Compilation of a countermeasure against instruction-skip fault attacks T Barry, D Couroussé, B Robisson Proceedings of the Third Workshop on Cryptography and Security in Computing …, 2016 | 50 | 2016 |
Runtime code polymorphism as a protection against side channel attacks D Couroussé, T Barry, B Robisson, P Jaillon, O Potin, JL Lanet IFIP International Conference on Information Security Theory and Practice …, 2016 | 27 | 2016 |
PreTR: spatio-temporal non-autoregressive trajectory prediction transformer L Achaji, T Barry, T Fouqueray, J Moreau, F Aioun, F Charpillet 2022 IEEE 25th International Conference on Intelligent Transportation …, 2022 | 12 | 2022 |
A template attack against VERIFY PIN algorithms H Le Bouder, T Barry, D Couroussé, JL Lanet, R Lashermes SECRYPT 2016, 231-238, 2016 | 12 | 2016 |
Automatic application of software countermeasures against physical attacks N Belleville, K Heydemann, D Couroussé, T Barry, B Robisson, A Seriai, ... Cyber-Physical Systems Security, 135-155, 2018 | 7 | 2018 |
COGITO: Code polymorphism to secure devices D Couroussé, B Robisson, JL Lanet, T Barry, H Noura, P Jaillon, ... 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-6, 2014 | 5 | 2014 |
Sécurisation à la compilation de logiciels contre les attaques en fautes T Barry Université de Lyon, 2017 | 3 | 2017 |
Cloud-based Private Querying of Databases by Means of Homomorphic Encryption. Y Abbar, P Aubry, T Barry, S Carpov, S Mallick, M Krichen, D Ligier, ... IoTBDS, 123-131, 2021 | 2 | 2021 |
All paths lead to Rome: Polymorphic runtime code generation for embedded systems D Couroussé, T Barry, B Robisson, N Belleville, P Jaillon, O Potin, ... Proceedings of the Fifth Workshop on Cryptography and Security in Computing …, 2018 | 2 | 2018 |
Method for executing a machine code formed from blocks having instructions to be protected, each instruction associated with a construction instruction to modify a signature of … D Courousse, K Heydemann, T Barry US Patent 11,704,128, 2023 | 1 | 2023 |
SalienceNet: an unsupervised Image-to-Image translation method for nuclei saliency enhancement in microscopy images B Emmanuel, E Lefevre, T Barry, F Levet, A Beghin, V Viasnoff, X Galindo, ... bioRxiv, 2022.10. 27.514030, 2022 | 1 | 2022 |
Outillage de conception et de compilation de protections logicielles pour la sécurité dans les systèmes embarqués. TO Barry | 1 | 2017 |
Automated Combination of Tolerance and Control Flow Integrity Countermeasures against Multiple Fault Attacks T Barry, D Couroussé, B Robisson, K Heydemann European LLVM Developers Meeting, 2017 | 1 | 2017 |
3D Nuclei Segmentation by Combining GAN Based Image Synthesis and Existing 3D Manual Annotations X Galindo, T Barry, P Guyot, C Riviere, R Galland, F Levet bioRxiv, 2023.12. 06.570366, 2023 | | 2023 |
SECURING SOFTWARE AGAINST FAULT ATTACKS AT COMPILE TIME T Barry Université de Lyon, 2017 | | 2017 |
The Multiple Ways to Automate the Application of Software Countermeasures against Physical Attacks: Pitfalls and Guidelines N Belleville, T Barry, A Seriai, D Couroussé, K Heydemann, B Robisson, ... Cyber-Physical Security Education Workshop, 2017 | | 2017 |
Compilation of Software Countermeasures against Multiple Fault Injection Attacks on Embedded Systems T Barry, D Couroussé, B Robisson | | 2017 |
IoT and Physical Attacks H Le Bouder, JL Lanet, R Lashermes, T Barry, D Couroussé C&ESAR 2016, 155, 2016 | | 2016 |
COGITO: Génération de code au runtime pour la sécurité des systèmes embarqué D Couroussé, JL Lanet, B Robisson, T Barry, P Jaillon Ressi 2016, 2016 | | 2016 |
Runtime Code Polymorphism as a Protection against Physical Attacks D Couroussé, B Robisson, T Barry, P Jaillon, O Potin Workshop on Cryptographic Hardware and Embedded Systems, 2015 | | 2015 |