Sophie Dupuis

Orcid: 0000-0002-4876-2982

Affiliations:
  • LIRMM, University of Montpellier II, France


According to our database1, Sophie Dupuis authored at least 33 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Logic Locking: Exploration of a new key-gate based on tristate logic.
Proceedings of the 25th IEEE Latin American Test Symposium, 2024

Power Analysis Attack Against post-SAT Logic Locking schemes.
Proceedings of the IEEE European Test Symposium, 2024

2023
Hybrid Protection of Digital FIR Filters.
IEEE Trans. Very Large Scale Integr. Syst., June, 2023

Using Approximate Circuits Against Hardware Trojans.
IEEE Des. Test, June, 2023

Resynthesis-based Attacks Against Logic Locking.
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023

2021
On Preventing SAT Attack with Decoy Key-Inputs.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2021

High-level Intellectual Property Obfuscation via Decoy Constants.
Proceedings of the 27th IEEE International Symposium on On-Line Testing and Robust System Design, 2021

2020
A Secure Scan Controller for Protecting Logic Locking.
Proceedings of the 26th IEEE International Symposium on On-Line Testing and Robust System Design, 2020

Development and Application of Embedded Test Instruments to Digital, Analog/RFs and Secure ICs.
Proceedings of the 26th IEEE International Symposium on On-Line Testing and Robust System Design, 2020

2019
Logic Locking: A Survey of Proposed Methods and Evaluation Metrics.
J. Electron. Test., 2019

SECCS: SECure Context Saving for IoT Devices.
CoRR, 2019

A Comprehensive Approach to a Trusted Test Infrastructure.
Proceedings of the 4th IEEE International Verification and Security Workshop, 2019

Providing Confidentiality and Integrity in Ultra Low Power IoT Devices.
Proceedings of the 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2019

2018
Protection Against Hardware Trojans With Logic Testing: Proposed Solutions and Challenges Ahead.
IEEE Des. Test, 2018

Encryption of test data: which cipher is better?
Proceedings of the 14th Conference on Ph.D. Research in Microelectronics and Electronics, 2018

A New Secure Stream Cipher for Scan Chain Encryption.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

A Novel Use of Approximate Circuits to Thwart Hardware Trojan Insertion and Provide Obfuscation.
Proceedings of the 24th IEEE International Symposium on On-Line Testing And Robust System Design, 2018

SI ECCS: SECure context saving for IoT devices.
Proceedings of the 13th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2018

2017
Hacking the Control Flow error detection mechanism.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017

2016
Using outliers to detect stealthy hardware trojan triggering?
Proceedings of the 1st IEEE International Verification and Security Workshop, 2016

Hardware Trust through Layout Filling: A Hardware Trojan Prevention Technique.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

2015
Hardware Trojan prevention using layout-level design approach.
Proceedings of the European Conference on Circuit Theory and Design, 2015

On the limitations of logic testing for detecting Hardware Trojans Horses.
Proceedings of the 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2015

New testing procedure for finding insertion sites of stealthy hardware trojans.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
A regular fabric design methodology for applications requiring specific layout-level design rules.
Microelectron. J., 2014

A novel hardware logic encryption technique for thwarting illegal overproduction and Hardware Trojans.
Proceedings of the 2014 IEEE 20th International On-Line Testing Symposium, 2014

2013
On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis.
Inf. Secur. J. A Glob. Perspect., 2013

Exploring redundant arithmetics in computer-aided design of arithmetic datapaths.
Integr., 2013

Secure JTAG Implementation Using Schnorr Protocol.
J. Electron. Test., 2013

2012
A reference low-complexity structured ASIC.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

2011
Stratus: Free design of highly parametrized VLSI modules interoperable with commercial tools.
Proceedings of the 12th International Symposium on Quality Electronic Design, 2011

2009
Optimisation des chemins de données arithmétiques par l'utilisation des systèmes de numération redondants. (Optimization of arithmetical data paths using redundant number systems).
PhD thesis, 2009

2008
Arithmetic Data Path Optimization Using Borrow-Save Representation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2008


  Loading...