|
|
Professional Background - 2001 – 2009 : Gemplus / Gemalto Securiy Labs as security research
engineer. - 2009 – 2016 : CEA Tech as researcher in security of embedded systems
in the SAS laboratory (joint research laboratory between the Mines St Etienne
and the CEA Tech). - 2016 – 2018 : CEA Leti as senior scientific advisor in the Division
for the security of embedded systems and connected objects. - 2019 – 2021 : CEA Leti as manager of the embedded systems’ securing
laboratory. - 2022 – 2023(mid) : CEA Leti as Director of Research responsible of the
cybersecurity program + deputy head of the embedded system’s security
division + deputy director of the Grenoble Alps Cybersecurity Institute
(CyberAlps). - 2023(mid) – now : ST Microelectronics as Director of the MDRF Security
Platform. Academic & Training -
Electrical
engineering degree from the Ecole Supérieure d'Électricité (SUPÉLEC - France). -
Masters of Science in
Electrical & Computer Engineering from the Georgia Institute of Technology (Atlanta - USA) with a major in
signal processing and security and a minor in security policies and
international affairs from the Sam Nunn School of International Affairs. -
PhD in Computer
Science from the University of
Cambridge (Trinity Hall) on data parallel architectures for secure
implementation of cryptography in embedded systems (PhD). - “Habilitation à Diriger des Recherches” (HDR) in computer science from the Université
de Limoges. - Auditeur of the 2nd national session of the IHEDN (Institut
des Hautes Etudes de Défense Nationale), major ‘Souveraineté Numérique &
Cybersécurité’. |
|
Research
[J] Journal Paper, [BC] Book Chapter, [PAT] Published or Delivered Patent, [CP] Conference Paper (peer reviewed), [IT] Invited talk/paper.
Cryptography
(Key words: Pairing based Cryptography, Light Weight
Cryptography, AES, RSA, ECC, side channels, cache attacks, fault attacks…) [CP] “Template Attacks against ECC: practical implementation against
Curve25519” by Antoine
Loiseau, Maxime Lecomte and Jacques J.A. Fournier, in the proceedings of HOST
2020. [J] “Improving side-channel attacks against pairing-based cryptography”
by Damien Jauvart, Nadia
El Mrabet, Jacques J.A. Fournier and Louis Goubin, in the Journal of
Cryptographic Engineering (JCEN), pp1-16, January 2019. [CP] “Practical Algebraic Side-Channel Attacks on ACORN”
by Alexandre Adomnicai,
Laurent Masson & Jacques Fournier, in the proceedings of the 21st
International Conference on Information Security and Cryptology (ICISC 2018),
Seoul, Korea, November 2018. [CP] “Masking the Lightweight Authenticated Ciphers ACORN and Ascon in
Software” by Alexandre
Adomnicai, Laurent Masson & Jacques Fournier, in the proceedings of
BalkanCryptSec 2018, Romania, September 2018. [PAT] “Cryptographic Method on binary Edwards elliptic curves”
by Antoine Loiseau and
Jacques J.A. Fournier, publication number 20190081786,
filed in September 2018. [CP] “Binary Edwards Curves for intrinsically secure ECC implementations for
the IoT” by Antoine
Loiseau and Jacques J.A. Fournier, in the proceedings of the 15th
International Conference on Security and Cryptography (SECRYPT 2018),
Springer-Verlag, Porto, July 2018. [CP] “Thwarting Fault Attacks against Lightweight Cryptography using SIMD
Instructions” Benjamin Lac, Anne Canteaut, Jacques Fournier and
Renaud Sirdey, in the
proceedings of the IEEE ISCAS 2018, Florence (Italy), May 2018. [CP] “Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round”
by Alexandre Adomnicai,
Laurent Masson & Jacques Fournier, in the proceedings of the INDOCRYPT
2017, Springer-Verlag, Chennai, November 2017. [CP] “First Practical Side-Channel Attack to Defeat Point Randomization in
Secure Implementations of Pairing-Based Cryptography”
by Damien Jauvart,
Jacques J.A. Fournier and Louis Goubin, in the proceedings of the 14th
International Conference on Security and Cryptography (SECRYPT 2017),
Springer-Verlag, Madrid, July 2017. [CP] “DFA on LS-Designs with a Practical Implementation on SCREAM”
by Benjamin Lac, Anne
Canteaut, Jacques Fournier and Renaud Sirdey, in the proceedings of COSADE
2017, Springer-Verlag, Paris, April 2017. [CP] “On the importance of considering physical attacks when implementing
lightweight cryptography” by Alexandre Adomnicai, Benjamin
Lac, Anne Canteaut, Laurent Masson, Renaud Sirdey, Assia Tria and Jacques
J.A. Fournier, NIST Workshop on Light Weight Cryptography, October 2016. [CP] “A First DFA on PRIDE: from Theory to Practice”
by Benjamin Lac, Marc
Beunardeau, Anne Canteaut, Jacques Fournier and Renaud Sirdey, in the
proceedings of the 11th International Conference on Risks and Security of
Internet and Systems (CRISIS 2016), Springer-Verlag, Roscoff, September 2016. [CP] “Improving Side-Channel Attacks against Pairing-Based Cryptography”
by Damien Jauvart,
Jacques Fournier, Nadia El Mrabet and Louis Goubin, in the proceedings of the
11th International Conference on Risks and Security of Internet and Systems
(CRISIS 2016), Springer-Verlag, Roscoff, September 2016. [IT]
“How careful should we be when
implementing cryptography for software update mechanisms in the IoT?” by Alexandre Adomnicai, Jacques
Fournier, Laurent Masson & Assia Tria, in the Internet of Things Software
Update Workshop (IoTSU), June 2016. [J]
“A survey of Fault Attacks in Pairing
Based Cryptography”
by Nadia El Mrabet, Jacques J.A. Fournier, Louis Goubin & Ronan
Lashermes, in the Special Issue of “Cryptography and Communication” on
“Discrete Structures for side channel attacks and countermeasures”, Volume 7,
Issue 1, pp 185-205, Springer, March 2015. [CP]
“Practical validation of several fault
attacks against the Miller algorithm”
by Ronan Lashermes, Marie Paindavoine, Nadia El Mrabet, Jacques J.A. Fournier
& Louis Goubin, in the Proceedings of FDTC 2014, Busan, September 2014. [CP] “Inverting the final exponentiation of
Tate pairings on ordinary elliptic curves using faults” by R.
Lashermes, J. Fournier & L. Goubin, in the proceedings of the CHES 2013,
LNCS, Springer-Verlag, September 2013. [CP] “A DFA on AES based on the entropy of
error distributions” by R. Lashermes, G. Reymond, J-M. Dutertre, J.
Fournier, B. Robisson & A. Tria, in the proceedings of the 9th
international workshop on Faults Diagnosis and Tolerance in Cryptography
(FDTC 2012), pp 34-43, IEEE Computer society publisher, September 2012. [CP] “ElectroMagnetic Analysis (EMA) of
software AES on Java mobile phones” by D. Aboulkassimi, L. Freund,
J. Fournier, M. Agoyan, B. Robisson & A. Tria, in the proceedings of
the IEEE International Workshop on Information Forensics and Security
(WIFS’11), November 2011. [J] “Design & characterisation of an AES chip embedding countermeasures” by M.
Agoyan, S. Bouquet, J-M. Dutertre, J.
Fournier, J-B. Rigaud, B. Robisson & A. Tria, in the
International Journal of Intelligent Engineering Informatics (IJIEI) –
Special Issue on ‘Communication and Security Systems’, vol. 1, n° 3/4, pp
328-347, November 2011. [CP] “Design of a duplicated fault-detecting AES chip and yet using clock
set-up time violations to extract 13 out of 16 bytes of the secret key” by M.
Agoyan, S. Bouquet, M. Doulcier-Verdier, J-M. Dutertre, J. Fournier, J-B. Rigaud, B.
Robisson & A. Tria, in the Proceedings of Smart Systems Integration 2011
(SSI 2011), March 2011. [CP] “Cache Based Power Analysis Attacks on
AES” by Jacques
Fournier & Michael Tunstall in the LNCS Proceedings
of the 11th Australasian Conference on Information Security and
Privacy (ACISP’06), Melbourne Australia, July 2006. [PAT] “Procédé
pour contrer les attaques de type ‘canaux cachés’ lors de la manipulation de
données” de B. Chevallier-Mames, M. Ciet, J. Fournier & K. Villegas. Published Applications: FR0511268 / EP1949292 /
WO2007051770, November 2005. Security
of Integrated Circuits (Key words: Reverse engineering, laser
faults, EMA, Asynchronous circuits…) [IT] “Reliability
and security : a love story”, Jacques Fournier, Hafsa
El Alami & Mathieu Lisart, opening keynote at the BitFlip By DGA
conference, November 2023. [CP] “From reliability
to security of devices”, Jacques Fournier &
Assia Tria, @ IEDM 2021. [CP] “Backside Shield against Physical Attacks for Secure ICs” by S. Borel, E. Deschaseaux, J.
Charbonnier, Ph. Médina, S. Anceau, J. Clédière, R. Wacquez, J.
Fournier, E. Jalaguier, Ch. Plantier
and G. Simon., in the Proceedings of the 13th International Conference and
Exhibition on DEVICE PACKAGING (DPC2017), Arizona, March, 2017. [J] "Combining image processing and laser
fault injections for characterizing a hardware AES" by Franck Courbon, Jacques J.A.
Fournier, Philippe Loubet-Moundi, & Assia Tria, in IEEE Transactions on
Computer-Aided Design of Integrated Circuits and Systems (TCAD), special
issue on Hardware Security and Trust, Vol. 34, issue 6, June 2015. [CP] “Increasing the efficiency of laser fault injections using fast gate
level reverse engineering”
by Franck Courbon, Philippe Loubet-Moundi, Jacques J.A. Fournier & Assia
Tria, in the Proceedings of HOST 2014, Washington DC, May 2014. [CP] “Adjusting laser injections for fully controlled faults” by Franck Courbon, Philippe
Loubet-Moundi, Jacques Fournier & Assia Tria, in the Proceedings of
COSADE 2014, Paris, April 2014. [J] “EMA as a physical method for extracting
secret data from mobile phones” by D. Aboulkassimi, J. Fournier, L.
Freund, B. Robisson & A. Tria, in the International Journal of Computer
Science and Applications (IJCSA) 2013, Vol. 2, N° 1, pp 16-25, Science and
Engineering Publishing Company, USA, 2013. [J] “Security characterisation of a
hardened AES cryptosystem using a laser” by C. Roscian,
F. Praden, J-M. Dutertre, J. Fournier & A. Tria, in
the journal “Technical Sciences”, University of Warmia and Mazury in Olsztyn,
pp 139-154, UWM publisher, Poland, September 2012. [BC] “EM probes characterisation for security
analysis” by B. Mounier, A-L. Ribotta, J.
Fournier, M. Agoyan & A. Tria, in ‘Cryptography and Security: From
Theory to Applications’, Quisquater Festschrift, pp 248-264, D.
Naccache editor, Springer LNCS 6805, March 2012. [CP] “Review of fault injection mechanisms and
consequences on countermeasures’ design” by J-M. Dutertre,
J.J-A. Fournier, A-P. Mirbaha, D. Naccache, J-B. Rigaud, B.
Robisson & A. Tria, in the Proceedings of Design & Technology of
Integrated Systems 2011 (DTIS 2011), April 2011. [CP] “Memory address scrambling revealed using
fault attacks” by Jacques
J.A. Fournier & Philippe Loubet-Moundi, in the proceedings
of the 7th workshop on Faults Diagnosis and Tolerance in
Cryptography (FDTC 2010), IEEE Computer society publisher, August 2010. [CP] “Security Evaluation of Asynchronous
Circuits” by Jacques
J.A. Fournier, Simon Moore, Huiyun Li, Robert Mullins & George
Taylor in the Proceedings of the 2003 Workshop on Cryptographic Hardware and
Embedded Systems (CHES 2003), Springer-Verlag, September 2003. Integrity
& authenticity of ICs (Key words: PUF,
Hardware Trojan Detection…) [PAT]
“Electronic device having PUF-type
identification” by R. Wacquez, J.J.A. Fournier & C. Reita, Published
Application EP3246943A1, (priority date : May 2016), published Nov 2017. [J]
“On-Chip HT and counterfeits detection”
by M. Lecomte, J.J.A. Fournier & P. Maurine, in the IEEE Transactions
on Very Large Scale Integration Systems, 2016. [CP]
“Granularity and detection capability
of an adaptive embedded Hardware Trojan detection system” by M. Lecomte,
J.J.A. Fournier & P. Maurine, in the proceedings of HOST 2016,
Washington, USA , May 2016. [CP]
“New Partitioning Approach for Hardware
Trojan Detection Using Side-Channel Measurements” by K. Abdellatif, C.
Cornesse, J.J.A. Fournier & B. Robisson, in the proceedings of ARC 2016,
Brazil, March 2016. [CP]
“On-chip fingerprinting of IC topology
for integrity verification” by M. Lecomte, J.J.A. Fournier & P.
Maurine, in the proceedings of DATE 2016, Dresden, Germany, March 2016. [CP]
“Thoroughly analyzing the use of Ring
Oscillators for on-chip Hardware Trojan detection” by M. Lecomte, J.J.A.
Fournier & P. Maurine, in the proceedings of the 2015 International
Conference on ReConFigurable Computing and FPGAs, Mexico, December 2015. [PAT]
“System and method for securing an
electronic circuit” by M. Lecomte, J.J.A. Fournier & P. Maurine,
Published Application WO/2016/042144, March 2016. [IT] “Extraction of intrinsic structure for Hardware Trojan detection” by M. Lecomte, J.J.A. Fournier & P. Maurine, in Cryptology ePrint Archive, Report 2015/912, http://eprint.iacr.org/,2015. [CP]
“SEMBA: A SEM Based Acquisition
technique for fast invasive Hardware Trojan detection” by F. Courbon, P.
Loubet-Moundi, J.J.A. Fournier & A. Tria, in proceedings of ECCTD’15,
Trondheim, Norway, August 2015. [BC] "Physically Unclonable Function: Design of a Silicon
Arbiter-PUF on CMOS 65nm", by Jacques J.A. Fournier & Guillaume
Reymond, in "Trusted Computing for Embedded Systems", Candaele Bernard, Soudris Dimitrios, Anagnostopoulos
Iraklis (Eds.), pp 135-142, Springer, ISBN 978-3-319-09419-9, November 2014. [CP] “A practical framework for assuring authenticity and integrity of
hardware components”
by C. Rust, H. Bock, V. Brunner, M. Deutschmann, J.J.A. Fournier, J. Hermans
& D. Singeelee, in the proceedings of Smart Systems
Integration international conference & exhibition (SSI 2014), Vienna,
March 2014. [IT]
“Imaging
techniques for the Detection of Hardware Trojans” by Franck Courbon, Philippe
Loubet-Moundi, Jacques Fournier & Assia Tria, presentation made at TRUDEVICE – WG Meetings, Germany,
December 2013. [CP] “Practical measurements of data path delays for IP authentication &
integrity verification” by I. Exurville, J. Fournier, J-M.
Dutertre, B. Robisson & A. Tria, in the proceedings of the 8th
International Workshop on Reconfigurable Communication-centric
Systems-on-Chip (ReCoSoC’2013), IEEE Xplore, July 2013. Trusted computing & secure systems
(Key words: Internet of Things, Trusted Platform
Module, Secure tokens, smart grids…) [CP]
“Hardware Security Threats Against
Bluetooth Mesh Networks” by Alexandre Adomnicai, Laurent Masson &
Jacques J.A. Fournier, in the
proceedings of the IEEE Conference on Communications and Network Security
2018, Beijing, China, June 2018. [IT]
“End-to-end data security for IoT: from
a cloud of encryptions to encryption in the cloud” by Anne Canteaut,
Sergiu Carpov, Caroline Fontaine, Jacques Fournier, Benjamin Lac, Maria
Naya-Plasencia, Renaud Sirdey and Assia Tria, at “Journée Nouvelles Avancées
en Sécurité des Systèmes d'Information”, Toulouse (France), January 2018. [IT]
“End-to-end data security for IoT: from
a cloud of encryptions to encryption in the cloud” by Anne Canteaut,
Sergiu Carpov, Caroline Fontaine, Jacques Fournier, Benjamin Lac, Maria
Naya-Plasencia, Renaud Sirdey and Assia Tria, at the C&ESAR 2017
Conference, Rennes, France, November 2017. [IT]
“Short & long term research agenda
for IoT security” by J. Fournier, at the Connect Security World 2017,
Marseilles, France, September 2017. [IT]
“Challenges of the Emerging IoT
Security Arena” by J. Fournier and A. Merle, at the Design Automation
Conference (DAC 2017), Austin, USA, June 2017. [IT] “Table ronde
: Sécurité dans l’Internet des Objets” by J. Fournier, at the Rendez-vous
de la Recherche et de l'Enseignement de la Sécurité des Systèmes
d'Information (RESSI 2017), Autrans, France, May 2017. [J] “Cahier
Technique : Sécuriser les objets connectés” by A. Tria and J. Fournier,
in ‘Industrie et Technologies’ (available here), 1er Mars 2017. [IT]
“Securing the IoT Jungle” by A.
Tria and J. Fournier, at the C&ESAR 2016 Conference, Rennes, France,
November 2016. [IT]
“How far can we trust our microchips?”
by J. Fournier, at the Aero’Nov Connection 2016, Aix-en-Provence, France, May
2016. [IT]
“Smart Homes’ security: from theory to
practice” by J. Fournier, M. Gallissot, C. Hennebert & K. Zunino, at
the ETSI - Internet of Things in the Smart Home workshop, Sophia-Antipolis,
France, March 2016. [IT] “Pourquoi
sécuriser l’implémentation des algorithmes cryptographiques” by Jacques
Fournier, Master Class given at the FIC2016, Lille, France, January 2016. [IT] “End-2-end
security for smart grid’s cyber systems” by Jacques Fournier & Sara
Tucci, Innovative City 2015, Nice, June 2015. [J] “Security Challenges facing the IoT”
by Jacques Fournier, Assia Tria, Florian Pebay & Dominique Noguet, in the
Pan European Networks Science & Technology, pp 66-67, Issue 13, December
2014. [CP] “A Secure Docking Module for providing
trust in Crisis Management Incidents” by A.P.
Fournaris, D. Hein J. Fournier, G. Reymond &
H. Brandl, in the proceedings of the IEEE IES 11th IEEE International Conference on
Industrial Informatics (INDIN 2013), July 2013. [J] “Secure Docking Station and its protection
against hardware attacks” by A.P. Fournaris, J. Fournier,
D. Hein & G. Reymond, in the journal “Technical Sciences”,
University of Warmia and Mazury in Olsztyn, pp 123-138, UWM publisher,
Poland, September 2012. [CP] “TISPHANIE, bringing the truth about the
security of mobile phones” by Jacques
Fournier & Anthony Ferrari, in the Proceedings of the
e-Smart 2010, September 2010. [CP] “USB Tokens as
Security Enabler for Mobility Solutions” by Jacques Fournier & Gérald
Maunier in the Proceedings of the e-Smart 09, September 2009. [PAT]
“Security token for securely executing an application on a host computer”
by J. Fournier, P. Girard & P.
Proust. Application N° EP 10305516.6 (17/05/2010); Publication N°
2388728 A1 (23/11/2011). [PAT]
“Software security module using the encryption of the Hash of a password
concatenated with a seed” by J.
Fournier. Application N° EP 09305657.0 (07/07/2009); Publication N° EP
2285042 A1 (16/02/2011), WO/2011/003722 (13/01/2011). [PAT]
“Making the location of a remote code secure through the recipient’s
imprint” by J. Fournier, L.
Gauteron, F. Imoucha & V. Charpeignet. Application N° EP
09305649.7 (06/07/2009); Publication N° EP 2273407 A1 (12/01/2011),
WO/2011/003721 (13/01/2011). [PAT]
“Method for remotely validating executable code” by J. Fournier & P. Girard.
Application N° PCT/EP2010/058673 (18/06/2010); Publication N° WO/2011/000722
(06/01/2011). [PAT] “Method of dynamic protection of data during
the execution of a software code in intermediate language in a digital
apparatus” de B. Gonzalvo & J.
Fournier. Published Applications: US2009328231, December 2009. [PAT] “Un
procédé de protection dynamique des données lors de l’exécution d’un code
logiciel en langage intermédiaire dans un appareil portatif” de J. Fournier & B. Gonzalvo.
Published Applications: EP1881404 / WO2008009697, July 2006. [PAT] “Transmission
sécurisée de données entre deux modules / Secure data transmission between
two modules” d’O. Benoit, E. Brier, J. Fournier, P. Moitrel & P. Proust. Patents
Delivered: FR2855286(France), US7856099(US). Published Applications:
EP1629625(A1) / CN1792059(A) / US2007055868(A1) / WO2004105304(A1), May 2003. Hardware designs for cryptography & security (Key words: Hardware countermeasures, vector processing, asynchronous
logic…) [J] “Protecting
integrated circuits against side-channel and fault attacks with dynamic
encoding” by Maxime Montoya, Simone
Bacles-Min, Anca Molnos, Jacques J.A. Fournier, in Microprocessors and
Microsystems, volume 97, 104761, 2023. [CP] “Under the
dome: preventing hardware timing information leakage” Mathieu Escouteloup (Inria), Ronan Lashermes (Inria), Jacques
Fournier (CEA Leti), in the proceedings of CARDIS 2021. [CP] “Dynamic encoding, a lightweight combined
countermeasure against hardware attacks” by M. Montoya, S. Bacles Min, A.
Molnos & J. Fournier in the proceedings of Euromicro DSD Confence 2020,
Portoroz, Slovenia, August 26-28, 2020. [CP] “Recommendations for a radically secure
ISA” by M. Escouteloup, R. Lashermes, J. Fournier & J-L. Lanet,
presented at the Fourth Workshop on Computer Architecture Research with
RISC-V (CARRV 2020), colocated with ISCA 2020 (available
here), May 29th, 2020. [CP] “Adaptive Masking: a Dynamic Trade-off
between Energy Consumption and Hardware Security” by M. Montoya, T.
Hiscock, S. Bacles Min, A. Molnos & J. Fournier in the proceedings of
IEEE ICCD 2019, Abu Dhabi, United Arab Emirates, November 17-20, 2019. [CP] “Energy-efficient Masking of the Trivium
Stream Cipher” by M. Montoya, T. Hiscock, S. Bacles Min, A. Molnos &
J. Fournier in the proceedings of the 25th IEEE International Conference on
Electronics Circuits and Systems (ICECS 2018), Bordeaux, France, December
2018. [CP] “SWARD: A Secure WAke-up RaDio against
Denial-of-Service on IoT devices” by M. Montoya, S. Bacles Min, A. Molnos
& J. Fournier in the proceedings of the 11th ACM Conference on
Security and Privacy in Wireless and Mobile Networks (WiSec 2018), Stokhlom,
Sweden, June 2018. [PAT] “Registre à décalage protégé contre les
attaques physiques” by M. Montoya, S. Bacles Min, A. Molnos & J.
Fournier filed on July 2018. [CP] “Lightweight and secure scheme to
mitigate Denial-of-Sleep on wake-up radios for IoT devices” by M.
Montoya, S. Bacles Min, A. Molnos & Jacques Fournier, poster presented at
the DAC 2018, San Francisco (USA), June 2018. [PAT] “Dispositif d’émission / réception à
radio de réveil résistant aux attaques par déni de sommeil” by M.
Montoya, S. Bacles Min, A. Molnos & J. Fournier filed on August 2017. [CP] “A Side-Channel and Fault Attack
Resistant AES circuit working on duplicated complemented values” by
Marion Doulcier-Verdier, Jean-Max Dutertre, Jacques Fournier, Jean-Baptiste Rigaud, Bruno Robisson
& Assia Tria, in Solid State Circuits Conference — Digest of technical
papers, 2011 (ISSCC 2011), page 15.6,
IEEE International, February 2011. [THESIS] “Vector
microprocessors for cryptography” by Jacques J.A. Fournier, University of Cambridge,
Computer Laboratory Technical Report UCAM-CL-TR-701, October 2007. [CP] “Hardware-Software
Co-design of a Vector Co-processor for Public Key Cryptography” by Jacques Fournier & Simon
Moore in the Proceedings of the 9th EuroMicro Conference on
Digital System Design, Architectures, Methods & Tools (DSD 2006), IEEE
Computer Society publisher, August 2006. [CP] “Implementing
Cryptography on TFT Technology for Secure Display Applications” by
Petros Oikonomakos, Jacques Fournier
& Simon Moore in the LNCS Proceedings of the 7th
Smart Card Research and Advanced Applications IFIP Conference (CARDIS’06), pp
32-47, April 2006. [CP] “A vector approach
to Cryptography Implementation” by Jacques J. Fournier & Simon Moore in the LNCS
Proceedings of the 1st International Conference on Digital Rights
Management Technologies Issues Challenges and Systems (DRMtics 2005), November 2005. [J] “La carte à puce et les circuits
asynchrones” de Jacques
Fournier et Simon W. Moore, numéro spécial de la ‘Revue de
l’Electricité et de l’Electronique et des Technologies de l’Information et de
la Communication’, Août 2004. [J] “Balanced
Self-Checking Asynchronous Logic for Smart Card Applications” by S.W.
Moore, Ross Anderson, Robert Mullins, George Taylor & Jacques Fournier in the
Journal of Microprocessors and Microsystems, IEEE Special Issue on
asynchronous circuits, October 2003. [IT] “Reducing smart card information leakage”
by Jacques Fournier in special
promotion of the ‘Technology Marketplace’ of CORDIS (the European
Commission's official information service for Research & Development),
available here,
2003. [IT] “Secure Architectures: Requirements and
Assessment” by Jacques Fournier, invited talk given at the 1st
International Workshop on Embedded Reconfigurable Architectures for Applied
Cryptography (CryptArchi 2003), January 2003. Collaborative Projects MOBITRUST: Mobile Trust (EUREKA
CATRENE 2013) : 2014-2017. Keywords : Privacy preserving
technologies, secure memories, forensics… HINT: Holistic
Approaches for Integrity of ICT systems (EU FP7 – 317930) :
2012-2015. Keywords : Trojan detection, embedded
system integrity, side channel leakages, PUFs… TOISE: Trusted
Computing for European Embedded Systems (EU ENIAC Joint
Undertaking) : 2011-2013. Keywords : trusted computing,
smart grids, wireless sensor networks, secure detachable modules, PUF, VHDR,
side channel attacks, fault attacks… ECLIPSES: Elliptic
Curve Leakage-Immune Processing for Secure Embedded Systems (French ANR – SCS
labelling) : 2009-2012. Keywords : elliptic curve
cryptography, pairings, hardware accelerators, side channel attacks, fault
attacks… SECRICOM: Seamless
Communication for Crisis Management (EU FP7 – 218123) :
2008-2012. Keywords : crisis management,
secure communication networks, local device attestation, network monitoring… {Video on main
achievements here}. TISPHANIE: Technologies
en Investigations Sécuritaires pour téléphones et appareils numériques
mobiles (French FUI Pôle System@tic) : 2009-2011. Keywords : Mobile phones’
security, side channel attacks, secure hypervisors, PMR, methodology
evaluation… DURACELL: Durcissement
aux Attaques par fautes de Cellules pour circuits sécuritaires (French RNRT) :. Keywords : fault resistant
designs, laser attacks, fault attacks, countermeasures… InspireD: Integrated
Secure Platform for Interactive Personal Devices (EU FP6) : 2004-2007. Keywords : trusted computing,
e-services, mobile devices, smart cards, side channel and fault attacks,
trusted personal devices… G3CARD: Generation
3 smart CARD (EU FP5 IST-1999-13515)
:1999-2003. Keywords : asynchronous circuits,
smart cards, side channel attacks, fault attacks… Supervisions PHDs (completed) o
Mathieu
ESCOUTELOUP (Oct 2018 – Dec 2021) : “ Sécurité des
mirco-architectures ”, thèse Inria-DGA, directors :Jean-Louis Lanet
(Inria) / Christophe Bidan (CentraleSupélec) & Jacques Fournier – now
post-doc at LAAS-CNRS. o
Maxime
MONTOYA (Oct 2016 – Dec 2019) : “ Sécurité
adaptative et énergétiquement efficace dans l’Internet des Objets”,
director: Jacques Fournier (EMSE) – now research-engineer at NxP. o
Antoine LOISEAU (July 2016 – Nov 2019) : “Lightweight and secure Elliptic Curves
Cryptography for the IoT”, directors : Jacques Fournier (EMSE) &
Assia Tria (EMSE) – now researcher at the CEA Leti. o
Alexandre ADOMNICAI (March 2016 – July 2019) : “Secure implementation & integration of
LWC for the IoT”, directors : Jacques Fournier (EMSE) & Assia Tria
(EMSE), Cifre with Trusted Objects – now research-engineer at CryptoNext. o
Benjamin LAC (Sept 2015 – Oct 2018) : “Side channel resistant & fault
resilient Light Weight Cryptography (LWC) for IoT infrastructures”,
directors : Jacques Fournier (EMSE) & Anne Canteaut (UPMC) – now research-engineer at Invia. o
Damien JAUVART (Sept 2014 – Sept 2017) : “ Protecting Pairing
algorithms against physical attacks”,
director : Louis Goubin (UVSQ) – now
researcher at Aix-Marseille University. o
Maxime
LECOMTE (Oct 2013 – Oct 2016) : “Système
embarqué de mesure de la tension pour la détection de contrefaçons et de
chevaux de Troie matériels”, director: Philippe Maurine (ENSMSE/LIRMM) – now researcher at CEA Leti. o
Franck
COURBON (Sept 2012 – Sept 2015) : “Rétro conception matérielle partielle appliquée à l’injection ciblée
de fautes laser et à la détection efficace de chevaux de Troie matériels”,
director : Assia Tria (ENSMSE) – now
CEO of Ethronics. o
Ronan LASHERMES (Sept 2011 – Sept 2014) : “On
the security of pairing implementations”, director: Louis Goubin (UVSQ) – now researcher at Inria. MASTERS’ INTERNSHIPS (completed) o
Marc BEUNARDEAU (Mar – Aug 2015) : “Lightweight Cryptography and physical
attacks”, now PhD student at Ingenico. o
Romain
FERRAND (Mar – Sept 2013) : “Caractérisation
sécuritaire d'un composant électronique en FD-SOI”. o
Marie
PAINDAVOINE (Mar – Sept 2013) : “Mise
en œuvre d’attaques physiques sur les algorithmes cryptographiques de
Couplage (Pairing)”, completed her PhD at Orange Labs. o Ingrid EXURVILLE (Mar – Sept
2012) : “Devising a method for hardware
Trojan detection on an AES circuit”, completed her PhD in September 2015. o
Olivier
VALLIER (Aug – Jul 2012) : “Etude de faisabilité: récupération physique et de données dans un
téléphone portable”, now engineer. o Ronan LASHERMES (Mar – Sept
2011) : “VHDL design of
the decryption mode of a secure cryptographic coprocessor and study of
countermeasures against a clock glitch attack”,
completed his PhD in September 2014.. o
Guillaume
EGEA (Mar – Sept 2011) : “Caractérisation de sondes électromagnétiques dédiées à l’évaluation
sécuritaire des circuits intégrés”, now working for Alten (Paris). o Cyril ROSCIAN (Mar – Sept
2010) : “Functional Evolution and
Security Study of an AES Cryptographic co-processor”, completed his PhD
in October 2013. Other research-related activities Program Committee memberships o C&ESAR Conference since 2022. o Transaction on CHES – CHES 2018. o Connect Security World 2017 & 2018 o Euromicro Conference on Digital System
Design, special session on "Architecture and Hardware for Security
Applications (AHSA)", since 2017 o 4th Workshop on
Cryptography and Security in Computing Systems – CS2 2017. o 3rd Workshop on
Cryptography and Security in Computing Systems – CS2 2016. o
2nd
Workshop on Cryptography and Security in Computing Systems – CS2 2015. Contact 12 Rue
Jules Horowitz, 38019 Grenoble Cédex, France. E-MAIL
: firstname.lastname
at st dot com |
|
|