Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN)
Guerra, L., Xu, L., Bellavista, P., Chapuis, T., Duc, G., Mozharovskyi, P. & Nguyen, V. T., 20 Nov 2024, CSCS 2024 - Proceedings of the 2024 Cyber Security in CarS Workshop, Co-Located with: CCS 2024. Association for Computing Machinery, Inc, p. 39-49 11 p. (CSCS 2024 - Proceedings of the 2024 Cyber Security in CarS Workshop, Co-Located with: CCS 2024).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Optimizing System Architecture Cost and Security Countermeasures
Berro, S., Apvrille, L. & Duc, G., 1 Jan 2019, Graphical Models for Security- 6th International Workshop, GraMSec 2019, Revised Papers. Albanese, M., Horne, R. & Probst, C. W. (eds.). Springer, p. 50-67 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11720 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Hardware-assisted memory tracing on new SoCs embedding FPGA fabrics
Li, L. W., Duc, G. & Pacalet, R., 7 Dec 2015, Proceedings - 31st Annual Computer Security Applications Conference, ACSAC 2015. Association for Computing Machinery, p. 461-470 10 p. (ACM International Conference Proceeding Series; vol. 7-11-December-2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Performance optimizations of integrity checking based on merkle trees
Ouaarab, S., Duc, G. & Pacalet, R., 14 Jun 2015, Hardware and Architectural Support for Security and Privacy, HASP 2015. Association for Computing Machinery, a10. (ACM International Conference Proceeding Series; vol. 14-June-2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
Clavier, C., Danger, J. L., Duc, G., Elaabid, M. A., Gérard, B., Guilley, S., Heuser, A., Kasper, M., Li, Y., Lomné, V., Nakatsu, D., Ohta, K., Sakiyama, K., Sauvage, L., Schindler, W., Stöttinger, M., Veyrat-Charvillon, N., Walle, M. & Wurcker, A., 1 Nov 2014, In: Journal of Cryptographic Engineering. 4, 4, p. 259-274 16 p.Research output: Contribution to journal › Article › peer-review
-
SecBus, a software/hardware architecture for securing external memories
Brunel, J., Pacalet, R., Ouaarab, S. & Duc, G., 1 Jan 2014, Proceedings - 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014. IEEE Computer Society, p. 277-282 6 p. 6834976. (Proceedings - 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
TRESCCA - Trustworthy embedded systems for secure cloud computing
Schomaker, G., Herrholz, A., Duc, G., Pacalet, R., Raho, S., Grammatikakis, M., Coppola, M. & Vega, I. G., 1 Jan 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. IEEE Computer Society, p. 844-845 2 p. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Application-replay attack on Java cards: When the garbage collector gets confused
Barbu, G., Hoogvorst, P. & Duc, G., 27 Feb 2012, Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7159 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Tampering with Java Card exceptions: The exception proves the rule
Barbu, G., Hoogvorst, P. & Duc, G., 24 Oct 2012, SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography. p. 55-63 9 p. (SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Distributed security for communications and memories in a multiprocessor architecture
Cotret, P., Crenne, J., Gogniat, G., Diguet, J. P., Gaspar, L. & Duc, G., 20 Dec 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2011. p. 326-329 4 p. 6008915. (IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access