Guillaume Bouffard

Orcid: 0000-0002-2046-369X

According to our database1, Guillaume Bouffard authored at least 26 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Do Not Trust Power Management: Challenges and Hints for Securing Future Trusted Execution Environments.
CoRR, 2024

Characterizing and Modeling Synchronous Clock-Glitch Fault Injection.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024

2023
Faulting original McEliece's implementations is possible How to mitigate this risk?
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2021
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models.
J. Cryptogr. Eng., 2021

Java Card Virtual Machine Memory Organization: a Design Proposal.
CoRR, 2021

EM Fault Model Characterization on SoCs: From Different Architectures to the Same Fault Model.
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021

PhiAttack - Rewriting the Java Card Class Hierarchy.
Proceedings of the Smart Card Research and Advanced Applications, 2021

2019
Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models.
CoRR, 2019

Fault Injection Characterization on Modern CPUs.
Proceedings of the Information Security Theory and Practice, 2019

2017
Trust can be misplaced.
J. Cryptogr. Eng., 2017

2015
The ultimate control flow transfer in a Java based smart card.
Comput. Secur., 2015

Java Card Virtual Machine Compromising from a Bytecode Verified Applet.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Reversing the operating system of a Java based smart card.
J. Comput. Virol. Hacking Tech., 2014

Security automaton to mitigate laser-based fault attacks on smart cards.
Int. J. Trust. Manag. Comput. Commun., 2014

Memory Forensics of a Java Card Dump.
Proceedings of the Smart Card Research and Advanced Applications, 2014

Heap ... Hop! Heap Is Also Vulnerable.
Proceedings of the Smart Card Research and Advanced Applications, 2014

2013
Mitigating Type Confusion on Java Card.
Int. J. Secur. Softw. Eng., 2013

Detecting Laser Fault Injection for Smart Cards Using Security Automata.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

Vulnerability Analysis on Smart Cards Using Fault Tree.
Proceedings of the Computer Safety, Reliability, and Security, 2013

Accessing secure information using export file fraudulence.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2012
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

The Next Smart Card Nightmare - Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Type Classification against Fault Enabled Mutant in Java Based Smart Card.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Evaluation of the Ability to Transform SIM Applications into Hostile Applications.
Proceedings of the Smart Card Research and Advanced Applications, 2011

Combined Software and Hardware Attacks on the Java Card Control Flow.
Proceedings of the Smart Card Research and Advanced Applications, 2011


  Loading...