default search action
Guillaume Bouffard
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Amélie Marotta, Ronan Lashermes, Guillaume Bouffard, Olivier Sentieys, Rachid Dafali:
Characterizing and Modeling Synchronous Clock-Glitch Fault Injection. COSADE 2024: 3-21 - [i4]Owen Le Gonidec, Maria Méndez Real, Guillaume Bouffard, Jean-Christophe Prévotet:
Do Not Trust Power Management: Challenges and Hints for Securing Future Trusted Execution Environments. CoRR abs/2405.15537 (2024) - 2023
- [c16]Vincent Giraud, Guillaume Bouffard:
Faulting original McEliece's implementations is possible How to mitigate this risk? EuroS&P Workshops 2023: 311-319 - [i3]Vincent Giraud, Guillaume Bouffard:
Faulting original McEliece's implementations is possible: How to mitigate this risk? CoRR abs/2305.02855 (2023) - 2021
- [j6]Thomas Trouchkine, Sébanjila Kevin Bukasa, Mathieu Escouteloup, Ronan Lashermes, Guillaume Bouffard:
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models. J. Cryptogr. Eng. 11(4): 353-367 (2021) - [c15]Jean Dubreuil, Guillaume Bouffard:
PhiAttack - Rewriting the Java Card Class Hierarchy. CARDIS 2021: 275-288 - [c14]Thomas Trouchkine, Guillaume Bouffard, Jessy Clédière:
EM Fault Model Characterization on SoCs: From Different Architectures to the Same Fault Model. FDTC 2021: 31-38 - [i2]Guillaume Bouffard, Vincent Giraud, Léo Gaspard:
Java Card Virtual Machine Memory Organization: a Design Proposal. CoRR abs/2110.10037 (2021)
2010 – 2019
- 2019
- [c13]Thomas Trouchkine, Guillaume Bouffard, Jessy Clédière:
Fault Injection Characterization on Modern CPUs. WISTP 2019: 123-138 - [i1]Thomas Trouchkine, Sébanjila Kevin Bukasa, Mathieu Escouteloup, Ronan Lashermes, Guillaume Bouffard:
Electromagnetic fault injection against a System-on-Chip, toward new micro-architectural fault models. CoRR abs/1910.11566 (2019) - 2017
- [j5]Noreddine El Janati El Idrissi, Guillaume Bouffard, Jean-Louis Lanet, Said El Hajji:
Trust can be misplaced. J. Cryptogr. Eng. 7(1): 21-34 (2017) - 2015
- [j4]Guillaume Bouffard, Jean-Louis Lanet:
The ultimate control flow transfer in a Java based smart card. Comput. Secur. 50: 33-46 (2015) - [c12]Julien Lancia, Guillaume Bouffard:
Java Card Virtual Machine Compromising from a Bytecode Verified Applet. CARDIS 2015: 75-88 - 2014
- [j3]Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Security automaton to mitigate laser-based fault attacks on smart cards. Int. J. Trust. Manag. Comput. Commun. 2(2): 185-205 (2014) - [j2]Guillaume Bouffard, Jean-Louis Lanet:
Reversing the operating system of a Java based smart card. J. Comput. Virol. Hacking Tech. 10(4): 239-253 (2014) - [c11]Jean-Louis Lanet, Guillaume Bouffard, Rokia Lamrani Alaoui, Ranim Chakra, Afef Mestiri, Mohammed Monsif, Abdellatif Fandi:
Memory Forensics of a Java Card Dump. CARDIS 2014: 3-17 - [c10]Guillaume Bouffard, Michael Lackner, Jean-Louis Lanet, Johannes Loinig:
Heap ... Hop! Heap Is Also Vulnerable. CARDIS 2014: 18-31 - 2013
- [j1]Jean Dubreuil, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Mitigating Type Confusion on Java Card. Int. J. Secur. Softw. Eng. 4(2): 19-39 (2013) - [c9]Guillaume Bouffard, Tom Khefif, Jean-Louis Lanet, Ismael Kane, Sergio Casanova Salvia:
Accessing secure information using export file fraudulence. CRiSIS 2013: 1-5 - [c8]Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Vulnerability Analysis on Smart Cards Using Fault Tree. SAFECOMP 2013: 82-93 - [c7]Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Detecting Laser Fault Injection for Smart Cards Using Security Automata. SSCC 2013: 18-29 - 2012
- [c6]Jean Dubreuil, Guillaume Bouffard, Jean-Louis Lanet, Julien Cartigny:
Type Classification against Fault Enabled Mutant in Java Based Smart Card. ARES 2012: 551-556 - [c5]Guillaume Bouffard, Jean-Louis Lanet:
The Next Smart Card Nightmare - Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things. Cryptography and Security 2012: 405-424 - [c4]Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet:
A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard. DBSec 2012: 122-128 - [c3]Tiana Razafindralambo, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. SNDS 2012: 185-194 - 2011
- [c2]Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary:
Evaluation of the Ability to Transform SIM Applications into Hostile Applications. CARDIS 2011: 1-17 - [c1]Guillaume Bouffard, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Combined Software and Hardware Attacks on the Java Card Control Flow. CARDIS 2011: 283-296
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-20 20:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint