Personal profile
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
Robust and Reliable PUF Protocol Exploiting Non-monotonic Quantization and Neyman-Pearson Lemma
Nasir, N., Béguinot, J., Cheng, W., Kühne, U. & Danger, J. L., 1 Jan 2026, Constructive Approaches for Security Analysis and Design of Embedded Systems - 1st International Conference, CASCADE 2025, Proceedings. Rivain, M. & Sasdrich, P. (eds.). Springer Science and Business Media Deutschland GmbH, p. 387-409 23 p. (Lecture Notes in Computer Science; vol. 15952 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Execution Platform Contracts
Bourgeoisat, D., Kühne, U. & Brandner, F., 1 Jan 2025, Proceedings - 2025 28th Euromicro Conference on Digital System Design, DSD 2025. Casini, D. & Cazorla, F. J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 426-434 9 p. (Proceedings - 2025 28th Euromicro Conference on Digital System Design, DSD 2025).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Finding Optimal Moving Target Defense Strategies: A Resilience Booster for Connected Cars
Ayrault, M., Kühne, U. & Borde, É., 1 May 2022, In: Information (Switzerland). 13, 5, 242.Research output: Contribution to journal › Article › peer-review
Open Access -
Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks
Chabanne, H., Danger, J. L., Guiga, L. & Kühne, U., 1 Jan 2022, Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Proceedings. Batina, L., Picek, S., Picek, S. & Mondal, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 148-167 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13162 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Analysis and Protection of the Two-Metric Helper Data Scheme
Tebelmann, L., Kühne, U., Danger, J. L. & Pehl, M., 1 Jan 2021, Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Proceedings. Bhasin, S. & De Santis, F. (eds.). Springer Science and Business Media Deutschland GmbH, p. 279-302 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12910 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Moving Target Defense Strategy in Critical Embedded Systems: A Game-theoretic Approach
Ayrault, M., Borde, E., Kuhne, U. & Leneutre, J., 1 Jan 2021, Proceedings - 2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing, PRDC 2021. IEEE Computer Society, p. 27-36 10 p. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC; vol. 2021-December).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks
Danger, J. L., Facon, A., Guilley, S., Heydemann, K., Kühne, U., Merabet, A. S., Timbert, M. & Pecatte, B., 1 Jan 2021, Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, COSADE 2020, Revised Selected Papers. Bertoni, G. M. & Regazzoni, F. (eds.). Springer Science and Business Media Deutschland GmbH, p. 254-274 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12244 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Side channel attacks for architecture extraction of neural networks
Chabanne, H., Danger, J. L., Guiga, L. & Kühne, U., 1 Mar 2021, In: CAAI Transactions on Intelligence Technology. 6, 1, p. 3-16 14 p.Research output: Contribution to journal › Review article › peer-review
Open Access -
Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks
Chabanne, H., Danger, J. L., Guiga, L. & Kühne, U., 1 Jan 2021, Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings. Sako, K. & Tippenhauer, N. O. (eds.). Springer Science and Business Media Deutschland GmbH, p. 363-392 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12726 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
LAOCOÖN: A Run-Time Monitoring and Verification Approach for Hardware Trojan Detection
Danger, J. L., Fribourg, L., Kuhne, U. & Naceur, M., 1 Aug 2019, Proceedings - Euromicro Conference on Digital System Design, DSD 2019. Konofaos, N. & Kitsos, P. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 269-276 8 p. 8875250. (Proceedings - Euromicro Conference on Digital System Design, DSD 2019).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review