Name
Affiliation
Papers
VINCENT BEROULLE
Grenoble Institute of Technology
52
Collaborators
Citations 
PageRank 
126
86
21.86
Referers 
Referees 
References 
241
631
305
Search Limit
100631
Title
Citations
PageRank
Year
An In-Depth Vulnerability Analysis of RISC-V Micro-Architecture Against Fault Injection Attack00.342021
Cross-layer Approach to Assess FMEA on Critical Systems and Evaluate High-Level Model Realism00.342021
MaDMAN: Detection of Software Attacks Targeting Hardware Vulnerabilities00.342021
Clock skew-based physical authentication protocol for 802.15.4 IR-UWB indoor positioning.00.342020
Cross Layer Fault Simulations for Analyzing the Robustness of RTL Designs in Airborne Systems00.342020
PUF Enrollment and Life Cycle Management: Solutions and Perspectives for the Test Community10.452020
High Level Fault Injection Method for Evaluating Critical System Parameter Ranges00.342020
Machine Learning and Hardware security - Challenges and Opportunities -Invited Talk-.00.342020
Analyzing Software Security Against Complex Fault Models with Frama-C Value Analysis00.342019
An Optimized NS2 Module for UHF Passive RFID Systems00.342019
On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks10.362019
Security Evaluation with an Indoor UWB Localization Open Platform: Acknowledgment Attack Case Study00.342019
Fault Injection on Hidden Registers in a RISC-V Rocket Processor and Software Countermeasures10.352019
Cross-layer analysis of software fault models and countermeasures against hardware fault attacks in a RISC-V processor10.382019
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection00.342019
Laser Fault Injection at the CMOS 28 nm Technology Node: an Analysis of the Fault Model50.452018
The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks20.442018
On the Importance of Analysing Microarchitecture for Accurate Software Fault Models20.452018
Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag.00.342018
Time Modeling with NS2 in UHF RFID Anti-Collision Protocols10.382018
ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods.10.372018
ElectroMagnetic Attack Test Platform for Validating RFID Tag Architectures00.342018
Guidelines for the Choice of a Wireless Secure Positioning and Communication System10.372018
A global approach for the improvement of UHF RFID safety and security00.342017
Analysis of laser-induced errors: RTL fault models versus layout locality characteristics.00.342016
On the development of a new countermeasure based on a laser attack RTL fault model00.342016
How logic masking can improve path delay analysis for Hardware Trojan detection00.342016
Clock generator behavioral modeling for supply voltage glitch attack effects analysis.00.342016
On fault injections for early security evaluation vs. laser-based attacks00.342016
ECDSA Passive Attacks, Leakage Sources, and Common Design Mistakes.10.402016
Validation of RTL laser fault injection model with respect to layout information20.382015
Facilitating side channel analysis by obfuscation for Hardware Trojan detection00.342015
Laser-Induced Fault Effects In Security-Dedicated Circuits30.532014
A multiple fault injection methodology based on cone partitioning towards RTL modeling of laser attacks50.472014
Voltage Glitch Attacks on Mixed-Signal Systems40.392014
Evaluation of a new RFID system performance monitoring approach00.342012
Towards middleware-based fault-tolerance in RFID systems00.342011
Read rate profile monitoring for defect detection in RFID Systems.20.442011
SystemC modeling of RFID systems for robustness analysis20.462011
RFID System On-line Testing Based on the Evaluation of the Tags Read-Error-Rate71.282011
Towards an unified IP verification and robustness analysis platform20.482011
Design-for-test approach of an asynchronous network-on-chip architecture and its associated test pattern generation and application70.852009
Choice of a high-level fault model for the optimization of validation test set reused for manufacturing test10.392008
Decreasing Test Qualification Time in AMS and RF Systems10.432008
A Design-for-Test Implementation of an Asynchronous Network-on-Chip Architecture and its Associated Test Pattern Generation and Application30.402008
Qualification Of Behavioral Level Design Validation For Ams & Rf Socs00.342007
Impact Of Hardware Emulation On The Verification Quality Improvement20.532007
Functional Verification of RTL Designs driven by Mutation Testing metrics130.782007
Implementation of a Design-for-Test Architecture for Asynchronous Networks-on-Chip20.432007
A DFT Architecture for Asynchronous Networks-on-Chip110.662006
  • 1
  • 2