Suivre
Thierno Barry
Thierno Barry
Adresse e-mail validée de huawei.com - Page d'accueil
Titre
Citée par
Citée par
Année
Compilation of a countermeasure against instruction-skip fault attacks
T Barry, D Couroussé, B Robisson
Proceedings of the Third Workshop on Cryptography and Security in Computing …, 2016
502016
Runtime code polymorphism as a protection against side channel attacks
D Couroussé, T Barry, B Robisson, P Jaillon, O Potin, JL Lanet
IFIP International Conference on Information Security Theory and Practice …, 2016
262016
A template attack against VERIFY PIN algorithms
H Le Bouder, T Barry, D Couroussé, JL Lanet, R Lashermes
SECRYPT 2016, 231-238, 2016
122016
PreTR: spatio-temporal non-autoregressive trajectory prediction transformer
L Achaji, T Barry, T Fouqueray, J Moreau, F Aioun, F Charpillet
2022 IEEE 25th International Conference on Intelligent Transportation …, 2022
112022
Automatic application of software countermeasures against physical attacks
N Belleville, K Heydemann, D Couroussé, T Barry, B Robisson, A Seriai, ...
Cyber-Physical Systems Security, 135-155, 2018
62018
COGITO: Code polymorphism to secure devices
D Couroussé, B Robisson, JL Lanet, T Barry, H Noura, P Jaillon, ...
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-6, 2014
52014
Sécurisation à la compilation de logiciels contre les attaques en fautes
T Barry
Université de Lyon, 2017
32017
Cloud-based Private Querying of Databases by Means of Homomorphic Encryption.
Y Abbar, P Aubry, T Barry, S Carpov, S Mallick, M Krichen, D Ligier, ...
IoTBDS, 123-131, 2021
22021
All paths lead to Rome: Polymorphic runtime code generation for embedded systems
D Couroussé, T Barry, B Robisson, N Belleville, P Jaillon, O Potin, ...
Proceedings of the Fifth Workshop on Cryptography and Security in Computing …, 2018
22018
Method for executing a machine code formed from blocks having instructions to be protected, each instruction associated with a construction instruction to modify a signature of …
D Courousse, K Heydemann, T Barry
US Patent 11,704,128, 2023
12023
SalienceNet: an unsupervised Image-to-Image translation method for nuclei saliency enhancement in microscopy images
B Emmanuel, E Lefevre, T Barry, F Levet, A Beghin, V Viasnoff, X Galindo, ...
bioRxiv, 2022.10. 27.514030, 2022
12022
Outillage de conception et de compilation de protections logicielles pour la sécurité dans les systèmes embarqués.
TO Barry
12017
Automated Combination of Tolerance and Control Flow Integrity Countermeasures against Multiple Fault Attacks
T Barry, D Couroussé, B Robisson, K Heydemann
European LLVM Developers Meeting, 2017
12017
3D Nuclei Segmentation by Combining GAN Based Image Synthesis and Existing 3D Manual Annotations
X Galindo, T Barry, P Guyot, C Riviere, R Galland, F Levet
bioRxiv, 2023.12. 06.570366, 2023
2023
SECURING SOFTWARE AGAINST FAULT ATTACKS AT COMPILE TIME
T Barry
Université de Lyon, 2017
2017
The Multiple Ways to Automate the Application of Software Countermeasures against Physical Attacks: Pitfalls and Guidelines
N Belleville, T Barry, A Seriai, D Couroussé, K Heydemann, B Robisson, ...
Cyber-Physical Security Education Workshop, 2017
2017
Compilation of Software Countermeasures against Multiple Fault Injection Attacks on Embedded Systems
T Barry, D Couroussé, B Robisson
2017
IoT and Physical Attacks
H Le Bouder, JL Lanet, R Lashermes, T Barry, D Couroussé
C&ESAR 2016, 155, 2016
2016
COGITO: Génération de code au runtime pour la sécurité des systèmes embarqué
D Couroussé, JL Lanet, B Robisson, T Barry, P Jaillon
Ressi 2016, 2016
2016
Runtime Code Polymorphism as a Protection against Physical Attacks
D Couroussé, B Robisson, T Barry, P Jaillon, O Potin
Workshop on Cryptographic Hardware and Embedded Systems, 2015
2015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20