Search
Intelligent Retina for Innovative Sensing – IRIS
Intelligent vision systems are more and more important in a lot of applications nowadays, ranging from security at home, in cars, navigation of drones and robots, … but their practical applicability is still limited by the large computing system they require. The IRIS project exhibits three facet
Laser-Induced fault Effects in Security-dedicated circuitS – LIESSE
Many aspects of our current life rely on the exchange of data through electronic media. Powerful encryption algorithms guarantee the security, privacy and authentication of these exchanges. Nevertheless, those algorithms are implemented in electronic devices that may be the target of attacks despite
Combining Analyses for the Study of Numerical Invariants – CAFEIN
The development of critical embedded systems enables today the use of formal methods in order to guaranty the good behavior of the final system. These formal methods are nevertheless mainly used locally in an isolated fashion and are not the principal mean of V&V. CAFEIN's project identified issu
Mecatronic Technology for Control Stick – TEMOP
TEMOP project addresses lateral control stick used in aircraft which objectives are: ¤ to fix short and mid terms issues raised by the airframers, ¤ to prepare the technology for the second generation, with the necessary technical step, for longer term applications So, these objectives make
ElectroMAgneTic Analysis, decipHering And Reverse engineering of Integrated circuits – E-MATA HARI
Electromagnetic (EM) fault-injection is the last most recent technique that is used to break a cryptosystem. It is reckoned as one of the most powerful attack because the induced currents are much higher than previously obtained with lasers. Moreover electromagnetic fields are able to influence enca
Wired RF-based Network On Chip Reconfigurable On Demand – WiNoCoD
The current trend in System-on-Chip (SoC) design, is to integrate a very large number of processing and memory units on a single chip. Now, this advanced integration allow considering the development of mobile electronics that will offer a multitude of services. However, this raises new important ch
Hierarchically Organized Power/Energy management – HOPE
The objective of the HOPE project is to propose a relevant solution for designing power efficient system on chip devices early in the design flow. On top of classical design flows, this high level approach relies on existing standards. Considering the large number of constraints, especially for perf
Biometric Systems Private by Design – BioPriv
To answer to the issues raised by the threats that may pose new technologies on privacy, lawyers and experts from many countries more and more emphasize on the principle of « privacy by design » (PbD). The basic principle of PbD is to take into account during the design phase of new products or syst
A Generic Model of Computation Framework for Model Execution and Dynamic Analysis – GeMoC
GEMOC focuses on three design and simulation issues that must be handled effectively for the construction of complex systems: - Consider various concerns. Multiple stakeholders are involved in the design process, each with a specific domain expertise. Stakeholders express their perspective with the
A Proof-Based Mechanized Plate-Forme for the Verification of B Proof Obligations – BWare
The BWare project is an industrial research project that aims to provide a mechanized framework to support the automated verification of proof obligations coming from the development of industrial applications using the B method and requiring high guarantees of confidence. It therefore addresses Top
WCET: SEmantics, Precision, Traceability – W-SEPT
Static WCET estimations are by nature over-estimations, and thus pessimistic. Taking into account execution that are actually infeasible is a source of over-approximation. This can be due to the often complex hardware, but also the functionality of the software itself. The project aims at enhancin
Binary code analysis for security – BINSEC
Software security is one of the very major concern of modern societies, since insecure systems can affect people, organisations and even states. A few major software-level security analyses must be performed on executable codes, for example vulnerability detection and malware detection. The
SIM and PAiring Theory for Information and Communications security – SIMPATIC
Bilinear pairings are special kinds of functions that map pairs of points on groups to points in a third group. They make it possible to design cryptographic schemes with new properties that seem to be difficult to achieve in a more traditional public key cryptography setting, such as cryptography w
Solutions and Security Studies Applied to the Magnetic Memory – SESAME
The field of security products (credit cards, ID documents, ...) must continually cope with new developments in fraud, spoofing, etc.., and meet challenges that are more and more complex. These security products use technologies of memory, including storing security features, which are challenged by