Suivre
Karine Heydemann
Karine Heydemann
maître de conférences en informatique, Sorbonne Université / LIP6
Adresse e-mail validée de lip6.fr
Titre
Citée par
Citée par
Année
Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller
N Moro, A Dehbaoui, K Heydemann, B Robisson, E Encrenaz
2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 77-88, 2013
2722013
Formal verification of a software countermeasure against instruction skip attacks
N Moro, K Heydemann, E Encrenaz, B Robisson
Journal of Cryptographic Engineering 4, 145-156, 2014
1292014
Software countermeasures for control flow integrity of smart card C codes
JF Lalande, K Heydemann, P Berthomé
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
652014
Compiler-assisted loop hardening against fault attacks
J Proy, K Heydemann, A Berzati, A Cohen
ACM Transactions on Architecture and Code Optimization (TACO) 14 (4), 1-25, 2017
482017
Topology-aware and dependence-aware scheduling and memory allocation for task-parallel languages
A Drebes, K Heydemann, N Drach, A Pop, A Cohen
ACM Transactions on Architecture and Code Optimization (TACO) 11 (3), 1-25, 2014
482014
Scalable task parallelism for numa: A uniform abstraction for coordinated scheduling and memory management
A Drebes, A Pop, K Heydemann, A Cohen, N Drach
Proceedings of the 2016 International Conference on Parallel Architectures …, 2016
422016
Experimental evaluation of two software countermeasures against fault attacks
N Moro, K Heydemann, A Dehbaoui, B Robisson, E Encrenaz
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
402014
Automated software protection for the masses against side-channel attacks
N Belleville, D Couroussé, K Heydemann, HP Charles
ACM Transactions on Architecture and Code Optimization (TACO) 15 (4), 1-27, 2018
322018
Efficient design and evaluation of countermeasures against fault attacks using formal verification
L Goubet, K Heydemann, E Encrenaz, R De Keulenaer
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
302016
High level model of control flow attacks for smart card functional security
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
2012 Seventh International Conference on Availability, Reliability and …, 2012
302012
Aftermath: A graphical tool for performance analysis and debugging of fine-grained task-parallel programs and run-time systems
A Drebes, A Pop, K Heydemann, A Cohen, N Drach-Temam
7th Workshop on Programmability Issues for Heterogeneous Multicores …, 2014
262014
A first ISA-level characterization of EM pulse effects on superscalar microarchitectures: a secure software perspective
J Proy, K Heydemann, A Berzati, F Majéric, A Cohen
Proceedings of the 14th International Conference on Availability …, 2019
232019
Formally verified software countermeasures for control-flow integrity of smart card C code
K Heydemann, JF Lalande, P Berthomé
Computers & Security 85, 202-224, 2019
222019
CCFI-cache: A transparent and flexible hardware protection for code and control-flow integrity
JL Danger, A Facon, S Guilley, K Heydemann, U Kühne, AS Merabet, ...
2018 21st Euromicro Conference on Digital System Design (DSD), 529-536, 2018
222018
Custom instruction support for modular defense against side-channel and fault attacks
P Kiaei, D Mercadier, PE Dagand, K Heydemann, P Schaumont
Constructive Side-Channel Analysis and Secure Design: 11th International …, 2021
202021
Fault attack vulnerability assessment of binary code
JB Bréjon, K Heydemann, E Encrenaz, Q Meunier, ST Vu
Proceedings of the Sixth Workshop on Cryptography and Security in Computing …, 2019
192019
NUMA-aware scheduling and memory allocation for data-flow task-parallel applications
A Drebes, A Pop, K Heydemann, N Drach, A Cohen
Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of …, 2016
192016
Studying EM pulse effects on superscalar microarchitectures at ISA level
J Proy, K Heydemann, F Majéric, A Cohen, A Berzati
arXiv preprint arXiv:1903.02623, 2019
172019
Attack model for verification of interval security properties for smart card C codes
P Berthomé, K Heydemann, X Kauffmann-Tourkestansky, JF Lalande
Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and …, 2010
172010
Symbolic approach for side-channel resistance analysis of masked assembly codes
IB El Ouahma, QL Meunier, K Heydemann, E Encrenaz
Security Proofs for Embedded Systems, 2017
162017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20