Follow
Damien Couroussé
Damien Couroussé
CEA LIST
Verified email at cea.fr - Homepage
Title
Cited by
Cited by
Year
Micro-architectural simulation of in-order and out-of-order arm microprocessors with gem5
FA Endo, D Couroussé, HP Charles
2014 international conference on embedded computer systems: Architectures …, 2014
722014
Micro-architectural simulation of embedded core heterogeneity with gem5 and mcpat
FA Endo, D Couroussé, HP Charles
Proceedings of the 2015 Workshop on Rapid Simulation and Performance …, 2015
662015
Compilation of a countermeasure against instruction-skip fault attacks
T Barry, D Couroussé, B Robisson
Proceedings of the Third Workshop on Cryptography and Security in Computing …, 2016
502016
A basic gesture and motion format for virtual reality multisensory applications
A Luciani, M Evrard, D Couroussé, N Castagné, C Cadoz, JL Florens
arXiv preprint arXiv:1005.4564, 2010
432010
Ergotic sounds: A new way to improve playability, believability and presence of virtual musical instruments
A Luciani, JL Florens, D Couroussé, J Castet
Journal of New Music Research 38 (3), 309-323, 2009
372009
Automated software protection for the masses against side-channel attacks
N Belleville, D Couroussé, K Heydemann, HP Charles
ACM Transactions on Architecture and Code Optimization (TACO) 15 (4), 1-27, 2018
342018
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
D Couroussé, T Barry, B Robisson, P Jaillon, O Potin, JL Lanet
10th WISTP International Conference on Information Security Theory and …, 2016
272016
deGoal a Tool to Embed Dynamic Code Generators into Applications
HP Charles, D Couroussé, V Lomüller, FA Endo, R Gauguey
Compiler Construction: 23rd International Conference, CC 2014, Held as Part …, 2014
242014
Ergotic sounds: A new way to improve playability, believability and presence of digital musical instruments
A Luciani, JL Florens, D Couroussé, C Cadoz
Proceedings of the 4th International Conference on Enactive Interfaces, 373-376, 2007
232007
Deep Learning Side-Channel Analysis on Large-Scale Traces: A Case Study on a Polymorphic AES
L Masure, N Belleville, E Cagli, MA Cornélie, D Couroussé, C Dumas, ...
European Symposium on Research in Computer Security, 440-460, 2020
222020
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures
KM Abdellatif, D Couroussé, O Potin, P Jaillon
Proceedings of the Fourth Workshop on Cryptography and Security in Computing …, 2017
162017
A template attack against VERIFY PIN algorithms
H Le Bouder, T Barry, D Couroussé, JL Lanet, R Lashermes
SECRYPT 2016, 231-238, 2016
122016
Method of encryption with dynamic diffusion and confusion layers
H Noura, D Courousse
US Patent 10,903,978, 2021
92021
Exploration of fault effects on formal RISC-V microarchitecture models
S Tollec, M Asavoae, D Couroussé, K Heydemann, M Jan
2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 73-83, 2022
82022
SCI-FI: control signal, code, and control flow integrity against fault injection attacks
T Chamelot, D Couroussé, K Heydemann
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 556-559, 2022
82022
Software acceleration of floating-point multiplication using runtime code generation—Student paper
C Aracil, D Couroussé
2013 4th Annual International Conference on Energy Aware Computing Systems …, 2013
82013
Idols with feet of clay: On the security of bootloaders and firmware updaters for the iot
L Morel, D Couroussé
2019 17th IEEE International New Circuits and Systems Conference (NEWCAS), 1-4, 2019
72019
Automatic application of software countermeasures against physical attacks
N Belleville, K Heydemann, D Couroussé, T Barry, B Robisson, A Seriai, ...
Cyber-Physical Systems Security, 135-155, 2018
72018
HLDCA-WSN: homomorphic lightweight data confidentiality algorithm for wireless sensor network
H Noura, D Couroussé
Cryptology ePrint Archive, 2015
62015
Introduction to Dynamic Code Generation: An Experiment with Matrix Multiplication for the STHORM Platform
D Couroussé, V Lomüller, HP Charles
Smart Multicore Embedded Systems, 103-122, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20