Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Damien Couroussé is active.

Publication


Featured researches published by Damien Couroussé.


international conference information security theory and practice | 2016

Runtime Code Polymorphism as a Protection Against Side Channel Attacks

Damien Couroussé; Thierno Barry; Bruno Robisson; Philippe Jaillon; Olivier Potin; Jean-Louis Lanet

We present a generic framework for runtime code polymorphism, applicable to a broad range of computing platforms including embedded systems with low computing resources (e.g. microcontrollers with few kilo-bytes of memory). Code polymorphism is defined as the ability to change the observable behaviour of a software component without changing its functional properties. In this paper we present the implementation of code polymorphism with runtime code generation, which offers many code transformation possibilities: we describe the use of random register allocation, random instruction selection, instruction shuffling and insertion of noise instructions. We evaluate the effectiveness of our framework against correlation power analysis: as compared to an unprotected implementation of AES where the secret key could be recovered in less than 50 traces in average, in our protected implementation, we increased the number of traces necessary to achieve the same attack by more than 20000\(\times \). With regards to the state of the art, our implementation shows a moderate impact in terms of performance overhead.


high performance embedded architectures and compilers | 2016

Compilation of a Countermeasure Against Instruction-Skip Fault Attacks

Thierno Barry; Damien Couroussé; Bruno Robisson

Physical attacks especially fault attacks represent one the major threats against embedded systems. In the state of the art, software countermeasures against fault attacks are either applied at the source code level where it will very likely be removed at compilation time, or at assembly level where several transformations need to be performed on the assembly code and lead to significant overheads both in terms of code size and execution time. This paper presents the use of compiler techniques to efficiently automate the application of software countermeasures against instruction-skip fault attacks. We propose a modified LLVM compiler that considers our security objectives throughout the compilation process. Experimental results illustrate the effectiveness of this approach on AES implementations running on an ARM-based microcontroller in terms of security overhead compared to existing solutions.


international conference on security and cryptography | 2014

COGITO: Code polymorphism to secure devices

Damien Couroussé; Bruno Robisson; Jean-Louis Lanet; Thierno Barry; Hassan Noura; Philippe Jaillon; Philippe Lalevée

In this paper, we advocate the use of code polymorphism as an efficient means to improve security at several levels in electronic devices. We analyse the threats that polymorphism could help thwart, and present the solution that we plan to demonstrate in the scope of a collaborative research project called COGITO. We expect our solution to be effective to improve security, to comply with the computing and memory constraints of embedded devices, and to be easily generalisable to a large set of embedded computing platforms.


ad hoc networks | 2015

Lightweight, Dynamic, and Flexible Cipher Scheme for Wireless and Mobile Networks

Hassan Noura; Damien Couroussé

The security of Wireless and Mobile Networks (WN, and MN, respectively) is crucial for effective deployment in various areas and applications such as military and business. The existing security solutions are based on static block /stream cipher to ensure Data Confidentiality (DC). These solutions require multi-round function, and consequently a high computing complexity and energy consumption. However, WN or MN has limited resources that prevent their efficient deployment for a long period. To overcome the previous challenge, a new kind of cipher scheme based on a dynamic permutation packets cipher is presented in this paper to ensure the DC requirements with low computation complexity. Theoretical results show that the proposed algorithm has a reduced computational complexity, which can lead to reduce the energy consumption. It is equally important to note that our proposed solution could be adapted for other kinds of networks that employ packet transmission such as vehicular network.


high performance embedded architectures and compilers | 2017

Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures

Karim Moussa Ali Abdellatif; Damien Couroussé; Olivier Potin; Philippe Jaillon

Secure implementations against side channel attacks usually combine hiding and masking protections in software implementations. In this work, we focus on desynchronization protection which is considered as a hiding countermeasure. The idea of desynchronization is to obtain a non-predictable offset of the attacking point in terms of time dimension. For this purpose, we present exploiting pattern-recognition methods to filter interesting points for obtaining a successful side channel attack. Using this tool as a case study, we completely cancel the desynchronization effect of the CHES 2009/2010 countermeasure [2, 3]. Moreover, 25k traces are needed for a successful key recoveries in case of polymorphism-based countermeasure [4].


international conference on security and cryptography | 2016

A Template Attack Against VERIFY PIN Algorithms

Hélène Le Bouder; Thierno Barry; Damien Couroussé; Jean-Louis Lanet; Ronan Lashermes

This paper presents the first side channel analysis from electromagnetic emissions on VERIFY PIN algorithms. To enter a PIN code, a user has a limited number of trials. Therefore the main difficulty of the attack is to succeed with very few traces. More precisely, this work implements a template attack and experimentally verifies its success rate. It becomes a new real threat, and it is feasible on a low cost and portable platform. Moreover, this paper shows that some protections for VERIFY PIN algorithms against fault attacks introduce new vulnerabilities with respect to side channel analysis.


IACR Cryptology ePrint Archive | 2015

HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network.

Hassan Noura; Damien Couroussé


IACR Cryptology ePrint Archive | 2017

Runtime Code Polymorphism as a Protection Against Side Channel Attacks.

Damien Couroussé; Thierno Barry; Bruno Robisson; Philippe Jaillon; Olivier Potin; Jean-Louis Lanet


Ressi 2016 | 2016

COGITO: Génération de code au runtime pour la sécurité des systèmes embarqué

Damien Couroussé; Jean-Louis Lanet; Bruno Robisson; Thierno Barry; Philippe Jaillon


international cryptology conference | 2015

Compilation for the Composition of Software Protections for Embedded Systems

Thierno Barry; Damien Couroussé; Bruno Robisson

Collaboration


Dive into the Damien Couroussé's collaboration.

Top Co-Authors

Avatar

Philippe Jaillon

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Olivier Potin

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Hassan Noura

University of Paris-Sud

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Philippe Lalevée

École Normale Supérieure

View shared research outputs
Researchain Logo
Decentralizing Knowledge