Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David Hely is active.

Publication


Featured researches published by David Hely.


IEEE Transactions on Information Forensics and Security | 2017

Key Reconciliation Protocols for Error Correction of Silicon PUF Responses

Brice Colombier; Lilian Bossuet; Viktor Fischer; David Hely

Physical unclonable functions (PUFs) are promising primitives for the lightweight authentication of an integrated circuit (IC). Indeed, by extracting an identifier from random process variations, they allow each instance of a design to be uniquely identified. However, the extracted identifiers are not stable enough to be used as is, and hence, need to be corrected first. This is currently achieved using error-correcting codes in secure sketches that generate helper data through a one-time procedure. As an alternative, we propose key reconciliation protocols. This interactive method, originating from quantum key distribution, allows two entities to correct errors in their respective correlated keys by discussing over a public channel. We believe that this can also be used by a device and a remote server to agree on two different responses to the same challenge from the same PUF obtained at different times. This approach has the advantage of requiring very few logic resources on the device side. The information leakage caused by the key reconciliation process is limited and easily computable. Results of implementation on field-programmable gate array (FPGA) targets are presented, showing that it is the most lightweight error-correction module to date.


ACM Transactions on Design Automation of Electronic Systems | 2017

Secure and Flexible Trace-Based Debugging of Systems-on-Chip

Jerry Backer; David Hely; Ramesh Karri

This work tackles the conflict between enforcing security of a system-on-chip (SoC) and providing observability during trace-based debugging. On one hand, security objectives require that assets remain confidential at different stages of the SoC life cycle. On the other hand, the trace-based debug infrastructure exposes values of internal signals that can leak the assets to untrusted third parties. We propose a secure trace-based debug infrastructure to resolve this conflict. The secure infrastructure tags each asset to identify its owner (to whom it can be exposed during debug) and nonintrusively enforces the confidentiality of the assets during runtime debug. We implement a prototype of the enhanced infrastructure on an FPGA to validate its functional correctness. ASIC estimations show that our approach incurs practical area and power costs.


international workshop constructive side-channel analysis and secure design | 2017

Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors

Jeremy Dubeuf; David Hely; Vincent Beroulle

Elliptic curve cryptography (ECC) is involved in many secure schemes. Such schemes involve the elliptic curve scalar operation which is particularly security sensitive. Many algorithms of this operation have been proposed including security countermeasures. This paper discusses the security issues of such algorithms when running on a device that can be physically accessed. Leveraging these issues, new simple attack schemes to recover scalar bit information are presented and a new detailed attack based on C safe-error, probability and lattice is described against an Elliptic Curve Digital Signature Algorithm (ECDSA) using the Montgomery ladder algorithm. This new attack shows that Montgomery ladder can be sensitive to C safe-errors under some conditions. Finally, new secure elliptic curve scalar operation algorithms are presented with solutions to the discussed issues and guidance for their secure implementations.


Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2013 | 2013

SALWARE: Salutary Hardware to design Trusted IC.

Lilian Bossuet; David Hely


european conference on antennas and propagation | 2017

Potential of chipless authentication based on randomness inherent in fabrication process for RF and THz

Zeshan Ali; Florent Bonnefoy; Romain Siragusa; Nicolas Barbot; David Hely; Etienne Perret; Maxime Bernier; Frédéric Garet


IEEE Microwave and Wireless Components Letters | 2018

Detection of Minimum Geometrical Variation by Free-Space-Based Chipless Approach and its Application to Authentication

Zeshan Ali; Nicolas Barbot; R. Siragusa; Etienne Perret; David Hely; Maxime Bernier; Frédéric Garet


2018 IEEE 3rd International Verification and Security Workshop (IVSW) | 2018

Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique

Mosabbah Mushir Ahmed; David Hely; Etienne Perret; Nicolas Barbot; Romain Siragusa; Maxime Bernier; Fredric Garet


Archive | 2016

Authentication of IC based on Electromagnetic Signature

Mosabbah Mushir Ahmed; David Hely; Romain Siragusa; Nicolas Barbot; Etienne Perret


Archive | 2016

Reusing Logic Masking to Facilitate Hardware Trojan Detection

Arash Nejat; David Hely; Vincent Beroulle


International CryptArchi Workshop | 2016

Key Reconciliation Protocols: an Alternative for Lightweight Authentication of Integrated Circuits

Brice Colombier; Lilian Bossuet; David Hely; Viktor Fischer

Collaboration


Dive into the David Hely's collaboration.

Top Co-Authors

Avatar

Etienne Perret

Institut Universitaire de France

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vincent Beroulle

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Romain Siragusa

Grenoble Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Frédéric Garet

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Lilian Bossuet

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Maxime Bernier

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mosabbah Mushir Ahmed

Institut Universitaire de France

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge