David Hely
University of Grenoble
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by David Hely.
IEEE Transactions on Information Forensics and Security | 2017
Brice Colombier; Lilian Bossuet; Viktor Fischer; David Hely
Physical unclonable functions (PUFs) are promising primitives for the lightweight authentication of an integrated circuit (IC). Indeed, by extracting an identifier from random process variations, they allow each instance of a design to be uniquely identified. However, the extracted identifiers are not stable enough to be used as is, and hence, need to be corrected first. This is currently achieved using error-correcting codes in secure sketches that generate helper data through a one-time procedure. As an alternative, we propose key reconciliation protocols. This interactive method, originating from quantum key distribution, allows two entities to correct errors in their respective correlated keys by discussing over a public channel. We believe that this can also be used by a device and a remote server to agree on two different responses to the same challenge from the same PUF obtained at different times. This approach has the advantage of requiring very few logic resources on the device side. The information leakage caused by the key reconciliation process is limited and easily computable. Results of implementation on field-programmable gate array (FPGA) targets are presented, showing that it is the most lightweight error-correction module to date.
ACM Transactions on Design Automation of Electronic Systems | 2017
Jerry Backer; David Hely; Ramesh Karri
This work tackles the conflict between enforcing security of a system-on-chip (SoC) and providing observability during trace-based debugging. On one hand, security objectives require that assets remain confidential at different stages of the SoC life cycle. On the other hand, the trace-based debug infrastructure exposes values of internal signals that can leak the assets to untrusted third parties. We propose a secure trace-based debug infrastructure to resolve this conflict. The secure infrastructure tags each asset to identify its owner (to whom it can be exposed during debug) and nonintrusively enforces the confidentiality of the assets during runtime debug. We implement a prototype of the enhanced infrastructure on an FPGA to validate its functional correctness. ASIC estimations show that our approach incurs practical area and power costs.
international workshop constructive side-channel analysis and secure design | 2017
Jeremy Dubeuf; David Hely; Vincent Beroulle
Elliptic curve cryptography (ECC) is involved in many secure schemes. Such schemes involve the elliptic curve scalar operation which is particularly security sensitive. Many algorithms of this operation have been proposed including security countermeasures. This paper discusses the security issues of such algorithms when running on a device that can be physically accessed. Leveraging these issues, new simple attack schemes to recover scalar bit information are presented and a new detailed attack based on C safe-error, probability and lattice is described against an Elliptic Curve Digital Signature Algorithm (ECDSA) using the Montgomery ladder algorithm. This new attack shows that Montgomery ladder can be sensitive to C safe-errors under some conditions. Finally, new secure elliptic curve scalar operation algorithms are presented with solutions to the discussed issues and guidance for their secure implementations.
Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2013 | 2013
Lilian Bossuet; David Hely
european conference on antennas and propagation | 2017
Zeshan Ali; Florent Bonnefoy; Romain Siragusa; Nicolas Barbot; David Hely; Etienne Perret; Maxime Bernier; Frédéric Garet
IEEE Microwave and Wireless Components Letters | 2018
Zeshan Ali; Nicolas Barbot; R. Siragusa; Etienne Perret; David Hely; Maxime Bernier; Frédéric Garet
2018 IEEE 3rd International Verification and Security Workshop (IVSW) | 2018
Mosabbah Mushir Ahmed; David Hely; Etienne Perret; Nicolas Barbot; Romain Siragusa; Maxime Bernier; Fredric Garet
Archive | 2016
Mosabbah Mushir Ahmed; David Hely; Romain Siragusa; Nicolas Barbot; Etienne Perret
Archive | 2016
Arash Nejat; David Hely; Vincent Beroulle
International CryptArchi Workshop | 2016
Brice Colombier; Lilian Bossuet; David Hely; Viktor Fischer