Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification. | 0 | 0.34 | 2022 |
Exploration of Fault Effects on Formal RISC-V Microarchitecture Models | 0 | 0.34 | 2022 |
ARMISTICE: Microarchitectural Leakage Modeling for Masked Software Formal Verification | 0 | 0.34 | 2022 |
SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks | 0 | 0.34 | 2022 |
Reconciling optimization with secure compilation | 0 | 0.34 | 2021 |
LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions. | 0 | 0.34 | 2021 |
Maskara: Compilation of a Masking Countermeasure With Optimized Polynomial Interpolation | 0 | 0.34 | 2020 |
A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective | 2 | 0.36 | 2019 |
Studying EM Pulse Effects on Superscalar Microarchitectures at ISA Level. | 0 | 0.34 | 2019 |
Side-channel robustness analysis of masked assembly codes using a symbolic approach | 0 | 0.34 | 2019 |
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures. | 0 | 0.34 | 2019 |
Formally verified software countermeasures for control-flow integrity of smart card C code | 3 | 0.39 | 2019 |
Automated Software Protection for the Masses Against Side-Channel Attacks. | 1 | 0.35 | 2018 |
CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity | 1 | 0.35 | 2018 |
Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes. | 0 | 0.34 | 2017 |
Compiler-Assisted Loop Hardening Against Fault Attacks. | 3 | 0.39 | 2017 |
NUMA-aware scheduling and memory allocation for data-flow task-parallel applications. | 0 | 0.34 | 2016 |
Language-Centric Performance Analysis of OpenMP Programs with Aftermath. | 3 | 0.42 | 2016 |
Scalable Task Parallelism for NUMA: A Uniform Abstraction for Coordinated Scheduling and Memory Management. | 9 | 0.54 | 2016 |
Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification. | 1 | 0.36 | 2015 |
Formal verification of a software countermeasure against instruction skip attacks. | 25 | 0.90 | 2014 |
Topology-Aware and Dependence-Aware Scheduling and Memory Allocation for Task-Parallel Languages | 16 | 0.69 | 2014 |
Automatic Detection of Performance Anomalies in Task-Parallel Programs. | 0 | 0.34 | 2014 |
Formal verification of a software countermeasure against instruction skip attacks. | 0 | 0.34 | 2014 |
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller | 41 | 1.45 | 2013 |
High Level Model of Control Flow Attacks for Smart Card Functional Security | 7 | 0.54 | 2012 |
Compression de code pour processeurs haute performance. | 0 | 0.34 | 2011 |
Using runtime activity to dynamically filter out inefficient data prefetches | 3 | 0.41 | 2011 |
A framework to experiment optimizations for real-time and embedded software | 1 | 0.42 | 2010 |
Étude de la sensibilité aux jeux de données de la compilation itérative | 0 | 0.34 | 2008 |
Ufs: A Global Trade-Off Strategy For Loop Unrolling For Vliw Architectures | 0 | 0.34 | 2006 |
A software-only compression system for trading-offs between performance and code size | 0 | 0.34 | 2005 |