Damien Couroussé
Damien Couroussé
Verified email at - Homepage
Cited by
Cited by
Micro-architectural simulation of in-order and out-of-order arm microprocessors with gem5
FA Endo, D Couroussé, HP Charles
2014 international conference on embedded computer systems: Architectures …, 2014
Micro-architectural simulation of embedded core heterogeneity with gem5 and mcpat
FA Endo, D Couroussé, HP Charles
Proceedings of the 2015 Workshop on Rapid Simulation and Performance …, 2015
Compilation of a countermeasure against instruction-skip fault attacks
T Barry, D Couroussé, B Robisson
Proceedings of the Third Workshop on Cryptography and Security in Computing …, 2016
A basic gesture and motion format for virtual reality multisensory applications
A Luciani, M Evrard, D Couroussé, N Castagné, C Cadoz, JL Florens
arXiv preprint arXiv:1005.4564, 2010
Ergotic sounds: A new way to improve playability, believability and presence of virtual musical instruments
A Luciani, JL Florens, D Couroussé, J Castet
Journal of New Music Research 38 (3), 309-323, 2009
Automated software protection for the masses against side-channel attacks
N Belleville, D Couroussé, K Heydemann, HP Charles
ACM Transactions on Architecture and Code Optimization (TACO) 15 (4), 1-27, 2018
Runtime Code Polymorphism as a Protection Against Side Channel Attacks
D Couroussé, T Barry, B Robisson, P Jaillon, O Potin, JL Lanet
10th WISTP International Conference on Information Security Theory and …, 2016
deGoal a Tool to Embed Dynamic Code Generators into Applications
HP Charles, D Couroussé, V Lomüller, FA Endo, R Gauguey
Compiler Construction: 23rd International Conference, CC 2014, Held as Part …, 2014
Ergotic sounds: A new way to improve playability, believability and presence of digital musical instruments
A Luciani, JL Florens, D Couroussé, C Cadoz
Proceedings of the 4th International Conference on Enactive Interfaces, 373-376, 2007
Deep Learning Side-Channel Analysis on Large-Scale Traces: A Case Study on a Polymorphic AES
L Masure, N Belleville, E Cagli, MA Cornélie, D Couroussé, C Dumas, ...
European Symposium on Research in Computer Security, 440-460, 2020
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures
KM Abdellatif, D Couroussé, O Potin, P Jaillon
Proceedings of the Fourth Workshop on Cryptography and Security in Computing …, 2017
Method of encryption with dynamic diffusion and confusion layers
H Noura, D Courousse
US Patent 10,903,978, 2021
A template attack against VERIFY PIN algorithms
H Le Bouder, T Barry, D Couroussé, JL Lanet, R Lashermes
SECRYPT 2016, 231-238, 2016
Exploration of fault effects on formal RISC-V microarchitecture models
S Tollec, M Asavoae, D Couroussé, K Heydemann, M Jan
2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 73-83, 2022
SCI-FI: control signal, code, and control flow integrity against fault injection attacks
T Chamelot, D Couroussé, K Heydemann
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 556-559, 2022
Software acceleration of floating-point multiplication using runtime code generation—Student paper
C Aracil, D Couroussé
2013 4th Annual International Conference on Energy Aware Computing Systems …, 2013
Idols with feet of clay: On the security of bootloaders and firmware updaters for the iot
L Morel, D Couroussé
2019 17th IEEE International New Circuits and Systems Conference (NEWCAS), 1-4, 2019
Automatic application of software countermeasures against physical attacks
N Belleville, K Heydemann, D Couroussé, T Barry, B Robisson, A Seriai, ...
Cyber-Physical Systems Security, 135-155, 2018
L-IoT: A flexible energy efficient platform targeting wide range IoT applications
E Beigné, I Miro-Panades, A Valentian, JF Christmann, S Bacles-Min, ...
IEEE Design Automation Conference (DAC), 2017
HLDCA-WSN: homomorphic lightweight data confidentiality algorithm for wireless sensor network
H Noura, D Couroussé
Cryptology ePrint Archive, 2015
The system can't perform the operation now. Try again later.
Articles 1–20