Contents
Academic literature on the topic 'Contremesure'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Contremesure.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Contremesure"
SAUVET, F., M. CHENNAOUI, S. BANZET, C. BOURRILHON, F. CANINI, L. BOURDON, and N. KOULMANN. "Coup de chaleur d’exercice, système cardiovasculaire et vulnérabilité systémique." Médecine et Armées Vol. 40 No. 3, Volume 40, Numéro 3 (June 1, 2012): 231–40. http://dx.doi.org/10.17184/eac.6611.
Full textDissertations / Theses on the topic "Contremesure"
Damiot, Anthony. "Effet d'une contremesure nutritionnelle sur l'inflexibilité métabolique induite par simulation d'impesanteur chez l'homme." Thesis, Strasbourg, 2018. http://www.theses.fr/2018STRAJ124/document.
Full textSpace missions and bedrest simulation studies have shown that physical inactivity affects all physiological systems in humans. In prolonged bed rest conditions, our laboratory (UMR7178, IPHC, DEPE, Strasbourg) showed that metabolic adaptations were close to that found in the metabolic syndrome associated with metabolic chronic diseases in the general population. Based on these results, we proposed a hypothesis to describe the cascade of events leading to metabolic alterations in simulated microgravity, leading to the development of metabolic inflexibility. Metabolic inflexibility is defined as the inability of the body to adjust fuel use to changes in fuel availability. The first objective of this Thesis was to test this hypothesis and understand the mechanisms underlying the simulated microgravity induced metabolic alterations. Specifically, we focused on characterizing the metabolic inflexibility syndrome in humans through clinical investigation of muscle condition, inflammation and oxidative stress, insulin sensitivity and oxidation of energy substrates in a proof of concept study and a 60-day microgravity simulation study in healthy male adults. Based on recent studies demonstrating the impact of nutritional supplements on metabolic adaptations associated with many chronic metabolic diseases, a proof-of-concept study tested the efficacy of a nutritional cocktail composed of polyphenols, omega-3, vitamin E and selenium. In the feasibility study, we showed that supplementation reduced muscle atrophy, oxidative stress and the development of metabolic inflexibility via an improvement in lipid oxidation and a reduction in de novo lipogenesis following a 20-day period of physical inactivity induced by daily step reduction. Based on these first results, a 60-day bed rest study was conducted in health men to test the effects of the dietary cocktail in simulated microgravity conditions. In this second human clinical research study, nutritional supplementation prevented at least partially acute and chronic adaptations caused by physical inactivity induced by bed rest. In particular, supplementation increased antioxidant blood defenses, prevented increased lipid levels, reduced lipid oxidation and mitigated the development of acute and chronic metabolic inflexibility in absence of metabolic challenge. However, the countermeasure did not have a protective effect following a metabolic challenge in the form of carbohydrate overnutrition. All the results indicate that the development of metabolic inflexibility appears to be an early event, which, if detected in time, could prove to be a useful biomarker to use to prevent chronic diseases in the 21st century. Moreover, this study demonstrated the advantage of an antioxidant and anti-inflammatory cocktail by limiting metabolic alterations without having harmful effects on other systems, while being easy to implement and cost-effective. Even if the nutritional countermeasure used in this study is not sufficient to keep all physiological systems intact, further studies will have to be carried out to find the ideal combination of countermeasures to limit microgravity-induced degradation and thus allow new advances in space exploration (Moon, Mars) over the next decades. In this line, an adapted protocol of physical activity combined with a nutritional countermeasure in the form of a cocktail could be a promising approach
Rudwill, Floriane. "Conséquences d’une simulation d’impesanteur de 21 jours chez l’homme sur le métabolisme des lipides et effets d’une supplémentation en protéines testée comme contremesure." Thesis, Strasbourg, 2015. http://www.theses.fr/2015STRAJ009/document.
Full textDuring 21 days of simulated microgravity, the development of several metabolic alterations has been studied: a low-grade inflammation and an alteration of insulin sensitivity and lipid metabolism. Known for their positive effect on metabolism, whey proteins supplementation combined with alkaline salts have also been tested. At the opposite of previous studies, no inflammation, nor lipid metabolism alterations have clearly been described. Nevertheless, a decrease in carbohydrates oxidation in favor of lipids is observed, suggesting the development of insulin insensitivity. Our data suggest that it may be possible to prevent the metabolic disorders associated with severe physical inactivity by anisocaloric replacement of lipids by proteins in the diet, along with a protein intake of 1.2g/kg/day and tight control of energy balance by adjusting energy intake
Séré, Ahmadou Al Khary. "Tissage de contremesures pour machines virtuelles embarquées." Limoges, 2010. http://aurore.unilim.fr/theses/nxfile/default/ec9d960e-5234-4fd7-a38f-bd8107443f05/blobholder:0/2010LIMO4017.pdf.
Full textOur goal, is to propose some way to guaranty that we can detect that a fault attack occurs tampering the smart card ship. And we want to do this in an automatic way that is affordable in resources (memory and CPU averhead) for the card. To achieve this goal, we use a functionality introduced by Java Card 3, the security annotations that allow a programmer to choose sensitive methods or classes of his application. Allowing the virtual machine to execute them in a secured mode. The developed approach is to use security information introduce in application code and to modify the java virtual machine to make good use of them to detect the attack. These researches focus on proposing different mechanisms that can help to fight against fault attacks in verifying during runtime the code integrity or the control flow integrity
Ducousso, Rieul. "Sécurisation des accès aux périphériques et depuis les périphériques dans une architecture multicœur RISC-V utilisée pour la virtualisation." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS040.
Full textToday, computer security is a major topic in various fields such as healthcare, transport, industry or defense. Systems integrated an ever increasing number of components developed by untrusted sources. Covert channel attacks subvert system mechanism to create a communication channel between entities that otherwise shouldn't be able to communicate thus breaching data confidentiality. These attacks circumvent classical isolation mechanisms by allowing processes or virtual machines to exchange and exfiltrate data. Most attacks target the processor and its neighbouring components. We propose a new side-channel attack exploiting the temporal variations due to the memory hierarchy to implement a communication channel. This attack breaks the isolation between peripherals of a virtualized system opening a communication channel between two malicious devices. This attack relies on the adaptation of principles exploited by covert channels on processors with specificities of peripherals. We show that it is possible to exchange data between two devices isolated by an IOMMU. Secondly, we modify the microarchitecture of the IOMMU to reduce the impact of such attacks. The defense strategy is to decorrelate the operations performed by the peripherals and the internal state of its components. We show in simulation and on a system incorporating a processor running Linux implemented on a board FPGA the effects of this countermeasure on the isolation as well as on the device performance. This countermeasure reduces the throughput covert channel without however negating it fully. The impact on performance of peripheral memory accesses is limited
Joaquim, da Rolt Jean. "Testabilité versus Sécurité : Nouvelles attaques par chaîne de scan & contremesures." Thesis, Montpellier 2, 2012. http://www.theses.fr/2012MON20168.
Full textIn this thesis, we firstly analyze the vulnerabilities induced by test infrastructures onto embedded secrecy in digital integrated circuits dedicated to cryptography. Then we propose new scan-based attacks and effective countermeasures. Scan chains insertion is the most used technique to ensure the testability of digital cores, providing high-fault coverage. However, for ICs dealing with secret information, scan chains can be used as back doors for accessing secret data, thus becominga threat to device's security. We start by describing a series of new attacks that exploit information leakage out of advanced Design-for-Testability structures such as response compaction, X-Masking and partial scan. Conversely to some previous works that proposed that these structures are immune to scan-based attacks, we show that our new attacks can reveal secret information that is embedded inside the chip boundaries. Regarding the countermeasures, we propose three new solutions. The first one moves the comparison between test responses and expected responses from the AutomaticTest Equipment to the chip. This solution has a negligible area overhead, no effect on fault coverage. The second countermeasure aims to protect the circuit against unauthorized access, for instance to the test mode, and also ensure the authentication of the circuit. For thatpurpose, mutual-authentication using Schnorr protocol on Elliptic Curves is implemented. As the last countermeasure, we propose that Differential Analysis Attacks algorithm-level countermeasures, suchas point-blinding and scalar-blinding can be reused to protect the circuit against scan-based attacks
Bhasin, Shivam. "Contremesures au niveau logique pour sécuriser les architectures de crypto-processeurs dans un FPGA." Phd thesis, Télécom ParisTech, 2011. http://pastel.archives-ouvertes.fr/pastel-00683079.
Full textSelmane, Nidhal. "Attaques en fautes globales et locales sur les cryptoprocesseurs : mise en oeuvre et contremesures." Phd thesis, Paris, Télécom ParisTech, 2010. https://pastel.hal.science/pastel-00565881.
Full textNowadays, embedded systems and smart cards are part of everyday life. With the proliferation of these devices the need for security increases. In order to meet this demand, cryptographic algorithms are applied. However, even if the algorithms on mobile devices are secure from a cryptanalytical point of view, the secret they use can be revealed by attacking the cryptographic implementation. Indeed an adversary with physical access to the device can benefit from its characteristics or influence its behavior. Methods that observe the activity of a device are considered as passive attacks. In contrast, active attacks try to manipulate the computation and benefit from the erroneous results. These last methods are also called fault injection attacks. This thesis deals with fault attacks. It focuses on practical validations of theoretical attack on symmetric cryptographic algorithm using non-invasive attack. First a new global method to inject fault called setup time violation attack on both ASICs and FPGAs has been studied and carried out on different AES implementations. Then local and semi-invasive optical fault attacks by means of laser beam have been performed on a software implementation. Beside this analysis work, some countermeasures have been investigated. It has been notably shown that Differential with Precharge Logics, already good countermeasure against passive attacks, provide excellent resilience properties against fault attacks. We have demonstrated theoretically and shown practically that information hiding (such as WDDL) makes it difficult to mount fault attacks, since faulty outputs reveal no information about the keys
Selmane, Nidhal. "Attaques en fautes globales et locales sur les cryptoprocesseurs AES : mise en œuvre et contremesures." Phd thesis, Télécom ParisTech, 2010. http://pastel.archives-ouvertes.fr/pastel-00565881.
Full textGomes, Mesquita Daniel. "Architectures Reconfigurables et Cryptographie: Une Analyse de Robustesse et Contremesures Face aux Attaques par Canaux Cachés." Phd thesis, Université Montpellier II - Sciences et Techniques du Languedoc, 2006. http://tel.archives-ouvertes.fr/tel-00115736.
Full textcryptographie. Divers aspects sont étudiés, tels que les principes de base de la cryptographie,
l'arithmétique modulaire, les attaques matériaux et les architectures reconfigurables. Des méthodes
originales pour contrecarrer les attaques par canaux cachés, notamment la DPA, sont proposés.
L'architecture proposée est efficace du point de vue de la performance et surtout est robuste contre
la DPA.
Provost, Romain. "Adaptation cardiovasculaire de l'astronaute : en confinement et en microgravité réelle et simulée." Thesis, Tours, 2015. http://www.theses.fr/2015TOUR3307/document.
Full textThis PhD work focuses on astronaut cardiovascular adaptation and deconditioning in real prolonged microgravity, short simulated microgravity (with and without countermeasures) and long-term confinement. To answer to this topic 3 humans experimental studies have been performed, and thus the present PhD work is divided into 3 distinct parts . The first one is the mission « Mars 500 » which consists in 520-days confinement with 6 subjects-volunteers mission. The second is the project « Vessel Imaging » whitch consit in a 6-months spaceflight aboard the « International Space Station » with 10 subjects-astronauts. The third is the « Short Time Bed -Rest (STBR) » study (12 subjects) which consist in a short period of bedrest (-6°, 5 days) with and without the use of two cardiovascular countermeasures by hypergravity (continuous or intermittent)
Books on the topic "Contremesure"
Advisory Group for Aerospace Research and Development. Aerospace Medical Panel., ed. Impact head injury: Responses, mechanisms, tolerance, treatment and countermeasures = les traumatismes craniens consecutifs aux impacts : les mecanismes, la tolerance, le traitement et les contremesures. Neuilly sur Seine: Agard, 1997.
Find full text