Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bruno Rouzeyre is active.

Publication


Featured researches published by Bruno Rouzeyre.


european design and test conference | 1995

High-level synthesis for easy testability

Marie-Lise Flottes; D. Hammad; Bruno Rouzeyre

This paper presents an attempt towards design quality improvement by incorporation of testability features during datapath high-level synthesis. This method is based on the use of hardware sharing possibilities to improve the testability of the circuit without a time consuming re-synthesis process. This is achieved by incorporating test constraints during register allocation and interconnect network generation. The main features of this method are: a test analysis at the behavioral level rather than at a structural one; the non limitation on the behavioral descriptions (loops, control constructs are supported); and the optimized test area overhead and CPU time compared to standard approach. The method was applied to several benchmarks resulting in easily testable designs for almost the same area costs as the original (without testability) designs.<<ETX>>


Microelectronics Reliability | 2014

Improving the ability of Bulk Built-In Current Sensors to detect Single Event Effects by using triple-well CMOS

Jean-Max Dutertre; Rodrigo Possamai Bastos; Olivier Potin; Marie-Lise Flottes; Bruno Rouzeyre; Giorgio Di Natale; Alexandre Sarafianos

Bulk Built-In Current Sensors (bbicss) were introduced to detect the anomalous transient currents induced in the bulk of integrated circuits when hit by ionizing particles. To date, the experimental testing of only one bbics architecture was reported in the scientific bibliography. It reports an unexpected weakness in its ability to monitor nmos transistors. Based on experimental measures, we propose an explanation of this weakness and also the use of triple-well cmos to offset it. Further, we introduce a new bbics architecture well suited for triple-well that offers high detection sensitivity and low area overhead.


Microelectronics Reliability | 2013

Sensitivity tuning of a bulk built-in current sensor for optimal transient-fault detection

Jean-Max Dutertre; Rodrigo Possamai Bastos; Olivier Potin; Marie-Lise Flottes; Bruno Rouzeyre; Giorgio Di Natale

Bulk Built-In Current Sensors (BBICSs) are able to detect anomalous transient currents induced in the bulk of integrated circuits when hit by ionizing particles. This paper presents a new strategy to design BBICSs with optimal transient-fault detection sensitivity while keeping low both area and power overheads. The approach allows increasing the detection sensitivity by setting an asymmetry in the flipping ability of the sensors latch. In addition, we introduce a mechanism to tune the delay of the bulk access transistors that improves even more the BBICS detection sensitivity. The proposed design strategy offers a good compromise between fault detection sensitivity and power consumption; moreover it makes feasible the use of several CMOS processes.


VLSI-SOC '01 Proceedings of the IFIP TC10/WG10.5 Eleventh International Conference on Very Large Scale Integration of Systems-on/Chip: SOC Design Methodologies | 2001

Power-Constrained Test Scheduling for SoCs Under a no session Scheme

Marie-Lise Flottes; Julien Pouget; Bruno Rouzeyre

This paper considers the scheduling problem of core tests in a system. Our objective is to minimize the total system test time while respecting system constraints in terms of power consumption and test resource sharing. A simple and effective scheduling heuristic is proposed based on a no sessions based scheme for better overall test time optimisation.


Archive | 1997

Hardware/Software Co-Synthesis: Modelling and Synthesis of Interfaces Using Interpreted Petri Nets

Christophe Vial; Bruno Rouzeyre

When designing a system using software and hardware components, communication modelling and synthesis are key points, since, for instance, communications cost drive hardware/software partitioning. In this chapter we present a method for communication interface synthesis based on a multi-level modelling of communication. By using a specific synthesis tool for each description level, and libraries of protocols and synthesised modules, reuse possibilities are enhanced. Petri Nets are used to model protocol behaviours and evaluate communication capabilities, leading partitioning.


Information Security Journal: A Global Perspective | 2013

On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis

Sophie Dupuis; Giorgio Di Natale; Marie-Lise Flottes; Bruno Rouzeyre

ABSTRACT Hardware Trojan Horses (HTHs) are malicious and stealthy alterations of integrated circuits introduced at design or fabrication steps in order to modify a circuit’s intended behavior when deployed in the field. Due to HTHs’ stealth and diversity (intended alteration, implementation, triggering conditions), detecting and/or locating them is challenging. Several HTHs detection approaches have been proposed to address this problem. This paper focuses on so-called “side-channel analysis” methods, that is, methods that use power or delay measurements to detect potential HTHs. It reviews these methods and raises some considerations about the experiments made to evaluate them. Moreover, an original case study is presented in which we show that weak experiments may lead to misleading interpretations. Last, we evoke problems inherent to actual power and delay measurements.


design, automation, and test in europe | 1998

Scanning datapaths: a fast and effective partial scan selection technique

Marie-Lise Flottes; R. Pires; Bruno Rouzeyre; Laurent Volpe

Partial scan DFT is a commonly used technique for improving testability of sequential circuits while maintaining overhead as low as possible. In this context, the selection of the partial scan chain is usually performed at gate-level. In this paper, we present a method for quickly selecting the partial Scan Chain (SC) in datapath-like circuits. The so-obtained SC is such that the number of scan FFs is optimized and such that the achievable fault coverage is the same than with full scan approach.


Journal of Electronic Testing | 1997

Improving Testability of Non-Scan Designs during BehavioralSynthesis

Marie-Lise Flottes; D. Hammad; Bruno Rouzeyre

We present a behavioral synthesis method aimed at generating testabledatapaths. A non-scan testing strategy is targeted. Given performanceand area constraints, the system is aimed at seeking among potentialdesign alternatives the one presenting the least testabilityproblems. The backbone of this methodology is a testability analysismethod that works at different abstraction levels of the designdescription—from strictly behavioral domain to purely structuraldomain. Considering a partially mapped behavioral specification, thetestability analysis identifies the testability problems of thefuture structure. These problems are solved along the synthesisprocess, for example during the register allocation/binding task aspresented in this paper.


international conference on signals circuits and systems | 2009

Validation of differential light emission analysis on FPGA

Jérôme Di Battista; Philippe Perdu; Jean-Christophe Courrege; Bruno Rouzeyre; Lionel Torres

Failure analysis tools and methods can be used for security purposes as well as the security attack techniques can be used in failure analysis. In this paper, we describe the last results obtained concerning light emission techniques and their use to set up a side channel methodology. From a cryptanalyst standpoint, the light emission could be a potential source of leakage. When studying a specific cipher algorithm implemented in a device, by analysing this new kind of leakage it is possible to retrieve secret sensitive data. We made our analyses on an FPGA device, which makes the attack harder to perform than on a standard ASIC. Furthermore, the technique was validated on a device in 0.13µm technology, resulting in a more complex sample preparation from backside. We will show that, the leakage due to the light emitted during normal operation of a CMOS circuit, can be used to set up an attack based on the well-known DPA technique.


high level design validation and test | 2002

A simple and effective compression scheme for test pins reduction

Marie-Lise Flottes; Regis Poirier; Bruno Rouzeyre

We present a simple and effective method for test pin reduction. It must be noticed first that this method is particularly well adapted to the test of SoC since it only deals with test data and does not require any knowledge of the embedded cores. Secondly, it does not induce any delay penalty neither in the circuit itself nor during decompression.

Collaboration


Dive into the Bruno Rouzeyre's collaboration.

Top Co-Authors

Avatar

Marie-Lise Flottes

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Giorgio Di Natale

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Lionel Torres

University of Montpellier

View shared research outputs
Top Co-Authors

Avatar

Marion Doulcier

University of Montpellier

View shared research outputs
Top Co-Authors

Avatar

D. Hammad

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Julien Dalmasso

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Pascal Vivet

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Rodrigo Possamai Bastos

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Yassine Fkih

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Chantal Robach

Grenoble Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge