Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vincent Beroulle is active.

Publication


Featured researches published by Vincent Beroulle.


digital systems design | 2014

Voltage Glitch Attacks on Mixed-Signal Systems

Noemie Beringuier-Boher; Kamil Gomina; David Hely; Jean-Baptiste Rigaud; Vincent Beroulle; Assia Tria; Joel Damiens; Philippe Gendrier; Philippe Candelier

Supply voltage glitches are a well-known fault injection method used to attack electronic circuits. The aim of this paper is to identify the specific threats of mixed signal systems and to provide some solutions to ensure their security. Indeed, many Systems on Chip use both analog and digital circuits but, most of the time, the security of such application is considered only from an exclusively digital or sometimes analog point of view. However, in mixed-signals systems, analog and digital solutions coexist and must be considered as a unique system to ensure the security of the whole application. In this purpose, this paper gives an overview of voltage glitch attacks effects and countermeasures for analog and digital blocks as part of Mixed-Signal SoCs (AMS-SoCs). It also emphasizes the unique behavior of mixed-signal circuits during glitch attacks and suggest some guidelines to associate efficiently analog and digital solutions to secure a mixed-signal system.


ifip ieee international conference on very large scale integration | 2014

Laser-induced fault effects in security-dedicated circuits

Régis Leveugle; Paolo Maistri; Pierre Vanhauwaert; Feng Lu; G. Di Natale; M.-L. Flottes; Bruno Rouzeyre; Athanasios Papadimitriou; David Hely; Vincent Beroulle; G. Hubert; S. de Castro; Jean-Max Dutertre; Alexandre Sarafianos; Noémie Boher; Mathieu Lisart; Joel Damiens; Philippe Candelier; C. Tavernier

Lasers have become one of the most efficient means to attack secure integrated systems. Actual faults or errors induced in the system depend on many parameters, including the circuit technology and the laser characteristics. Understanding the physical effects is mandatory to correctly evaluate during the design flow the potential consequences of a laser-based attack and implement efficient counter-measures. This paper presents results obtained within the LIESSE project, aiming at defining a comprehensive approach for designers. Outcomes include the definition of fault/error models at several levels of abstraction, specific CAD tools using these models and new counter-measures well-suited to thwart laser-based attacks. Actual measures on components manufactured in the new 28 nm FDSOI technology are also presented.


Journal of Hardware and Systems Security | 2018

ESCALATION: Leveraging Logic Masking to Facilitate Path-Delay-Based Hardware Trojan Detection Methods

Arash Nejat; David Hely; Vincent Beroulle

Hardware Trojan (HT), intellectual property (IP) piracy, and overproduction of integrated circuit (IC) are three threats that may happen in untrusted fabrication foundries. HTs are malicious circuitry changes in the IC layout. They affect side-channels (IC parameters) such as path-delay or power consumption. Therefore, HT detection methods based on side-channel analysis have been proposed. They can detect an HT only if its effects on side-channels are significant among the alteration of side-channels, caused by process1 and environment2 variations. IC design modifications at different abstraction levels have been proposed to facilitate HT detection methods after fabrication, such as modifying a circuit to make the paths3 of the circuit more sensitive to HTs. Such modifications are known as design-for-trust (DfTr). In addition, key-based modifications have been proposed to protect IPs/ICs from IP piracy and IC overproduction. This approach is known as masking or obfuscation, and it modifies a circuit such that it does not correctly work without applying a correct key. In this work, we propose a DfTr method based on leveraging the masking approach. It improves HT detection methods based on path-delay analysis. As a matter of fact, the delay of shorter paths varies less than that of longer ones. Therefore, the objective of the proposed DfTr is to generate fake short paths for nets that only belong to long paths. Our layout level experiments show that the proposed DfTr masks the functionality of circuits and, on average, increases the HT detectability of path-delay-based detection methods by 10%.


2018 IEEE 3rd International Verification and Security Workshop (IVSW) | 2018

Hardware Security Evaluation Platform for MCU-Based Connected Devices: Application to Healthcare IoT

Zahra Kazemi; Athanasios Papadimitriou; David Hely; Mahdi Fazcli; Vincent Beroulle


2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS) | 2018

The case of using CMOS FD-SOI rather than CMOS bulk to harden ICs against laser attacks

Jean-Max Dutertre; Vincent Beroulle; Philippe Candelier; Louis-Barthelemy Faber; Marie-Lise Flottes; Philippe Gendrier; David Hely; Régis Leveugle; Paolo Maistri; Giorgio Di Natale; Athanasios Papadimitriou; Bruno Rouzeyre


Archive | 2016

Reusing Logic Masking to Facilitate Hardware Trojan Detection

Arash Nejat; David Hely; Vincent Beroulle


11th Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS 2016) | 2016

Design and Validation of a Secured Digital Ultralight 14443-Type A RFID tag with a FPGA Platform

Yassine Naija; Vincent Beroulle; David Hely; Mohsen Machhout


Third Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'15) | 2015

Analysis of laser-induced errors: RTL fault model versus layout locality characteristics

Athanasios Papadimitriou; David Hely; Vincent Beroulle; Paolo Maistri; Régis Leveugle


Second Workshop on Trustworthy Manufacturing and Utilization of Secure Devices (TRUDEVICE'14) | 2014

FPGA emulation of laser attacks against secure deep submicron integrated circuits

P. Papavramidou; David Hely; Vincent Beroulle; Paolo Maistri; Régis Leveugle


Workshop on Trustworthy Manufacturing and Utilization of Secure Devices, TRUDEVICE 2013 | 2013

Evaluating and Enhancing the Security of Analog and Mixed IPs in Complex System On Chip

Noémie Boher; David Hely; Vincent Beroulle; Kamil Gomina; Joel Damiens; Philippe Candelier

Collaboration


Dive into the Vincent Beroulle's collaboration.

Top Co-Authors

Avatar

David Hely

University of Grenoble

View shared research outputs
Top Co-Authors

Avatar

Paolo Maistri

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Régis Leveugle

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Athanasios Papadimitriou

Grenoble Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

David Hely

University of Grenoble

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bruno Rouzeyre

University of Montpellier

View shared research outputs
Top Co-Authors

Avatar

Jean-Max Dutertre

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge