Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Benoit Gonzalvo is active.

Publication


Featured researches published by Benoit Gonzalvo.


new technologies mobility and security | 2016

JTAG Combined Attack - Another Approach for Fault Injection

Fabien Majéric; Benoit Gonzalvo; Lilian Bossuet

The combined attacks are widely spread in the domain of smart cards and microcontrollers but they have not been yet democratized on System on chip (SoC) such as those that can be found in smart phones, tablets and automotive systems. The main reason behind this is the complexity to inject a fault at the right place and at the right time to make these attacks effective on such devices. However for development and debug, these devices provide new tools that could be considered as potential attacks path. Its the case of the JTAG debug tool which is present on today most electronic devices. The improper use of this latter is already known but in this paper we present a new misuse of this one: the JTAG as a fault injection tool. Through an example, we explain how this tool can be used to perform a combined attack.


Archive | 2003

Making secure downloaded application in particular in a smart card

Pierre Girard; Benoit Gonzalvo


Archive | 2011

Method for hardware partitioning of the resources of a secured computer system

Benoit Gonzalvo; Moundi Philippe Loubet


Archive | 2006

Method for Making Secure the Execution of an Intermediate Language Software Code in a Portable Device

Benoit Gonzalvo; Pierre Girard


Archive | 2013

METHOD FOR MUTUAL AUTHENTICATION BETWEEN A TERMINAL AND A REMOTE SERVER BY MEANS OF A THIRD-PARTY PORTAL

Xavier Berard; Richard Pico; Frédéric Faure; Benoit Gonzalvo


Archive | 2006

Method for dynamic protection of data during intermediate language software execution in a digital device

Benoit Gonzalvo; Jacques Fournier


Workshop on Secure Hardware and Security Evaluation (Co-located with CHES 2015) | 2015

JTAG Combined Attacks

Benoit Gonzalvo; Eric Bourbao; Lilian Bossuet; Majeric Fabien


Archive | 2012

METHOD FOR HARD PARTITIONING THE RESOURCES OF A SECURE COMPUTER SYSTEM

Benoit Gonzalvo; Philippe Loubet Moundi


Archive | 2012

Method of personalizing a security element cooperating with a telecommunications terminal and corresponding system

Benoit Gonzalvo; Aline Gouget; Frédéric Faure; Nicolas Roussel; Richard Pico; Xavier Berard; Frédéric Paillart


Archive | 2007

Method of dynamic protection of data during the execution of a software code in intermediate language in a digital apparatus

Benoit Gonzalvo; Jacques Fournier

Collaboration


Dive into the Benoit Gonzalvo's collaboration.

Researchain Logo
Decentralizing Knowledge