Guillaume Duc

Associate Professor, Associate Professor

20062024

Research activity per year

Fingerprint

Dive into the research topics where Guillaume Duc is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • AI-Driven Intrusion Detection Systems (IDS) on the ROAD Dataset: A Comparative Analysis for Automotive Controller Area Network (CAN)

    Guerra, L., Xu, L., Bellavista, P., Chapuis, T., Duc, G., Mozharovskyi, P. & Nguyen, V. T., 20 Nov 2024, CSCS 2024 - Proceedings of the 2024 Cyber Security in CarS Workshop, Co-Located with: CCS 2024. Association for Computing Machinery, Inc, p. 39-49 11 p. (CSCS 2024 - Proceedings of the 2024 Cyber Security in CarS Workshop, Co-Located with: CCS 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Optimizing System Architecture Cost and Security Countermeasures

    Berro, S., Apvrille, L. & Duc, G., 1 Jan 2019, Graphical Models for Security- 6th International Workshop, GraMSec 2019, Revised Papers. Albanese, M., Horne, R. & Probst, C. W. (eds.). Springer, p. 50-67 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11720 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hardware-assisted memory tracing on new SoCs embedding FPGA fabrics

    Li, L. W., Duc, G. & Pacalet, R., 7 Dec 2015, Proceedings - 31st Annual Computer Security Applications Conference, ACSAC 2015. Association for Computing Machinery, p. 461-470 10 p. (ACM International Conference Proceeding Series; vol. 7-11-December-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Performance optimizations of integrity checking based on merkle trees

    Ouaarab, S., Duc, G. & Pacalet, R., 14 Jun 2015, Hardware and Architectural Support for Security and Privacy, HASP 2015. Association for Computing Machinery, a10. (ACM International Conference Proceeding Series; vol. 14-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest

    Clavier, C., Danger, J. L., Duc, G., Elaabid, M. A., Gérard, B., Guilley, S., Heuser, A., Kasper, M., Li, Y., Lomné, V., Nakatsu, D., Ohta, K., Sakiyama, K., Sauvage, L., Schindler, W., Stöttinger, M., Veyrat-Charvillon, N., Walle, M. & Wurcker, A., 1 Nov 2014, In: Journal of Cryptographic Engineering. 4, 4, p. 259-274 16 p.

    Research output: Contribution to journalArticlepeer-review

  • SecBus, a software/hardware architecture for securing external memories

    Brunel, J., Pacalet, R., Ouaarab, S. & Duc, G., 1 Jan 2014, Proceedings - 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014. IEEE Computer Society, p. 277-282 6 p. 6834976. (Proceedings - 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • TRESCCA - Trustworthy embedded systems for secure cloud computing

    Schomaker, G., Herrholz, A., Duc, G., Pacalet, R., Raho, S., Grammatikakis, M., Coppola, M. & Vega, I. G., 1 Jan 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. IEEE Computer Society, p. 844-845 2 p. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Application-replay attack on Java cards: When the garbage collector gets confused

    Barbu, G., Hoogvorst, P. & Duc, G., 27 Feb 2012, Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Tampering with Java Card exceptions: The exception proves the rule

    Barbu, G., Hoogvorst, P. & Duc, G., 24 Oct 2012, SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography. p. 55-63 9 p. (SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Distributed security for communications and memories in a multiprocessor architecture

    Cotret, P., Crenne, J., Gogniat, G., Diguet, J. P., Gaspar, L. & Duc, G., 20 Dec 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2011. p. 326-329 4 p. 6008915. (IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access