-
Notifications
You must be signed in to change notification settings - Fork 0
/
publications.html
199 lines (181 loc) · 43.9 KB
/
publications.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Damien Couroussé - publications</title>
<meta name="description" content="damien dot courousse dot fr">
<meta name="author" content="Damien Couroussé">
<link rel="stylesheet" href="https://unpkg.com/[email protected]/build/pure-min.css">
<!--[if lte IE 8]>
<link rel="stylesheet" href="/assets/css/side-menu-old-ie.css">
<![endif]-->
<!--[if gt IE 8]><!-->
<link rel="stylesheet" href="./assets/css/side-menu.css">
<!--<![endif]-->
<link rel="stylesheet" href="./assets/css/main.css">
<link rel="stylesheet" href="./assets/css/img-overlay.css">
</head>
<body>
<div id="layout">
<!-- Menu toggle -->
<a href="#menu" id="menuLink" class="menu-link">
<!-- Hamburger icon -->
<span></span>
</a>
<div id="menu">
<div class="pure-menu pure-menu-open">
<a class="pure-menu-heading" href="./index.html">Home</a>
<ul class="pure-menu-list">
<li class="pure-menu-item">
<a href="./publications.html" class="pure-menu-link">Publications</a>
</li>
<!-- <li class="pure-menu-item"> -->
<!-- <a href="/posts.html" class="pure-menu-link">Posts</a> -->
<!-- </li> -->
<!-- <li class="pure-menu-item"> -->
<!-- <a href="/sw.html" class="pure-menu-link">Software</a> -->
<!-- </li> -->
<!-- <li class="pure-menu-item"> -->
<!-- <a href="/expressions-urbaines.html" -->
<!-- class="pure-menu-link">Expressions urbaines</a> -->
<!-- </li> -->
</ul>
</div>
</div> <!-- /menu -->
<div id="main">
<div class="header">
<h1>publications</h1>
</div>
<div class="content">
<div class="pure-g">
<div class="pure-u-1">
<p style="text-align:center">
<a href="https://orcid.org/0000-0003-2761-3627">ORCID</a> - <a href="https://hal.science/search/index/?q=Damien+Courouss%2A&rows=30&sort=producedDate_tdate+desc">Archive ouverte HAL</a> - <a href="https://dblp.uni-trier.de/pers/hd/c/Courouss=eacute=:Damien">dblp</a> - <a href="http://scholar.google.fr/citations?user=obHNKMEAAAAJ">google Scholar</a> - <a href="http://www.researchgate.net/profile/Damien_Courousse">ResearchGate</a>
</p>
<p style="text-align:center">
<a href="#peer-reviewed-papers">peer-reviewed papers</a> - <a href="#invited-talks">invited talks</a> - <a href="#talks-and-posters">talks and posters</a> - <a href="#press">press</a> - <a href="#research-reports">research reports</a> - <a href="#phd-thesis">phd thesis</a> - <a href="#patents">patents</a>
</p>
<h1 id="peer-reviewed-papers">peer-reviewed papers</h1>
<p><span class="citation" data-cites="SellamiInferenceRobustReachability2024">Y. Sellami, G. Girol, F. Recoules, D. Couroussé, and S. Bardin “Inference of Robust Reachability Constraints,” in <em>POPL</em>, 2024.</span> <!-- here follow the markdown metadata --> [<a href="https://doi.org/10.1145/3632933">doi</a>] [<a href="pdf/2024-POPL.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="TollecuARCHIFIFormalModeling2023">S. Tollec, M. Asavoae, D. Couroussé, K. Heydemann, and M. Jan “ARCHIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections,” in <em>FMCAD</em>, 2023.</span> <!-- here follow the markdown metadata --> [<a href="https://doi.org/10.34727/2023/isbn.978-3-85448-060-0_18">doi</a>] [<a href="pdf/2023-FMCAD.pdf">preprint</a>] [<a href="https://cea.hal.science/cea-04215728">HAL</a>]</p>
<p><span class="citation" data-cites="CasalinoTaleResiliencePractical2023">L. Casalino, N. Belleville, D. Couroussé, and K. Heydeman “A Tale of Resilience: On the Practical Security of Masked Software Implementations,” <em>IEEE Access</em>, 2023.</span> <!-- here follow the markdown metadata --> [<a href="https://doi.org/10.1109/ACCESS.2023.3298436">doi</a>] [<a href="./pdf/2023-PPS.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="ChamelotMAFIAProtectingMicroarchitecture2023">T. Chamelot, D. Couroussé, and K. Heydemann “MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks,” <em>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)</em>, 2023.</span> <!-- here follow the markdown metadata --> [<a href="https://doi.org/10.1109/TCAD.2023.3276507">doi</a>] [<a href="./pdf/2023-MAFIA.pdf">preprint</a>] [<a href="http://arxiv.org/abs/2309.02255">arXiv</a>] [<a href="https://eprint.iacr.org/2023/1323">IACR ePrint</a>]</p>
<p><span class="citation" data-cites="Tollec2022:FDTC">S. Tollec, M. Asavoae, D. Couroussé, K. Heydemann, and M. Jan “Exploration of Fault Effects on Formal RISC-V Microarchitecture Models,” in <em>FDTC</em>, 2022.</span> <!-- here follow the markdown metadata --> [<a href="https://doi.org/10.1109/FDTC57191.2022.00017">doi</a>] [<a href="pdf/2022-FDTC.pdf">preprint</a>] [<a href="https://fdtc.deib.polimi.it/FDTC22/program.html">url</a>]</p>
<p><span class="citation" data-cites="Chamelot2022:DATE">T. Chamelot, D. Couroussé, and K. Heydeman “SCI-FI – Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks,” in <em>DATE</em>, 2022.</span> <!-- here follow the markdown metadata --> [<a href="https://dx.doi.org/10.23919/DATE54114.2022.9774685">doi</a>] [<a href="./pdf/2022-DATE-paper.pdf">preprint</a>] [<a href="https://ieeexplore.ieee.org/xpl/conhome/9774496/proceeding">url</a>]</p>
<p><span class="citation" data-cites="MorelCodepolymorphismmeets2021">L. Morel, D. Couroussé, and T. Hiscock “Code Polymorphism Meets Code Encryption: Confidentiality and Side-Channel Protection of Software Components,” <em>ACM Digital Threats: Research and Practice (DTRAP)</em>, 2021.</span> <!-- here follow the markdown metadata --> [<a href="https://dl.acm.org/doi/10.1145/3487058">doi</a>] [<a href="pdf/2021-DTRAP.pdf">preprint</a>] [<a href="https://cea.hal.science/cea-03605072v2">HAL</a>] [<a href="https://arxiv.org/abs/2310.07327">arXiv</a>]</p>
<p><span class="citation" data-cites="BellevillePROSECCOFormallyProvenSecure2021">N. Belleville, D. Couroussé, E. Encrenaz, K. Heydeman, and Q. Meunier “PROSECCO: Formally-Proven Secure Compiled Code,” in <em>C&ESAR</em>, 2021.</span> <!-- here follow the markdown metadata --> [<a href="https://www.cesar-conference.org/editions-precedentes/actes">url</a>] [<a href="./pdf/2021-CESAR.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="Maskara2020">N. Belleville, D. Couroussé, K. Heydemann, Q. Meunier, and I. Ben El Ouahma “Maskara: Compilation of a Masking Countermeasure with Optimised Polynomial Interpolation,” <em>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)</em>, 2020.</span> <!-- here follow the markdown metadata --> [<a href="https://www.esweek.org/cases">presented at CASES 2020</a>] [<a href="http://dx.doi.org/10.1109/TCAD.2020.3012237">doi</a>] [<a href="./pdf/2020-CASES.pdf">preprint</a>] [<a href="https://ieeexplore.ieee.org/abstract/document/9153055">url</a>]</p>
<p><span class="citation" data-cites="ESORICS2020">L. Masure, N. Belleville, E. Cagli, M.-A. Cornélie, D. Couroussé, C. Dumas, and L. Maingault “Deep Learning Side-Channel Analysis on Large-Scale Traces – a Case Study on a Polymorphic AES,” in <em>ESORICS</em>, 2020.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1007/978-3-030-58951-6_22">doi</a>] [<a href="./pdf/2020-ESORICS.pdf">preprint</a>] [<a href="https://www.surrey.ac.uk/esorics-2020">url</a>]</p>
<p><span class="citation" data-cites="NEWCAS2019">L. Morel and D. Couroussé “Idols with Feet of Clay: On the Security of Bootloaders and Firmware Updaters for the IoT,” in <em>NEWCAS</em>, 2019.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1109/NEWCAS44328.2019.8961216">doi</a>] [<a href="pdf/2019-NEWCAS-preprint.pdf">preprint</a>] [<a href="pdf/2019-NEWCAS-slides.pdf">slides</a>] [<a href="https://www.newcas2019.org">url</a>]</p>
<p><span class="citation" data-cites="TACO2019">N. Belleville, D. Couroussé, K. Heydemann, and H.-P. Charles “Automated Software Protection for the Masses against Side-Channel Attacks,” <em>ACM Transactions on Architecture and Code Optimization (TACO)</em>, 2019.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1145/3281662">doi</a>] [<a href="pdf/2019-TACO-preprint.pdf">preprint</a>] [<a href="pdf/2019-HiPEAC-slides.pdf">slides presented at HiPEAC 2019</a>]</p>
<p><span class="citation" data-cites="Belleville2017:CPSEd:book">N. Belleville, K. Heydemann, D. Couroussé, T. Barry, B. Robisson, A. Seriai, and H.-P. Charles “Automatic Application of Software Countermeasures against Physical Attacks,” in <em>Cyber-Physical Systems Security</em>, Springer, 2018.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1007/978-3-319-98935-8_7">doi</a>] [<a href="pdf/2018-CPSEd-preprint.pdf">preprint</a>] [<a href="https://link.springer.com/chapter/10.1007%2F978-3-319-98935-8_7">url</a>]</p>
<p><span class="citation" data-cites="CESAR2018">S. Kerroumi, D. Couroussé, F. Pebay-Peyroula, M. Ait Bendaoud, and A. Molnos “On the Applicability of Binary Classification to Detect Memory Access Attacks in IoT,” in <em>C&ESAR</em>, 2018.</span> <!-- here follow the markdown metadata --> [<a href="https://www.cesar-conference.org/editions-precedentes/actes">url</a>] [<a href="pdf/2018-CESAR.pdf">paper</a>] [<a href="pdf/2018-CESAR-slides.pdf">slides</a>]</p>
<p><span class="citation" data-cites="Abdellatif2017:CS2">K. M. Abdellatif, D. Couroussé, O. Potin, and P. Jaillon “Filtering-Based CPA: A Successful Side-Channel Attack against Desynchronization Countermeasures,” in <em>Workshop on Cryptography and Security in Computing Systems (CS2)</em>, 2017.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1145/3031836.3031842">doi</a>] [<a href="pdf/2017-CS2.pdf">preprint</a>] [<a href="http://www.cs2.deib.polimi.it">url</a>]</p>
<p><span class="citation" data-cites="WISTP2016:proceedings">D. Couroussé, T. Barry, B. Robisson, P. Jaillon, O. Potin, and J.-L. Lanet “Runtime Code Polymorphism as a Protection against Side Channel Attacks,” in <em>WISTP</em>, 2016.</span> <!-- here follow the markdown metadata --> [<a href="http://www.wistp.org/program">url</a>] [<a href="http://dx.doi.org/10.1007/978-3-319-45931-8_9">doi</a>] [<a href="https://eprint.iacr.org/2017/699">IACR ePrint</a>] [<a href="./pdf/Courousse2016-WISTP.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="Endo2016:MCSOC">F. A. Endo, D. Couroussé, and H.-P. Charles “Pushing the Limits of Online Auto-Tuning: Machine Code Optimization in Short-Running Kernels,” in <em>MCSoC</em>, 2016.</span> <!-- here follow the markdown metadata --> [<a href="http://mcsoc-forum.org">url</a>] [<a href="http://dx.doi.org/10.1109/MCSoC.2016.11">doi</a>] [<a href="./pdf/Endo2016-MCSOC.pdf">preprint</a>] [<a href="./pdf/Endo2016-MCSOC-extended-version.pdf">extended version</a>] [<a href="https://arxiv.org/abs/1707.04566">extended version on arXiv</a>]</p>
<p><span class="citation" data-cites="LeBouderTemplateAttackVERIFY2016">H. Le Bouder, T. Barry, D. Couroussé, J.-L. Lanet, and R. Lashermes “A Template Attack Against VERIFY PIN Algorithms,” in <em>SECRYPT</em>, 2016.</span> <!-- here follow the markdown metadata --> [<a href="http://www.icete.org/Abstracts/2016/SECRYPT_2016_Abstracts.htm">url</a>] [<a href="https://doi.org/10.5220/0005955102310238">doi</a>] [<a href="./pdf/2016-secrypt-preprint.pdf">preprint</a>] [<a href="./pdf/2016-secrypt-slides.pdf">slides</a>]</p>
<p><span class="citation" data-cites="LeBouder2016:CESAR">H. Le Bouder, R. Lashermes, J.-L. Lanet, T. Barry, and D. Couroussé “IoT and Physical Attacks,” in <em>C&ESAR</em>, 2016.</span> <!-- here follow the markdown metadata --> [<a href="http://www.cesar-conference.org">url</a>] [<a href="pdf/LeBouder2016-CESAR-abstract.pdf">abstract</a>] [<a href="https://www.cesar-conference.org/wp-content/uploads/2017/06/Actes_Cesar_2016.pdf">proceedings</a>]</p>
<p><span class="citation" data-cites="Barry2016:CS2">T. Barry, D. Couroussé, and B. Robisson “Compilation of a Countermeasure against Instruction-Skip Fault Attacks,” in <em>CS2</em>, 2016.</span> <!-- here follow the markdown metadata --> [<a href="pdf/Barry2016-CS2.pdf">preprint</a>] [<a href="pdf/Barry2016-CS2-slides.pdf">slides</a>] [<a href="http://www.cs2.deib.polimi.it">url</a>] [<a href="http://dx.doi.org/10.1145/2858930.2858931">doi</a>]</p>
<p><span class="citation" data-cites="Courousse2016:WAPCO">D. Couroussé, C. Quéva, and H.-P. Charles “Approximate Computing with Runtime Code Generation on Resource-Constrained Embedded Devices,” in <em>Workshop on Approximate Computing (WAPCO)</em>, 2016.</span> <!-- here follow the markdown metadata --> [<a href="pdf/Courousse2016-WAPCO.pdf">preprint</a>] [<a href="pdf/Courousse2016-WAPCO-slides.pdf">slides</a>] [<a href="http://wapco.inf.uth.gr">url</a>]</p>
<p><span class="citation" data-cites="Queva2016:ComNetIoT">C. Quéva, D. Couroussé, and H.-P. Charles “Self-Optimisation Using Runtime Code Generation for Wireless Sensor Networks,” in <em>Internet-of-Things Symposium, ESWeek 2015</em>, 2015.</span> <!-- here follow the markdown metadata --> [<a href="pdf/Queva2016-ComNet-IoT.pdf">preprint</a>] [<a href="pdf/Queva2016-ComNetIoT-slides.pdf">slides</a>] [<a href="http://www1.i2r.a-star.edu.sg/%20luot/comnet-iot2016">url</a>] [<a href="http://dx.doi.org/10.1145/2833312.2849557">doi</a>]</p>
<p><span class="citation" data-cites="Noura2015:AdHocNets">H. Noura and D. Couroussé “Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks,” in <em>Ad Hoc Networks</em>, 2015.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1007/978-3-319-25067-0_18">doi</a>]</p>
<p><span class="citation" data-cites="Endo2015:HiPEAC:RAPIDO">F. A. Endo, D. Couroussé, and H.-P. Charles “Micro-Architectural Simulation of Embedded Core Heterogeneity with Gem5 and McPAT,” in <em>RAPIDO</em>, 2015.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1145/2693433.2693440">doi</a>] [<a href="pdf/2015-Endo-HiPEAC-RAPIDO.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="Endo2015:HiPEAC:DCE">F. A. Endo, D. Couroussé, and H.-P. Charles “Towards a Dynamic Code Generator for Run-Time Self-Tuning Kernels in Embedded Application,” in <em>Workshop Dynamic Compilation Everywhere, in Conjunction with the 10th HiPEAC Conference</em>, 2015.</span> <!-- here follow the markdown metadata --> [<a href="pdf/2015-Endo-HiPEAC-DCE.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="CC2014">H.-P. Charles, D. Couroussé, V. Lomüller, F. A. Endo, and R. Gauguey “deGoal a Tool to Embed Dynamic Code Generators into Applications,” in <em>Compiler Construction</em>, 2014.</span> <!-- here follow the markdown metadata --> [<a href="https://dx.doi.org/10.1007/978-3-642-54807-9_6">doi</a>] [<a href="./pdf/CC2014-deGoal.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="Goubier2014:tauC">T. Goubier, D. Couroussé, and S. Azaiez “<span class="math inline"><em>τ</em></span>C: C with Process Network Extensions for Embedded Manycores,” in <em>International Conference on Computational Science</em>, 2014.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1016/j.procs.2014.05.099">doi</a>] [<a href="./pdf/Goubier2014-tauC-ALCHEMY.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="COGITO2014:SECRYPT">D. Couroussé, B. Robisson, J.-L. Lanet, T. Barry, H. Noura, P. Jaillon, and P. Lalevée “COGITO: Code Polymorphism to Secure Devices,” in <em>SECRYPT</em>, 2014.</span> <!-- here follow the markdown metadata --> [<a href="https://dx.doi.org/10.5220/0005113704510456">doi</a>] [<a href="./pdf/COGITO-SECRYPT2014.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="Endo2014:SAMOS">F. Endo, D. Couroussé, and H.-P. Charles “Micro-Architectural Simulation of in-Order and out-of-Order ARM Microprocessors with Gem5,” in <em>SAMOS</em>, 2014.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1109/SAMOS.2014.6893220">doi</a>] [<a href="./pdf/Endo2014-gem5-SAMOS.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="Courousse2013:springer">D. Couroussé, V. Lomüller, and H.-P. Charles “Introduction to Dynamic Code Generation – an Experiment with Matrix Multiplication for the STHORM Platform,” in <em>Smart Multicore Embedded Systems</em>, Springer, 2013.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1007/978-1-4614-8800-2_6">doi</a>] [<a href="./pdf/CLC2013-SmartMultiCores-ch6.pdf">preprint</a>] [<a href="./pdf/SMC2013-preface.pdf">preface</a>] [<a href="pdf/SMC2013-contents.pdf">book contents</a>]</p>
<p><span class="citation" data-cites="Aracil2013:ICEAC">C. Aracil and D. Couroussé “Software Acceleration of Floating-Point Multiplication Using Runtime Code Generation,” in <em>ICEAC</em>, 2013.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1109/ICEAC.2013.6737630">doi</a>] [<a href="./pdf/Aracil2013-ICEAC.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="Courousse2012:lctes">D. Couroussé and H.-P. Charles “Dynamic Code Generation: An Experiment on Matrix Multiplication,” in <em>Proceedings of the Work-in-Progress Session, LCTES 2012</em>, 2012.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/Courousse2012-LCTES.pdf">preprint</a>] [<a href="http://rw4.cs.uni-saarland.de/%20reineke/lctes2012wip.html">url</a>]</p>
<p><span class="citation" data-cites="Lhuillier2012:DCE">Y. Lhuillier and D. Couroussé “Embedded System Memory Allocator Optimization Using Dynamic Code Generation,” in <em>Workshop "Dynamic Compilation Everywhere", in Conjunction with the 7th HiPEAC Conference</em>, 2012.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/Lhuillier2012-DCE.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="Luciani2009">A. Luciani, J.-L. Florens, D. Couroussé, and J. Castet “Ergotic Sounds: A New Way to Improve Playability, Believability and Presence of Virtual Musical Instruments,” <em>Journal of New Music Research</em>, vol. 38, no. 3, pp. 309–323, 2009.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1080/09298210903359187Ergotic%20Sounds%20:%20A%20New%20Way%20to%20Improve%20Playability">doi</a>]</p>
<p><span class="citation" data-cites="Luciani2008:cyberworlds">A. Luciani, S. O’Modhrain, C. Magnusson, J.-L. Florens, and D. Couroussé “Perception of Virtual Multi-Sensory Objects: Some Musings on the Enactive Approach,” in <em>Cyberworlds</em>, 2008.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1109/CW.2008.107">doi</a>] [<a href="./pdf/Luciani2008-Cyberworlds.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="courousse07:functionalAnalysis">D. Couroussé and J.-L. Florens “Functional Analysis of Haptic Devices,” in <em>Proceedings of the 4th International Conference on Enactive Interfaces</em>, 2007.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/courousse07-functionalAnalysis.pdf">preprint</a>] [<a href="./pdf/courousse07-functionalAnalysis-slides.pdf">slides</a>] [<a href="http://acroe.imag.fr/enactive07/index.php?lang=fr">url</a>] [<a href="https://hal.archives-ouvertes.fr/hal-00439415/file/CoF07_Conf_ENACTIVE.pdf">HAL</a>]</p>
<p><span class="citation" data-cites="courousse07:lexiconCobot">D. Couroussé and J.-L. Florens “Cobot,” in <em>Enaction and Enactive Interfaces: A Handbook of Terms</em>, 2007, pp. 36–37.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/courousse07-lexiconCobot.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="courousse07:lexiconContactInteraction">D. Couroussé and J. J. Gil “Contact Interaction,” in <em>Enaction and Enactive Interfaces: A Handbook of Terms</em>, 2007, pp. 55–56.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/courousse07-lexiconContactInteraction.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="courousse07:lexiconHapticBoard">D. Couroussé “Haptic Board,” in <em>Enaction and Enactive Interfaces: A Handbook of Terms</em>, 2007, pp. 126–127.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/courousse07-lexiconHapticBoard.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="courousse07:lexiconMechanicalImpedance">D. Couroussé “Mechanical Impedance,” in <em>Enaction and Enactive Interfaces: A Handbook of Terms</em>, 2007, pp. 194–196.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/courousse07-lexiconMechanicalImpedance.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="courousse07:lexiconMotionCapture">D. Couroussé “Motion Capture,” in <em>Enaction and Enactive Interfaces: A Handbook of Terms</em>, 2007, pp. 201–203.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/courousse07-lexiconMotionCapture.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="luciani07:lexiconGestureMovementAction">A. Luciani, D. Couroussé, M. Evrard, and N. Castagné “Gesture, Movement, Action,” in <em>Enaction and Enactive Interfaces: A Handbook of Terms</em>, 2007, pp. 4–5.</span> <!-- here follow the markdown metadata --> [<a href="pdf/Luc2007-Chap-121-Lexicon-AL.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="castet07:EI07">J. Castet, J.-L. Florens, D. Couroussé, and A. Luciani “A Real-Time Simulator for Virtual Reality Conceived around Haptic Hard Constraints,” in <em>Proceedings of the 4th International Conference on Enactive Interfaces</em>, 2007.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/Castet2007-EI07.pdf">preprint</a>] [<a href="http://acroe.imag.fr/enactive07/index.php?lang=fr">url</a>]</p>
<p><span class="citation" data-cites="luciani07:e07:pebbleBox">A. Luciani, S. O’modhrain, C. Magnusson, J.-L. Florens, and D. Couroussé “Perception of Virtual Multisensory Mobile Objects – Wandering around the Enactive Assumption,” in <em>Proceedings of Enactive/07, 4th International Conference on Enactive Interfaces</em>, 2007.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/LOM07-Conf-ENACTIVE.pdf">preprint</a>] [<a href="http://acroe.imag.fr/enactive07/index.php?lang=fr">url</a>]</p>
<p><span class="citation" data-cites="courousse06:tappingHS06">D. Couroussé, J.-L. Florens, and A. Luciani “Effects of Stiffness on Tapping Performance,” in <em>HAPTICS</em>, 2006.</span> <!-- here follow the markdown metadata --> [<a href="http://dx.doi.org/10.1109/HAPTIC.2006.1627101">doi</a>] [<a href="./pdf/Courousse06-HAPTICS06-stiffness-tapping.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="courousse06:EH">D. Couroussé, G. Jansson, J.-L. Florens, and A. Luciani “Visual and Haptic Perception of Object Elasticity in a Squeezing Virtual Event,” in <em>EuroHaptics</em>, 2006.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/Courousse06-EH.pdf">preprint</a>] [<a href="http://eurohaptics.org/static/2006/finalprogramme.shtml">url</a>]</p>
<p><span class="citation" data-cites="luciani06:grapp">A. Luciani, M. Evrard, N. Castagné, D. Couroussé, J.-L. Florens, and C. Cadoz “A Basic Gesture and Motion Format for Virtual Reality Multisensory Applications,” in <em>GRAPP</em>, 2006.</span> <!-- here follow the markdown metadata --> [<a href="http://arxiv.org/abs/1005.4564">arXiv</a>] [<a href="./pdf/Luciani06-GRAPP.pdf">preprint</a>]</p>
<p><span class="citation" data-cites="courousse05:EI05">D. Couroussé, J.-L. Florens, and A. Luciani “Effects of Stiffness on Tapping Performance – Do We Rely on Force to Keep Synchronized along with a Metronome?” in <em>Proceedings of the Enactive05 Conference</em>, 2005.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/CFL05-Conf-ENACTIVE.pdf">preprint</a>]</p>
<h1 id="invited-talks">invited talks</h1>
<p><span class="citation" data-cites="OPTIMIST2024">D. Couroussé, K. Heydeman, and M. Jan “Fault Security Analysis and Verification: Challenges and New Directions.” OPTIMIST – Open Tools, Interfaces and Metrics for Implementation Security Testing, Halifax, NS, Canada, Sep-2024.</span> <!-- here follow the markdown metadata --> [<a href="https://optimist-workshop.github.io/">url</a>] [<a href="pdf/2024-OPTIMIST.pdf">slides</a>]</p>
<p><span class="citation" data-cites="SILM2019">D. Couroussé “Side-Channel Attacks and Software Countermeasures.” SILM - Security of Software / Hardware Interfaces. Summer School of the French "GdR Sécurité Informatique", Rennes, France, Jul-2019.</span> <!-- here follow the markdown metadata --> [<a href="https://silm-school.inria.fr">url</a>] [<a href="pdf/20190712-SILM-slides.pdf">slides</a>]</p>
<p><span class="citation" data-cites="LID2019">D. Couroussé “Securing Embedded Software with Compilers.” Leti Days, Cybersecurity workshop, Grenoble, France, Jun-2019.</span> <!-- here follow the markdown metadata --> [<a href="http://www.leti-innovation-days.com">url</a>] [<a href="pdf/2019-LID-slides.pdf">slides</a>]</p>
<p><span class="citation" data-cites="SSPREW2018">D. Couroussé “Tutorial: Side-channel Attacks on Embedded Systems.” SSPREW - Software Security, Protection, and Reverse Engineering Workshop; in conjunction with ACSAC 2018, Puerto Rico, USA, Dec-2018.</span> <!-- here follow the markdown metadata --> [<a href="http://www.pprew.org">url</a>] [<a href="pdf/2018-SSPREW.pdf">slides</a>] [<a href="pdf/2018-SSPREW-hands-on.pdf">hands-on</a>]</p>
<p><span class="citation" data-cites="CS22018">D. Couroussé, T. Barry, B. Robisson, N. Belleville, P. Jaillon, O. Potin, H. Le Bouder, J.-L. Lanet, and K. Heydemann “All Paths Lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems,” in <em>Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems</em>, 2018.</span> <!-- here follow the markdown metadata --> [<a href="http://www.cs2.deib.polimi.it">url</a>] [<a href="pdf/CS22018-slides.pdf">slides</a>] [<a href="pdf/CS22018.pdf">extended abstract</a>]</p>
<p><span class="citation" data-cites="WISG17">D. Couroussé “COGITO – Runtime Code Generation to Secure Devices.” Workshop Interdisciplinaire sur la Sécurité Globale – WISG 17, Paris, France, Sep-2017.</span> <!-- here follow the markdown metadata --> [<a href="http://www.wisg.fr/programme.html">url</a>] [<a href="pdf/20170915-COGITO-WISG.pdf">slides</a>]</p>
<p><span class="citation" data-cites="Courousse2017:ISSISP">D. Couroussé “Compilation Pour La Sécurité Des Systèmes Embarqués.” ISSISP 2017 – 8th International Summer School on Information Security and Protection, Gif-sur-Yvette, France, Jul-2017.</span> <!-- here follow the markdown metadata --> [<a href="https://issisp2017.github.io">url</a>] [<a href="pdf/20170721-ISSISP-CEA-overview.pdf">intro</a>] [<a href="pdf/20170721-ISSISP-part-I.pdf">part I</a>] [<a href="pdf/20170721-ISSISP-part-II.pdf">part II</a>]</p>
<p><span class="citation" data-cites="Courousse2016:sertif">D. Couroussé “Compilation for Cybersecurity in Embedded Systems.” Workshop SERTIF : Simulation pour l’Evaluation de la RobusTesse des applications embarquées contre l’Injection de Fautes, Grenoble, France, Oct-2016.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/2016-SERTIF.pdf">slides</a>] [<a href="http://sertif-projet.forge.imag.fr/fr/pages/workshop.html">url</a>]</p>
<p><span class="citation" data-cites="Courousse2016:cyberinbretagne">D. Couroussé “Compilation Pour La Sécurité Des Systèmes Embarqués.” Summer School Cyber in Bretagne, Rennes, France, Jul-2016.</span> <!-- here follow the markdown metadata --> [<a href="https://project.inria.fr/cyberinbretagne">url</a>]</p>
<p><span class="citation" data-cites="Courousse2015:IRISA">D. Couroussé “Runtime Code Generation for Performance and Security in Embedded Systems.” Séminaire sécurité des systèmes électroniques embarqués, DGA-IRISA., Rennes, France, Oct-2015.</span> <!-- here follow the markdown metadata --> [<a href="pdf/Courousse2015-IRISA-slides.pdf">refslides</a>] [<a href="http://securite-elec.irisa.fr/2015/list_fr.html">url</a>]</p>
<p><span class="citation" data-cites="Courousse2015:LSL">D. Couroussé “Génération de Code Au Runtime : Applications à La Performance et à La Sécurité Des Systèmes Embarqués.” Séminaire CEA LSL, Saclay, France, Mar-2015.</span> <!-- here follow the markdown metadata --> [<a href="http://sebastien.bardin.free.fr/seminaire.html">url</a>]</p>
<h1 id="talks-and-posters">talks and posters</h1>
<p><span class="citation" data-cites="ChamelotMAFIAProtectingMicroarchitecture2023a">T. Chamelot, D. Couroussé, and K. Heydeman “MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks.” TASER, Prague, 2023.</span> <!-- here follow the markdown metadata --> [<a href="https://ches.iacr.org/2023/forum.php">url</a>] [<a href="pdf/2023-TASER.pdf">slides</a>]</p>
<p><span class="citation" data-cites="Tollec2022:JAIF">S. Tollec, M. Asavoae, D. Couroussé, K. Heydeman, and M. Jan “Exploration of Fault Effects on Formal RISC-V Microarchitecture Models.” JAIF, Valence, 2022.</span> <!-- here follow the markdown metadata --> [<a href="https://jaif.io/2022/programme.html">url</a>] [<a href="pdf/2022-JAIF-Tollec.pdf">slides</a>]</p>
<p><span class="citation" data-cites="Tollec2022:RISCVweek">S. Tollec, M. Asavoae, D. Couroussé, K. Heydeman, and M. Jan “Formal Analysis of Fault Injection Effects on RISC-V Microarchitecture Models.” RISC-V week, Paris, France, May-2022.</span> <!-- here follow the markdown metadata --> [<a href="pdf/2022-RISCVweek-Tollec.pdf">poster</a>] [<a href="https://open-src-soc.org/2022-05/posters.html">url</a>]</p>
<p><span class="citation" data-cites="Chamelot2022:RISCVweek">T. Chamelot, D. Couroussé, and K. Heydeman “SCI-FI: Control Signal, Code, and Control-Flow Integrity against Fault Injection Attacks.” RISC-V week, Paris, France, May-2022.</span> <!-- here follow the markdown metadata --> [<a href="pdf/2022-RISCVweek-Chamelot.pdf">poster</a>] [<a href="https://open-src-soc.org/2022-05/posters.html">url</a>]</p>
<p><span class="citation" data-cites="Chamelot2021:JAIF">T. Chamelot, D. Couroussé, and K. Heydeman “SCI-FI – Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks.” JAIF, Paris, 2021.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/2021-JAIF-slides">slides</a>] [<a href="https://jaif.io/2021/programme.html">url</a>]</p>
<p><span class="citation" data-cites="GDROndes2019">L. Morel and D. Couroussé “Idols with Feet of Clay: On the Security of Bootloaders and Firmware Updaters for the IoT.” Journée thématique "Sécurité des systèmes électroniques et communicants", GDR Onde - GT5 CEM, Paris, Jussieu, May-2019.</span> <!-- here follow the markdown metadata --> [<a href="http://gdr-ondes.cnrs.fr/2019/02/14/journee-thematique-securite-des-systemes-electroniques-et-communicants-21-mai-2019-paris-jussieu">url</a>] [<a href="pdf/2019-GDROndes-slides.pdf">slides</a>]</p>
<p><span class="citation" data-cites="ADTC2018">L. Morel, D. Couroussé, A. Battistello, E. Poiret, V. Servant, A. Castillefo, O. Caffin, G. Neumann, D. Hely, and P. Genestier “The Emergence of New IoT Threats and HealthCare Mobile Applications.” ADTC - Nanoelectronics, Applications, Design & Technology Conference, Grenoble, France, 2018.</span> <!-- here follow the markdown metadata --> [<a href="http://tima.imag.fr/sls/dtc/">url</a>] [<a href="pdf/2018-ADTC.pdf">slides</a>]</p>
<p><span class="citation" data-cites="JAIF2018:Paris">L. Morel, M.-L. Potet, D. Couroussé, L. Mounier, and L. Maingault “Towards Fault Analysis of Firmware Updaters.” JAIF – Journée thématique sur les attaques par injection de fautes, Sorbonne Univ., Paris, 2018.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/2018-JAIF-MLPotet.pdf">slides-part1</a>] [<a href="./pdf/2018-JAIF-Lionel.pdf">slides-part2</a>] [<a href="https://jaif.io/2018/jaif.html">url</a>]</p>
<p><span class="citation" data-cites="PHISIC2018">N. Belleville, D. Couroussé, K. Heydeman, and H.-P. Charles “Automated Software Protection for the Masses against Side-Channel Attacks.” PHISIC - Workshop on Practical Hardware Innovation in Security and Characterization, 2018.</span> <!-- here follow the markdown metadata --> [<a href="pdf/2018-PHISIC-slides.pdf">slides</a>] [<a href="http://phisic2018.emse.fr/program.php">url</a>]</p>
<p><span class="citation" data-cites="TrevisanJostApproxRISCapproximatecomputing2018">T. Trevisan Jost, G. Ndour, D. Couroussé, C. Fabre, and A. Molnos “ApproxRISC: An Approximate Computing Infrastructure for RISC-V.” RISC-V Workshop, Barcelona, Spain, May-2018.</span> <!-- here follow the markdown metadata --> [<a href="https://riscv.org/proceedings/2018/05/risc-v-workshop-in-barcelona-proceedings">url</a>] [<a href="https://hal-cea.archives-ouvertes.fr/cea-01893469">hal</a>] [<a href="https://hal-cea.archives-ouvertes.fr/cea-01893469/file/2018-05-07-RiscV-Workshop-appoximate-poster.pdf">pdf</a>]</p>
<p><span class="citation" data-cites="Belleville2017:CPSEd:talk">N. Belleville, T. Barry, A. Seriai, D. Couroussé, K. Heydemann, H.-P. Charles, and B. Robisson “The Multiple Ways to Automate the Application of Software Countermeasures against Physical Attacks: Pitfalls and Guidelines.” Cyber-Physical Security Education Workshop, 2017.</span> <!-- here follow the markdown metadata --> [<a href="http://koclab.cs.ucsb.edu/cpsed">url</a>] [<a href="http://koclab.cs.ucsb.edu/cpsed/files/Belleville.pdf">slides</a>]</p>
<p><span class="citation" data-cites="DAC2017">E. Beigné, I. Miro-Panades, A. Valentian, J.-F. Christmann, S. Bacles-Min, A. Verdant, G. Sicard, C. Jany, B. Martineau, D. Morche, C. Bernier, A. Molnos, D. Couroussé, S. Lesecq, G. Pillonnet, A. Quelen, and F. Badets “L-Iot: A Flexible Energy Efficient Platform Targeting Wide Range ioT Applications,” in <em>DAC IP-Track Session, Best Presentation Award</em>, 2017.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/DAC2017-LIOT-IPtrack.pdf">slides</a>]</p>
<p><span class="citation" data-cites="EuroLLVM2017">T. Barry, D. Couroussé, K. Heydeman, and Bruno Robisson “Automated Combination of Tolerance and Control Flow Integrity Countermeasures against Multiple Fault Attacks.” European LLVM Developers Meeting, 2017.</span> <!-- here follow the markdown metadata --> [<a href="http://llvm.org/devmtg/2017-03//2017/02/20/accepted-sessions.html">url</a>] [<a href="pdf/Barry2017-EuroLLVM-slides.pdf">slides</a>] [<a href="pdf/Barry2017-EuroLLVM-abstract.pdf">abstract</a>]</p>
<p><span class="citation" data-cites="Courousse2016:aussois">D. Couroussé “Compilation and Cybersecurity in Embedded Systems.” 11e rencontre de la communauté française de compilation, Aussois, France, Sep-2016.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/2016-Aussois.pdf">slides</a>] [<a href="http://compilfr.ens-lyon.fr/onzieme-rencontre-compilation">url</a>]</p>
<p><span class="citation" data-cites="Courousse2016:RESSI">D. Couroussé “Génération de Code Au Runtime Pour La Sécurité Des Systèmes Embarqués.” Rendez-vous de la Recherche et de l’Enseignement de la Sécurité des systèmes d’information (RESSI), Toulouse, France, May-2016.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/2016-RESSI.pdf">slides</a>] [<a href="https://ressi2016.sciencesconf.org/">url</a>]</p>
<p><span class="citation" data-cites="WISG2016">D. Couroussé, O. Potin, B. Robisson, T. Barry, K. Abdelatif, P. Jaillon, H. Le Bouder, and J.-L. Lanet “Génération de Code Au Runtime Pour La Sécurisation de Composants.” Workshop Interdisciplinaire sur la Sécurité Globale (WISG), Troyes, France, Feb-2016.</span> <!-- here follow the markdown metadata --> [<a href="pdf/COGITO-WISG2016-poster.pdf">poster</a>] [<a href="http://www.wisg.fr">url</a>]</p>
<p><span class="citation" data-cites="Queva2015:IoTsymposiumESWeek">C. Quéva, D. Couroussé, and H.-P. Charles “Self-Optimisation Using Runtime Code Generation for Wireless Sensor Networks,” in <em>Internet-of-Things Symposium, ESWeek 2015</em>, 2015.</span> <!-- here follow the markdown metadata --> [<a href="pdf/Queva2016-ComNet-IoT.pdf">preprint</a>] [<a href="pdf/Queva2016-ComNetIoT-slides.pdf">slides</a>] [<a href="http://www1.i2r.a-star.edu.sg/%20luot/comnet-iot2016">url</a>] [<a href="http://dx.doi.org/10.1145/2833312.2849557">doi</a>]</p>
<p><span class="citation" data-cites="Barry2015:CHES">T. Barry, D. Couroussé, and B. Robisson “Compiler-Based Countermeasure against Fault Attacks.” Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2015.</span> <!-- here follow the markdown metadata --></p>
<p><span class="citation" data-cites="Courousse2015:CHES">D. Couroussé, T. Barry, B. Robisson, P. Jaillon, J.-L. Lanet, and O. Potin “Runtime Code Polymorphism as a Protection against Physical Attacks.” Workshop on Cryptographic Hardware; Embedded Systems (CHES), 2015.</span> <!-- here follow the markdown metadata --> [<a href="pdf/Courousse2015-CHES-poster.pdf">poster</a>] [<a href="https://www.cryptoexperts.com/ches2015/posters.html">url</a>]</p>
<p><span class="citation" data-cites="Courousse2014:CompilationNice">D. Couroussé “COGITO: Runtime Code Generation to Secure Devices.” 8e rencontres de la communauté française de compilation, Nice, France, Jul-2014.</span> <!-- here follow the markdown metadata --> [<a href="http://compilfr.ens-lyon.fr/huitiemes-rencontres-de-la-communaute-francaise-de-compilation">refurl</a>]</p>
<h1 id="press">press</h1>
<p><span class="citation" data-cites="IOL2018">Intelligence~Online “Odo Software Prototype Provides Solution to Sophisticated Cyber-Spying,” <em>Intelligence Online</em>, Nov. 2018.</span> <!-- here follow the markdown metadata --> [<a href="https://www.intelligenceonline.com/surveillance–interception/2018/11/27/odo-software-prototype-provides-solution-to-sophisticated-cyber-spying">url</a>]</p>
<p><span class="citation" data-cites="LeMonde2017">D. Larousserie “Lutter Contre La Contrefaçon de Composants Électroniques,” <em>Le Monde</em>, Dec. 2016.</span> <!-- here follow the markdown metadata --> [<a href="pdf/20161207-lemonde-composants-elec.pdf">pdf</a>]</p>
<h1 id="research-reports">research reports</h1>
<p><span class="citation" data-cites="Noura2015:IACRePrint">H. Noura and D. Couroussé “HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network.” Cryptology ePrint Archive, Report 2015/928, 2015.</span> <!-- here follow the markdown metadata --> [<a href="pdf/Noura2015-IACRePrint.pdf">preprint</a>] [<a href="http://eprint.iacr.org/2015/928">url</a>]</p>
<p><span class="citation" data-cites="enactive2007:WP3D1">J.-L. Florens, A. Luciani, D. Couroussé, D. Urma, S. Marliere, A. Frisoli, M. Fontana, M. Raspolli, I. Summers, A. Brady, J. Savall, E. Sanchez, B. Benoit, K. Johl, N. Sporer, C. Preusche, and G. Essl “State of the Art on Existing Sensors/Actuators Technologies for Haptic Interfaces,” vol. D3.1, J. L. Florens and D. Couroussé, Eds. ENACTIVE Interfaces NoE, 2007, p. 257.</span> <!-- here follow the markdown metadata --> [<a href="pdf/EI-WP3-D1.pdf">pdf</a>]</p>
<h1 id="phd-thesis">phd thesis</h1>
<p><span class="citation" data-cites="courousse08:PhDThesis">D. Couroussé “”Haptic Processor Unit” : Vers Une Plate-Forme Transportable Pour La Simulation Temps-Réel Synchrone Multisensorielle,” thèse de doctorat, Institut National Polytechnique de Grenoble, Grenoble, France, 2008.</span> <!-- here follow the markdown metadata --> [<a href="./pdf/Courousse2008-PhD-thesis.pdf">PhD thesis</a>] [<a href="./pdf/Courousse2008-PhD-thesis-slides.pdf">slides</a>]</p>
<h1 id="patents">patents</h1>
<p><span class="citation" data-cites="brevet:kMSD2018">N. Belleville and D. Couroussé “Method for executing a function, by a microprocessor, secured by time desynchronisation,” FR20180056781, WO2019FR51640, 2018.</span> <!-- here follow the markdown metadata --> [<a href="https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210602&CC=EP&NR=3827549A1&KC=A1">url</a>]</p>
<p><span class="citation" data-cites="BTHCODE2017:brevet">D. Couroussé “Method of executing a machine code of a secure function,” WO2018FR52263, FR20170058799, 2017.</span> <!-- here follow the markdown metadata --> [<a href="https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20190328&DB=&locale=&CC=WO&NR=2019058047A1&KC=A1&ND=1">url</a>]</p>
<p><span class="citation" data-cites="BTCFID2017:brevet">T. Barry, D. Couroussé, and K. Heydemann “Method for executing a machine code of a secure function,” ICG020511, FR20170053175, WO2018FR50678, 2017.</span> <!-- here follow the markdown metadata --> [<a href="https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20181018&DB=&CC=WO&NR=2018189443A1&KC=A1&ND=5">url</a>]</p>
<p><span class="citation" data-cites="Courousse2016:brevet:chiffrementpolymorphe">D. Couroussé, T. Hiscock, and O. Savry “Procédé d’exécution par un microprocesseur d’un code machine polymorphique d’une fonction prédéterminée,” IGC020502, 2016.</span> <!-- here follow the markdown metadata --> [<a href="https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20200319&DB=EPODOC&CC=US&NR=2020089919A1">url</a>]</p>
<p><span class="citation" data-cites="Queva2015:brevetB">D. Couroussé, C. Quéva, and Yves Lhuillier “Method for executing a computer program with a parameterised function,” WO2016FR51584, FR3038087 (A1), 2015.</span> <!-- here follow the markdown metadata --> [<a href="https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170105&DB=EPODOC&CC=WO&NR=2017001754A1&KC=A1&ND=4">url</a>]</p>
<p><span class="citation" data-cites="Queva2015:brevetA">D. Couroussé, C. Quéva, and Yves Lhuillier “Method for executing a computer program with a parameterised function,” WO2016FR51583, FR3038086 (A1), 2015.</span> <!-- here follow the markdown metadata --> [<a href="https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170105&DB=EPODOC&CC=WO&NR=2017001753A1&KC=A1&ND=4">url</a>]</p>
<p><span class="citation" data-cites="Noura2014:brevet">H. Noura and D. Couroussé “Method of encryption with dynamic diffusion and confusion layers,” FR20140061917, WO2015EP78372, 2014.</span> <!-- here follow the markdown metadata --> [<a href="https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20160609&DB=EPODOC&CC=WO&NR=2016087520A1&KC=A1&ND=4">url</a>]</p>
<p><span class="citation" data-cites="Courousse2013:brevet">D. Couroussé “Method of executing, by a microprocessor, a polymorphic binary code of a predetermined function,” FR20130059473, US2015095659, 2013.</span> <!-- here follow the markdown metadata --> [<a href="https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20150402&DB=&CC=US&NR=2015095659A1&KC=A1&ND=4">url</a>]</p>
</div>
</div> <!-- pure-g -->
</div> <!-- /content -->
</div> <!-- /main -->
<footer id="footer">
<div class="footer">
<p style="text-align:center; font-size:75%">
Site generated by <a href="https://jaspervdj.be/hakyll">Hakyll</a>
and <a href="https://pandoc.org">pandoc</a>
</p>
<p style="text-align:center; font-size:75%">
<a href="https://github.com/damiencourousse/website/commits/master">
Page last modified
by commit fb2d0c0,
Tue, 10 Sep 2024 12:29:23 +0200
</a>
</p>
<br>
</div>
</footer>
</div> <!-- /layout -->
<script src="./assets/js/ui.js"></script>
</body>
</html>