{"id":"https://openalex.org/W2151710937","doi":"https://doi.org/10.1109/ntms.2011.5721145","title":"Implementation of Complex Strategies of Security Insecure Embedded Systems","display_name":"Implementation of Complex Strategies of Security Insecure Embedded Systems","publication_year":2011,"publication_date":"2011-02-01","ids":{"openalex":"https://openalex.org/W2151710937","doi":"https://doi.org/10.1109/ntms.2011.5721145","mag":"2151710937"},"language":"en","primary_location":{"id":"doi:10.1109/ntms.2011.5721145","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms.2011.5721145","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013055175","display_name":"Bruno Robisson","orcid":"https://orcid.org/0000-0003-0408-315X"},"institutions":[{"id":"https://openalex.org/I2738703131","display_name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives","ror":"https://ror.org/00jjx8s55","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131"]},{"id":"https://openalex.org/I4210150049","display_name":"Laboratoire d'\u00c9lectronique des Technologies de l'Information","ror":"https://ror.org/04mf0wv34","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131","https://openalex.org/I2738703131","https://openalex.org/I4210117989","https://openalex.org/I4210150049"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"B Robisson","raw_affiliation_strings":["CEA-LETI, Gardanne, France","CEA-LETL, Gardanne, France"],"affiliations":[{"raw_affiliation_string":"CEA-LETI, Gardanne, France","institution_ids":["https://openalex.org/I4210150049","https://openalex.org/I2738703131"]},{"raw_affiliation_string":"CEA-LETL, Gardanne, France","institution_ids":["https://openalex.org/I4210150049","https://openalex.org/I2738703131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017387208","display_name":"Michel Agoyan","orcid":null},"institutions":[{"id":"https://openalex.org/I2738703131","display_name":"Commissariat \u00e0 l'\u00c9nergie Atomique et aux \u00c9nergies Alternatives","ror":"https://ror.org/00jjx8s55","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131"]},{"id":"https://openalex.org/I4210150049","display_name":"Laboratoire d'\u00c9lectronique des Technologies de l'Information","ror":"https://ror.org/04mf0wv34","country_code":"FR","type":"government","lineage":["https://openalex.org/I2738703131","https://openalex.org/I2738703131","https://openalex.org/I4210117989","https://openalex.org/I4210150049"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"M Agoyan","raw_affiliation_strings":["CEA-LETI, Gardanne, France","CEA-LETL, Gardanne, France"],"affiliations":[{"raw_affiliation_string":"CEA-LETI, Gardanne, France","institution_ids":["https://openalex.org/I4210150049","https://openalex.org/I2738703131"]},{"raw_affiliation_string":"CEA-LETL, Gardanne, France","institution_ids":["https://openalex.org/I4210150049","https://openalex.org/I2738703131"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007753416","display_name":"S\u00e9bastien Le Henaff","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S Le Henaff","raw_affiliation_strings":["Viaccess, Les Collines de l\u2019 Arche, La D\u00e9fense, France","Viaccess, Les Collines de l' Arche, La D\u00e9fense, France"],"affiliations":[{"raw_affiliation_string":"Viaccess, Les Collines de l\u2019 Arche, La D\u00e9fense, France","institution_ids":[]},{"raw_affiliation_string":"Viaccess, Les Collines de l' Arche, La D\u00e9fense, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025101305","display_name":"Patrick Soquet","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P Soquet","raw_affiliation_strings":["Viaccess, Les Collines de l\u2019 Arche, La D\u00e9fense, France","Viaccess, Les Collines de l' Arche, La D\u00e9fense, France"],"affiliations":[{"raw_affiliation_string":"Viaccess, Les Collines de l\u2019 Arche, La D\u00e9fense, France","institution_ids":[]},{"raw_affiliation_string":"Viaccess, Les Collines de l' Arche, La D\u00e9fense, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071190660","display_name":"Guillaume Phan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G Phan","raw_affiliation_strings":["Trusted Logic, Versailles, France"],"affiliations":[{"raw_affiliation_string":"Trusted Logic, Versailles, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098292757","display_name":"F Wajsbu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210159731","display_name":"LIP6","ror":"https://ror.org/05krcen59","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I39804081","https://openalex.org/I4210159245","https://openalex.org/I4210159731"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"F Wajsbu","raw_affiliation_strings":["LIP6, Paris, France"],"affiliations":[{"raw_affiliation_string":"LIP6, Paris, France","institution_ids":["https://openalex.org/I4210159731"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089388467","display_name":"Pirouz Bazargan-Sabet","orcid":null},"institutions":[{"id":"https://openalex.org/I4210159731","display_name":"LIP6","ror":"https://ror.org/05krcen59","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I39804081","https://openalex.org/I4210159245","https://openalex.org/I4210159731"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"P Bazargan-Sabet","raw_affiliation_strings":["LIP6, Paris, France"],"affiliations":[{"raw_affiliation_string":"LIP6, Paris, France","institution_ids":["https://openalex.org/I4210159731"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5013055175"],"corresponding_institution_ids":["https://openalex.org/I2738703131","https://openalex.org/I4210150049"],"apc_list":null,"apc_paid":null,"fwci":0.4276,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.74026587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2779","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7773604393005371},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.7642133235931396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5500839352607727},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.5464533567428589},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5138128399848938},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5020849704742432},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.48784804344177246},{"id":"https://openalex.org/keywords/microarchitecture","display_name":"Microarchitecture","score":0.461905300617218},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.44912198185920715},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4386351406574249},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4309224486351013},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.33343222737312317},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.300012469291687},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.26185929775238037},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1471705138683319},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10370829701423645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7773604393005371},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.7642133235931396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5500839352607727},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.5464533567428589},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5138128399848938},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5020849704742432},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.48784804344177246},{"id":"https://openalex.org/C107598950","wikidata":"https://www.wikidata.org/wiki/Q259864","display_name":"Microarchitecture","level":2,"score":0.461905300617218},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.44912198185920715},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4386351406574249},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4309224486351013},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33343222737312317},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.300012469291687},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.26185929775238037},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1471705138683319},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10370829701423645},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ntms.2011.5721145","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms.2011.5721145","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 4th IFIP International Conference on New Technologies, Mobility and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:emse-00575870v1","is_oa":false,"landing_page_url":"https://hal-emse.ccsd.cnrs.fr/emse-00575870","pdf_url":null,"source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"NTMS 2011 - 4th IFIP International Conference on New Technologies, Mobility and Security, Feb 2011, Paris, France. pp.1-5, &#x27E8;10.1109/NTMS.2011.5721145&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1515119244","https://openalex.org/W1563937974","https://openalex.org/W1602380388","https://openalex.org/W1607006990","https://openalex.org/W2110162979","https://openalex.org/W2130915832","https://openalex.org/W2615155959"],"related_works":["https://openalex.org/W2378749186","https://openalex.org/W2364088131","https://openalex.org/W2362741838","https://openalex.org/W622044715","https://openalex.org/W2378994067","https://openalex.org/W2005635288","https://openalex.org/W1598708558","https://openalex.org/W2461758544","https://openalex.org/W4288754584","https://openalex.org/W4379115652"],"abstract_inverted_index":{"Secure":[0],"components":[1,26],"are":[2],"subject":[3],"to":[4,10,23,72,100,160,180],"physical":[5],"attacks":[6],"whose":[7],"aim":[8,22],"is":[9,58,91],"recover":[11],"the":[12,44,47,75,78,81,102,110,117,126,131,134,147,156,164,176,183],"secret":[13],"information":[14],"that":[15,152],"they":[16],"store.":[17],"Most":[18],"of":[19,46,52,67,80,113,128,133,166,170],"works":[20],"which":[21],"protect":[24],"these":[25],"generally":[27],"consist":[28],"in":[29,50,62,70,175],"developing":[30],"protections":[31],"(or":[32],"countermeasures)":[33],"taken":[34],"one":[35],"by":[36],"one.":[37],"But":[38],"this":[39],"\"countermeasure-centered\"":[40],"approach":[41,154],"drastically":[42],"decreases":[43],"performances":[45],"whole":[48],"chip":[49],"terms":[51],"power":[53],"and":[54,60,77,97,104,115,173,187],"speed.":[55],"Our":[56],"work":[57],"complementary":[59],"consists":[61],"reorganising":[63],"a":[64,94,137],"given":[65],"set":[66,112],"existing":[68],"countermeasures":[69,114],"order":[71],"optimise":[73,181],"both":[74],"security":[76,129,138],"availability":[79],"circuit":[82,135],"without":[83,142],"reducing":[84],"its":[85],"global":[86],"performances.":[87],"The":[88,120],"proposed":[89],"solution":[90],"based":[92],"on":[93,98],"double-processor":[95],"architecture":[96],"mechanisms":[99],"parametrise":[101],"hardware":[103],"software":[105],"countermeasures.":[106],"One":[107],"processor":[108],"embeds":[109],"state-of-the-art":[111],"executes":[116],"application":[118],"code.":[119],"second":[121],"processor,":[122],"much":[123],"smaller,":[124],"applies":[125],"strategy":[127,165],"(i.e":[130],"response":[132],"when":[136],"event":[139],"arises),":[140],"but":[141],"sharing":[143],"sensitive":[144],"data":[145],"with":[146],"first":[148],"processor.":[149],"We":[150],"show":[151],"our":[153],"enables":[155],"secure":[157],"circuit's":[158],"designer":[159],"easily":[161],"fine":[162],"tune":[163],"security,":[167],"for":[168],"example,":[169],"Pay-TV":[171],"applications":[172],"could,":[174],"future,":[177],"be":[178],"used":[179],"dynamically":[182],"trade-off":[184],"between":[185],"performance":[186],"security.":[188]},"counts_by_year":[{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
