Guillaume Bouffard
Orcid: 0000-0002-2046-369X
According to our database1,
Guillaume Bouffard
authored at least 26 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Do Not Trust Power Management: Challenges and Hints for Securing Future Trusted Execution Environments.
CoRR, 2024
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024
2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
2021
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models.
J. Cryptogr. Eng., 2021
EM Fault Model Characterization on SoCs: From Different Architectures to the Same Fault Model.
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021
Proceedings of the Smart Card Research and Advanced Applications, 2021
2019
Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models.
CoRR, 2019
Proceedings of the Information Security Theory and Practice, 2019
2017
2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
2014
J. Comput. Virol. Hacking Tech., 2014
Int. J. Trust. Manag. Comput. Commun., 2014
Proceedings of the Smart Card Research and Advanced Applications, 2014
Proceedings of the Smart Card Research and Advanced Applications, 2014
2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Proceedings of the Computer Safety, Reliability, and Security, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2012
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
The Next Smart Card Nightmare - Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Smart Card Research and Advanced Applications, 2011
Proceedings of the Smart Card Research and Advanced Applications, 2011