00106011⟩
  • David Hely, Marie-Lise Flottes, Frédéric Bancel, Bruno Rouzeyre, Nicolas Berard, et al.. Scan design and secure chip [secure IC testing]. IOLTS: International On-Line Testing Symposium, Jul 2004, Madeira Island, Portugal. pp.219-224, ⟨10.1109/OLT.2004.1319691⟩. ⟨lirmm-00108909⟩

Book sections1 document