Hélène Le Bouder

According to our database1, Hélène Le Bouder authored at least 29 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Generic SCARE: reverse engineering without knowing the algorithm nor the machine.
J. Cryptogr. Eng., June, 2024

2023
SADIS: Real-Time Sound-Based Anomaly Detection for Industrial Systems.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Blind Side Channel Analysis Against AEAD with a Belief Propagation Approach.
Proceedings of the Smart Card Research and Advanced Applications, 2023

Symmetric cryptography applied in different contexts: physical attacks and ransomware.
, 2023

2022
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms.
ACM Comput. Surv., 2022

Blind Side Channel on the Elephant LFSR.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Blind Side Channel Analysis on the Elephant LFSR Extended Version.
Proceedings of the E-Business and Telecommunications - 19th International Conference, 2022

2021
Ransomware Detection using Markov Chain Models over File Headers.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
<i>Confiance</i>: detecting vulnerabilities in Java Card applets.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Ransomware Network Traffic Analysis for Pre-encryption Alert.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

<i>JavaNeighbors</i>: Improving <i>ChuckyJava</i>'s neighborhood discovery algorithm.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

2018
When time meets test.
Int. J. Inf. Sec., 2018

Normalization of Java Source Codes.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Hardware-Assisted Program Execution Integrity: HAPEI.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Theoretical Security Evaluation of the Human Semantic Authentication Protocol.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems.
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, 2018

Protection of Systems Against Fuzzing Attacks.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

An Evaluation Tool for Physical Attacks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

Ransomware's Early Mitigation Mechanisms.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip.
Proceedings of the Information Security Theory and Practice, 2017

Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure.
Proceedings of the Secure IT Systems, 2017

2016
Physical functions: the common factor of side-channel and fault attacks?
J. Cryptogr. Eng., 2016

A Template Attack Against VERIFY PIN Algorithms.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Multi-round Side Channel Attack on AES Using Belief Propagation.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Ransomware and the Legacy Crypto API.
Proceedings of the Risks and Security of Internet and Systems, 2016

2014
A Unified Formalism for Physical Attacks.
IACR Cryptol. ePrint Arch., 2014

On Fault Injections in Generalized Feistel Networks.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

2013
Fault Injection to Reverse Engineer DES-Like Cryptosystems.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013


  Loading...