Name
Papers
Collaborators
KARINE HEYDEMANN
32
66
Citations 
PageRank 
Referers 
116
13.65
314
Referees 
References 
645
316
Search Limit
100645
Title
Citations
PageRank
Year
Armistice: Micro-Architectural Leakage Modelling for Masked Software Formal Verification.00.342022
Exploration of Fault Effects on Formal RISC-V Microarchitecture Models00.342022
ARMISTICE: Microarchitectural Leakage Modeling for Masked Software Formal Verification00.342022
SCI-FI: Control Signal, Code, and Control Flow Integrity against Fault Injection Attacks00.342022
Reconciling optimization with secure compilation00.342021
LeakageVerif: Scalable and Efficient Leakage Verification in Symbolic Expressions.00.342021
Maskara: Compilation of a Masking Countermeasure With Optimized Polynomial Interpolation00.342020
A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective20.362019
Studying EM Pulse Effects on Superscalar Microarchitectures at ISA Level.00.342019
Side-channel robustness analysis of masked assembly codes using a symbolic approach00.342019
SKIVA: Flexible and Modular Side-channel and Fault Countermeasures.00.342019
Formally verified software countermeasures for control-flow integrity of smart card C code30.392019
Automated Software Protection for the Masses Against Side-Channel Attacks.10.352018
CCFI-Cache: A Transparent and Flexible Hardware Protection for Code and Control-Flow Integrity10.352018
Symbolic Approach for Side-Channel Resistance Analysis of Masked Assembly Codes.00.342017
Compiler-Assisted Loop Hardening Against Fault Attacks.30.392017
NUMA-aware scheduling and memory allocation for data-flow task-parallel applications.00.342016
Language-Centric Performance Analysis of OpenMP Programs with Aftermath.30.422016
Scalable Task Parallelism for NUMA: A Uniform Abstraction for Coordinated Scheduling and Memory Management.90.542016
Efficient Design and Evaluation of Countermeasures against Fault Attacks Using Formal Verification.10.362015
Formal verification of a software countermeasure against instruction skip attacks.250.902014
Topology-Aware and Dependence-Aware Scheduling and Memory Allocation for Task-Parallel Languages160.692014
Automatic Detection of Performance Anomalies in Task-Parallel Programs.00.342014
Formal verification of a software countermeasure against instruction skip attacks.00.342014
Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller411.452013
High Level Model of Control Flow Attacks for Smart Card Functional Security70.542012
Compression de code pour processeurs haute performance.00.342011
Using runtime activity to dynamically filter out inefficient data prefetches30.412011
A framework to experiment optimizations for real-time and embedded software10.422010
Étude de la sensibilité aux jeux de données de la compilation itérative00.342008
Ufs: A Global Trade-Off Strategy For Loop Unrolling For Vliw Architectures00.342006
A software-only compression system for trading-offs between performance and code size00.342005