Academic literature on the topic 'Cheval de Troie matériel'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cheval de Troie matériel.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cheval de Troie matériel"
Wenger, Stephan, and Fulvia Raiola. "Cheval de Troie." Adolescence 71, no. 1 (2010): 171. http://dx.doi.org/10.3917/ado.071.0171.
Full textBaquedano, Michel. "Le cheval de Troie." Empan 61, no. 1 (2006): 53. http://dx.doi.org/10.3917/empa.061.54.
Full textLambin, Gérard. "Le Cheval de Troie." Gaia : revue interdisciplinaire sur la Grèce Archaïque 3, no. 1 (1998): 97–108. http://dx.doi.org/10.3406/gaia.1998.1342.
Full textGrim, Olivier R. "Un nouveau cheval de Troie." Journal des anthropologues, no. 122-123 (December 1, 2010): 27–49. http://dx.doi.org/10.4000/jda.3673.
Full textGiacomo, Pierre. "Le CGS innocent Cheval de Troie." Bulletin d'histoire de l'électricité 16, no. 1 (1990): 5–8. http://dx.doi.org/10.3406/helec.1990.1123.
Full textNicaise, Ides, Luc Lauwereys, and Nick Matheus. "L'économie sociale d'insertion, cheval de bataille ou cheval de Troie ?" Reflets et perspectives de la vie économique XLI, no. 3 (2002): 77. http://dx.doi.org/10.3917/rpve.413.0077.
Full textPommier, Gérard. "Le Livre noir : un cheval de Troie." Le Journal des psychologues 235, no. 2 (2006): 18. http://dx.doi.org/10.3917/jdp.235.0018.
Full textEloit, Ilana. "Un cheval de Troie nommé Monique Wittig." Cahiers du Genre 71, no. 2 (March 7, 2022): 143–68. http://dx.doi.org/10.3917/cdge.071.0143.
Full textLuyet, Pierre-Philippe, and Jean Gruenberg. "L’endocytose, cheval de Troie pour l’infection virale." médecine/sciences 21, no. 11 (November 2005): 909–10. http://dx.doi.org/10.1051/medsci/20052111909.
Full textPerez, Frédéric. "Et aussi... Le complexe du Cheval de Troie." Dialogue 190, no. 4 (2010): 135. http://dx.doi.org/10.3917/dia.190.0135.
Full textDissertations / Theses on the topic "Cheval de Troie matériel"
Ba, Papa-Sidy. "Détection et prévention de Cheval de Troie Matériel (CTM) par des méthodes Orientées Test Logique." Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT271/document.
Full textIn order to reduce the production costs of integrated circuits (ICs), outsourcing the fabrication process has become a major trend in the Integrated Circuits (ICs) industry. As an inevitable unwanted side effect, this outsourcing business model increases threats to hardware products. This process raises the issue of un-trusted foundries in which, circuit descriptions can be manipulated with the aim to possibly insert malicious circuitry or alterations, referred to as Hardware Trojan Horses (HTHs). This motivates semiconductor industries and researchers to study and investigate solutions for detecting during testing and prevent during fabrication, HTH insertion.However, considering the stealthy nature of HTs, it is quite impossible to detect them with conventional testing or even with random patterns. This motivates us to make some contributions in this thesis by proposing solutions to detect and prevent HTH after fabrication (during testing).The proposed methods help to detect HTH as well during testing as during normal mode(run-time), and they are logic testing based.Furthermore, we propose prevention methods, which are also logic testing based, in order tomake harder or quasi impossible the insertion of HTH both in netlist and layout levels
Díaz, Rizo Alán Rodrigo. "Security and Trust for Wireless Integrated Circuits." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS005.
Full textThe origin of the hardware security threats is the massively globalized and outsourcing-based Integrated Circuit (IC) supply chain that we see today. The prohibitively cost of owning a first-rate semiconductor foundry forces IC design houses to go fabless and outsource their IC fabrication, assembly, and testing. Outsourcing these tasks intensifies the risk of IC piracy attacks and Hardware Trojan (HT) insertion, and both threats translate into know-how and financial losses for the IC owner. Moreover, complex Systems-on-Chip (SoCs) are built by integrating third-party Intellectual Property (IP) cores from multiple IP providers. However, SoC integrators and IP providers have an imbalanced trust relationship. While IP providers are vulnerable to IP overuse, IP cloning, and IC overproduction, SoC integrators fear integrating HT-infected IPs into their systems. We propose a locking-based design-for-security methodology. In addition, we develop an RF transceiver-specific locking methodology that consists in two spatially separated mechanisms. inserting a locking mechanism into the circuit that unlocks with a single secret key in the form of a digital word. To assess the security of wireless ICs, we propose an HT attack that leaks sensitive information from the transmitter within a legitimate transmission
Courbon, Franck. "Rétro-conception matérielle partielle appliquée à l'injection ciblée de fautes laser et à la détection efficace de Chevaux de Troie Matériels." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0788/document.
Full textThe work described in this thesis covers an integrated circuit characterization methodology based on a partial hardware reverse engineering. On one hand in order to improve integrated circuit security characterization, on the other hand in order to detect the presence of Hardware Trojans. Our approach is said partial as it is only based on a single hardware layer of the component and also because it does not aim to recreate a schematic or functional description of the whole circuit. A low cost, fast and efficient reverse engineering methodology is proposed. The latter enables to get a global image of the circuit where only transistor's active regions are visible. It thus allows localizing every standard cell. The implementation of this methodology is applied over different secure devices. The obtained image according to the methodology declined earlier is processed in order to spatially localize sensible standard cells, nay critical in terms of security. Once these cells identified, we characterize the laser effect over different location of these standard cells and we show the possibility with the help of laser fault injection the value they contain. The technique is novel as it validates the fault model over a complex gate in 90nm technology node.Finally, a Hardware Trojan detection method is proposed using the partial reverse engineering output. We highlight the addition of few non listed cells with the application on a couple of circuits. The method implementation therefore permits to detect, without full reverse-engineering (and so cheaply), quickly and efficiently the presence of Hardware Trojans
Cozzi, Maxime. "Infrared Imaging for Integrated Circuit Trust and Hardware Security." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS046.
Full textThe generalization of integrated circuits and more generally electronics to everyday life systems (military, finance, health, etc) rises the question about their security. Today, the integrity of such circuits relies on a large panel of known attacks for which countermeasures have been developed. Hence, the search of new vulnerabilities represents one of the largest contribution to hardware security. The always rising complexity of dies leads to larger silicon surfaces.Circuit imaging is therefore a popular step among the hardware security community in order to identify regions of interest within the die. In this objective, the work presented here proposes new methodologies for infrared circuit imaging. In particular, it is demonstrated that statistical measurement analysis can be performed for automated localization of active areas in an integrated circuit.Also, a new methodology allowing efficient statistical infrared image comparison is proposed. Finally, all results are acquired using a cost efficient infrared measurement platform that allows the investigation of weak electrical source, detecting power consumption as low as 200 µW
Sansiaume, Elodie. "Conception et élaboration de nouvelles métalloenzymes artificielles selon la stratégie du cheval de Troie." Paris 11, 2010. http://www.theses.fr/2010PA112237.
Full textThe construction of artificial métalloenzymes has appeared to be one of the most promising strategies explored to induce stereoselectivity into chemical reactions. New metalloporphyrin-estradiol conjugates and testosterone conjugates have been synthesized and fully characterized, and have been further associated respectively to a monoclonal anti-estradiol antibody 7A3 and neocarzinostatin's mutants, to generate new artificial metalloenzymes following the so-called 'Trojan Horse' strategy. The spectroscopic characteristics and dissociation constants of these complexes were similar to those obtained for the artificial metalloproteins obtained by association of cationic metalloporphyrin-estradiol conjugates to 7A3. This demonstrates that the nature of the porphyrin substituents, anionic or cationic, had little influence on the association with the antibody that is mainly driven by the tight association of the estradiol anchor with the binding pocket of the antibody. These new biocatalysts appeared to have an interesting catalytic activity in oxidation reactions. The iron(III)-anionic-porphyrin-estradiol-antibody complexes and the iron(III)-anionic-porphyrin-testosterone-neocarzinostatine's mutants complexes were found able to catalyze the chemoselective and slightly enantioselective (ee = 10 % et 24 % à 40 % respectively) sulfoxidation of sulfides by H202. The Mn(III)-porphyrin-estradiol antibody complexes were found to catalyze the oxidation of styrene by KHSO5, the Mn(III)-cationic-porphyrin-estradiol-antibody complexes even showing the highest yields so far reported for the oxidation of styrene catalyzed by artificial metalloproteins
Exurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.
Full textThe globalization of integrated circuits fabrication involves several questions about the integrity of the fabricated circuits. Malicious modifications called Hardware Trojans (HT) can be introduced during the circuit production process. Due to the complexity of an integrated circuit, it is really difficult to find this kind of alterations.This work focuses on a non-destructive method of HT detection. We use the paths delays of the studied design as a channel to detect HT. A model to describe paths delays is defined. It takes into account two important parameters which are the experimental conditions and the process variations.Faults attacks by clock glitches based on timing constraints violations have been performed to measure data paths delays. Reliable circuits are used for reference. After validating the relevance of this channel to get information on the internal behavior of the targeted design, experimental detections of HT inserted on two different abstraction levels (RTL and after place and route) were achieved. Process variations are taken into consideration in the studies to detect if the tested circuits are infected
Acunha, guimarães Leonel. "Techniques de Test Pour la Détection de Chevaux de Troie Matériels en Circuits Intégrés de Systèmes Sécurisés." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT080/document.
Full textThe world globalization has led the semiconductor industry to outsource design and fabrication phases, making integrated circuits (ICs) potentially more vulnerable to malicious modifications at design or fabrication time: the hardware Trojans (HTs). New efficient testing techniques are thus required to disclose potential slight and stealth HTs, and to ensure trusted devices. This thesis studies possible threats and proposes two new post-silicon testing techniques able to detect HTs implanted after the generation of the IC netlist. The first proposed technique exploits bulk built-in current sensors (BBICS) -- which are originally designed to identify transient faults in ICs -- by using them as testing mechanisms that provide statistically-comparable digital signatures of the devices under test. With only 16 IC samples, the testing technique can detect dopant-level Trojans of zero-area overhead. The second proposition is a non-intrusive technique for detection of gate-level HTs in asynchronous circuits. With this technique, neither additional hardware nor alterations on the original test set-up are required to detect Trojans smaller than 1% of the original circuit. The studies and techniques devised in this thesis contribute to reduce the IC vulnerability to HT, reusing testing mechanisms and keeping security features of original devices
Elshamy, Mohamed. "Design for security in mixed analog-digital integrated circuits." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS093.
Full textRecently, the enormous cost of owning and maintaining a modern semiconductor manufacturing plant has coerced many companies to go fabless. By outsourcing the manufacturing IC/IP to third-party and often off-shore companies, the process has been extended to potentially untrustworthy companies. This has resulted in several security threats to the semiconductor industry such as counterfeiting, reverse engineering, and HTs insertion. In this thesis, we propose an anti-piracy countermeasure to protect AMS ICs/IPs, a novel HT attack for AMS ICs/IPs, and a novel PUF. More specifically, we propose an anti-piracy technique based on locking for programmable analog circuits. The proposed technique leverages the programmability fabric to implement a natural lock-less locking. We discuss its implementation and its resilience capabilities against foreseen attacks. The proposed HT attack for analog circuits leverages the test infrastructure. The HT is hidden effectively in a digital core and transfers its payload to the analog circuit via the test bus and the interface of the analog circuit to the test bus. Its key characteristic is that it is invisible in the analog domain. The proposed HT is demonstrated on two case studies. This thesis sheds light on the importance of developing new security and trust countermeasures tailored for analog circuits. The proposed PUF, called "neuron-PUF", uses a single spiking neuron as the source of entropy. Its key characteristic is that it uses a single PUF cell and temporal redundancy to generate an arbitrarily long key, which results in significant low area and power overheads compared to mainstream PUFs, such as delay-based and memory-based PUFs
Benhani, El mehdi. "Sécurité des systèmes sur puce complexes hétérogènes." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES016.
Full textThe thesis studies the security of the ARM TrustZone technology in the context of complex heterogeneous SoCs. The thesis presents hardware attacks that affect elements of the SoCs architecture and it also presents countermeasure strategies
Lecomte, Maxime. "Système embarque de mesure de la tension pour la détection de contrefaçons et de chevaux de Troie matériels." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSEM018/document.
Full textDue to the trend to outsourcing semiconductor manufacturing, the integrity of integrated circuits (ICs) became a hot topic. The two mains threats are hardware Trojan (HT) and counterfeits. The main limit of the integrity verification techniques proposed so far is that the bias, induced by the process variations, restricts their efficiency and practicality. In this thesis we aim to detect HTs and counterfeits in a fully embedded way. To that end we first characterize the impact of malicious insertions on a network of sensors. The measurements are done using a network of Ring oscillators. The malicious adding of logic gates (Hardware Trojan) or the modification of the implementation of a different design (counterfeits) will modify the voltage distribution within the IC.Based on these results we present an on-chip detection method for verifying the integrity of ICs. We propose a novel approach which in practice eliminates this limit of process variation bias by making the assumption that IC infection is done at a lot level. We introduce a new variation model for the performance of CMOS structures. This model is used to create signatures of lots which are independent of the process variations. A new distinguisher has been proposed to evaluate whether an IC is infected. This distinguisher allows automatically setting a decision making threshold that is adapted to the measurement quality and the process variation. The goal of this distinguisher is to reach a 100\% success rate within the set of covered HTs family. All the results have been experientially validated and characterized on a set of FPGA prototyping boards
Books on the topic "Cheval de Troie matériel"
Jacques, Martin. Le cheval de Troie. Tournai, Belgique: Casterman, 1988.
Find full textOpération "Cheval de Troie". Montréal: L. Courteau, 1990.
Find full textLa société civile, un cheval de Troie? Levallois Perret: Studyrama, 2012.
Find full textMal-Maeder, D. van. Le cheval de Troie: Variations autour d'une guerre. Gollion: Infolio, 2007.
Find full textValle, Alexandre del. La Turquie dans l'Europe: Un cheval de Troie islamiste? Paris: Editions des Syrtes, 2004.
Find full textHélène de Troie: Roman. [Paris]: Albin Michel, 2007.
Find full textVolkoff, Vladimir. Petite histoire de la désinformation: Du Cheval de Troie à Internet. Monaco: Rocher, 1999.
Find full textLittle, Emily. Le cheval de Troie: Comment les Grecs ont gagne la guerre. Saint-Lambert: Heritage, 1990.
Find full textLes 1000 trucs du cavalier. 4th ed. Paris: Vigot, 2004.
Find full textJeune homme assis dans la neige, ou, Le cheval de Troie: Roman. Paris: Barrault, 1985.
Find full textBook chapters on the topic "Cheval de Troie matériel"
Brodersen, Hans. "L’euro, « cheval de Troie » de la mondialisation ?" In France-Allemagne. Les défis de l'euro. Des politiques économiques entre traditions nationales et intégration, 212–25. Presses Sorbonne Nouvelle, 2002. http://dx.doi.org/10.4000/books.psn.3022.
Full text"4. Politics And The Novel: Le Cheval De Troie." In Paul Nizan: Committed Literature in a Conspiratorial World, 119–50. Princeton: Princeton University Press, 2015. http://dx.doi.org/10.1515/9781400870837-006.
Full textMangin, David, and Sylvain Allemand. "IV. L’économie présentielle, cheval de Troie de l’urbanisme de zoning." In Cultures et créations dans les métropoles-monde, 315–26. Hermann, 2016. http://dx.doi.org/10.3917/herm.lussa.2016.01.0315.
Full textButon, Philippe. "Nous les Garçons et les Filles ou le cheval de Troie communiste." In Le photojournalisme des années 1930 à nos jours, 109–20. Presses universitaires de Rennes, 2014. http://dx.doi.org/10.4000/books.pur.50376.
Full textBelhabib, Assia. "Abdelkebir Khatibi, éloge des seuils." In D'un seuil à l'autre, 151–57. Editions des archives contemporaines, 2017. http://dx.doi.org/10.17184/eac.768.
Full textde Nadaï, Anne. "La description géographique, un cheval de Troie de la géographicité sur le terrain des classes de lycée." In Acteurs et action, 87–100. Presses universitaires de Caen, 2016. http://dx.doi.org/10.4000/books.puc.12934.
Full textBourque, Dominique. "Un Cheval de Troie nommé dé-marquage : la neutralisation des catégories de sexe dans l’œuvre de Monique Wittig." In Lire Monique Wittig aujourd’hui, 67–87. Presses universitaires de Lyon, 2012. http://dx.doi.org/10.4000/books.pul.4224.
Full textConference papers on the topic "Cheval de Troie matériel"
Bonnet, Gilles. "Le livre implémenté." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4127.
Full textCahen, Françoise. "L’éclatement du dialogue romanesque par le Net. L’exemple de deux œuvres d’Éric Reinhardt." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4155.
Full textRouthier, Élisabeth. "Performance auctoriale et dispositif littéraire. Autour de Pourquoi Bologne d’Alain Farah." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4167.
Full textBonnet, Gilles. "ARGUMENT." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4121.
Full textFiguerola, Carme. "Formater sa mémoire : le cas de Programme sensible d’Anne-Marie Garat." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4142.
Full textRossi, Marie-Laure. "Le ramdam et le gazouillis. Alain Veinstein, twitter dans le bruit du monde." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4148.
Full textMarie-Jeanne Zenetti, Université Lyon 2, sans prénom. "Pulsion de documentation, excès du roman contemporain : Emmanuelle Pireyre, Aurélien Bellanger, Philippe Vasset." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4137.
Full textBlesch, Agnès. "Recombiner les data : Féerie générale d’Emmanuelle Pireyre, un « livre-Web »." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4139.
Full textBaetens, Jan. "La suite sur scène. Kenneth lecteur de Goldsmith." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4163.
Full textRongier, Sébastien. "Le Général Instin, les vies multiples du littéraire." In Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4184.
Full text