default search action
Damien Couroussé
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Yanis Sellami, Guillaume Girol, Frédéric Recoules, Damien Couroussé, Sébastien Bardin:
Inference of Robust Reachability Constraints. Proc. ACM Program. Lang. 8(POPL): 2731-2760 (2024) - [j5]Simon Tollec, Vedad Hadzic, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard:
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 179-204 (2024) - [i10]Simon Tollec, Vedad Hadzic, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard:
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. IACR Cryptol. ePrint Arch. 2024: 247 (2024) - 2023
- [j4]Lorenzo Casalino, Nicolas Belleville, Damien Couroussé, Karine Heydemann:
A Tale of Resilience: On the Practical Security of Masked Software Implementations. IEEE Access 11: 84651-84669 (2023) - [j3]Thomas Chamelot, Damien Couroussé, Karine Heydemann:
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4555-4568 (2023) - [c22]Simon Tollec, Mihail Asavoae, Damien Couroussé, Karine Heydemann, Mathieu Jan:
μARCHIFI: Formal Modeling and Verification Strategies for Microarchitectural Fault Injections. FMCAD 2023: 101-109 - [i9]Thomas Chamelot, Damien Couroussé, Karine Heydemann:
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks. CoRR abs/2309.02255 (2023) - [i8]Lionel Morel, Damien Couroussé, Thomas Hiscock:
Code Polymorphism Meets Code Encryption: Confidentiality and Side-Channel Protection of Software Components. CoRR abs/2310.07327 (2023) - [i7]Thomas Chamelot, Damien Couroussé, Karine Heydemann:
MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2023: 1323 (2023) - 2022
- [c21]Thomas Chamelot, Damien Couroussé, Karine Heydemann:
SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks. DATE 2022: 556-559 - [c20]Simon Tollec, Mihail Asavoae, Damien Couroussé, Karine Heydemann, Mathieu Jan:
Exploration of Fault Effects on Formal RISC-V Microarchitecture Models. FDTC 2022: 73-83 - 2020
- [j2]Nicolas Belleville, Damien Couroussé, Karine Heydemann, Quentin L. Meunier, Inès Ben El Ouahma:
Maskara: Compilation of a Masking Countermeasure With Optimized Polynomial Interpolation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(11): 3774-3786 (2020) - [c19]Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault:
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES. ESORICS (1) 2020: 440-460 - [i6]Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault:
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES. IACR Cryptol. ePrint Arch. 2020: 881 (2020)
2010 – 2019
- 2019
- [j1]Nicolas Belleville, Damien Couroussé, Karine Heydemann, Henri-Pierre Charles:
Automated Software Protection for the Masses Against Side-Channel Attacks. ACM Trans. Archit. Code Optim. 15(4): 47:1-47:27 (2019) - [c18]Lionel Morel, Damien Couroussé:
Idols with Feet of Clay: On the Security of Bootloaders and Firmware Updaters for the IoT. NEWCAS 2019: 1-4 - 2018
- [c17]Damien Couroussé, Thierno Barry, Bruno Robisson, Nicolas Belleville, Philippe Jaillon, Olivier Potin, Hélène Le Bouder, Jean-Louis Lanet, Karine Heydemann:
All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. CS2@HiPEAC 2018: 17-18 - [p1]Nicolas Belleville, Karine Heydemann, Damien Couroussé, Thierno Barry, Bruno Robisson, Abderrahmane Seriai, Henri-Pierre Charles:
Automatic Application of Software Countermeasures Against Physical Attacks. Cyber-Physical Systems Security 2018: 135-155 - [i5]Nicolas Belleville, Damien Couroussé, Karine Heydemann, Henri-Pierre Charles:
Automated software protection for the masses against side-channel attacks. IACR Cryptol. ePrint Arch. 2018: 1197 (2018) - 2017
- [c16]Karim M. Abdellatif, Damien Couroussé, Olivier Potin, Philippe Jaillon:
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures. CS2@HiPEAC 2017: 29-32 - [i4]Fernando Akira Endo, Damien Couroussé, Henri-Pierre Charles:
Pushing the Limits of Online Auto-tuning: Machine Code Optimization in Short-Running Kernels. CoRR abs/1707.04566 (2017) - [i3]Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. IACR Cryptol. ePrint Arch. 2017: 699 (2017) - 2016
- [c15]Thierno Barry, Damien Couroussé, Bruno Robisson:
Compilation of a Countermeasure Against Instruction-Skip Fault Attacks. CS2@HiPEAC 2016: 1-6 - [c14]Caroline Quéva, Damien Couroussé, Henri-Pierre Charles:
Self-optimisation using runtime code generation for wireless sensor networks. ICDCN 2016: 36:1-36:6 - [c13]Fernando Akira Endo, Damien Couroussé, Henri-Pierre Charles:
Pushing the Limits of Online Auto-Tuning: Machine Code Optimization in Short-Running Kernels. MCSoC 2016: 265-272 - [c12]Hélène Le Bouder, Thierno Barry, Damien Couroussé, Jean-Louis Lanet, Ronan Lashermes:
A Template Attack Against VERIFY PIN Algorithms. SECRYPT 2016: 231-238 - [c11]Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. WISTP 2016: 136-152 - 2015
- [c10]Hassan Noura, Damien Couroussé:
Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks. ADHOCNETS 2015: 225-236 - [c9]Fernando Akira Endo, Damien Couroussé, Henri-Pierre Charles:
Micro-architectural simulation of embedded core heterogeneity with gem5 and McPAT. RAPIDO@HiPEAC 2015: 7:1-7:6 - [i2]Hassan Noura, Damien Couroussé:
HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2015: 928 (2015) - 2014
- [c8]Henri-Pierre Charles, Damien Couroussé, Victor Lomüller, Fernando Akira Endo, Rémy Gauguey:
deGoal a Tool to Embed Dynamic Code Generators into Applications. CC 2014: 107-112 - [c7]Thierry Goubier, Damien Couroussé, Selma Azaiez:
τ C: C with Process Network Extensions for Embedded Manycores. ICCS 2014: 1100-1112 - [c6]Fernando Akira Endo, Damien Couroussé, Henri-Pierre Charles:
Micro-architectural simulation of in-order and out-of-order ARM microprocessors with gem5. ICSAMOS 2014: 266-273 - [c5]Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon, Philippe Lalevée:
COGITO: Code Polymorphism to Secure Devices. SECRYPT 2014: 451-456 - 2013
- [c4]Charles Aracil, Damien Couroussé:
Software acceleration of floating-point multiplication using runtime code generation - Student paper. ICEAC 2013: 18-23 - 2010
- [i1]Annie Luciani, Matthieu Evrard, Damien Couroussé, Nicolas Castagné, Claude Cadoz, Jean-Loup Florens:
A basic gesture and motion format for virtual reality multisensory applications. CoRR abs/1005.4564 (2010)
2000 – 2009
- 2008
- [b1]Damien Couroussé:
"Haptic Processor Unit" : vers une Plate-Forme Transportable pour la Simulation Temps-Réel Synchrone Multisensorielle. ("Haptic Processor Unit" : Towards a Transportable Platform for Synchronous Multisensory Real-Time Simulation). Grenoble Institute of Technology, France, 2008 - [c3]Annie Luciani, M. Sile O'Modhrain, Charlotte Magnusson, Jean-Loup Florens, Damien Couroussé:
Perception of Virtual Multi-Sensory Objects: Some Musings on the Enactive Approach. CW 2008: 354-360 - 2006
- [c2]Annie Luciani, Matthieu Evrard, Damien Couroussé, Nicolas Castagné, Claude Cadoz, Jean-Loup Florens:
A basic gesture and motion format for virtual reality multisensory applications. GRAPP 2006: 349-356 - [c1]Damien Couroussé, Jean-Loup Florens, Annie Luciani:
Effects of Stiffness on Tapping Performance. HAPTICS 2006: 65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 01:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint