Literatura académica sobre el tema "Cheval de Troie matériel"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Cheval de Troie matériel".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Cheval de Troie matériel"
Wenger, Stephan y Fulvia Raiola. "Cheval de Troie". Adolescence 71, n.º 1 (2010): 171. http://dx.doi.org/10.3917/ado.071.0171.
Texto completoBaquedano, Michel. "Le cheval de Troie". Empan 61, n.º 1 (2006): 53. http://dx.doi.org/10.3917/empa.061.54.
Texto completoLambin, Gérard. "Le Cheval de Troie". Gaia : revue interdisciplinaire sur la Grèce Archaïque 3, n.º 1 (1998): 97–108. http://dx.doi.org/10.3406/gaia.1998.1342.
Texto completoGrim, Olivier R. "Un nouveau cheval de Troie". Journal des anthropologues, n.º 122-123 (1 de diciembre de 2010): 27–49. http://dx.doi.org/10.4000/jda.3673.
Texto completoGiacomo, Pierre. "Le CGS innocent Cheval de Troie". Bulletin d'histoire de l'électricité 16, n.º 1 (1990): 5–8. http://dx.doi.org/10.3406/helec.1990.1123.
Texto completoNicaise, Ides, Luc Lauwereys y Nick Matheus. "L'économie sociale d'insertion, cheval de bataille ou cheval de Troie ?" Reflets et perspectives de la vie économique XLI, n.º 3 (2002): 77. http://dx.doi.org/10.3917/rpve.413.0077.
Texto completoPommier, Gérard. "Le Livre noir : un cheval de Troie". Le Journal des psychologues 235, n.º 2 (2006): 18. http://dx.doi.org/10.3917/jdp.235.0018.
Texto completoEloit, Ilana. "Un cheval de Troie nommé Monique Wittig". Cahiers du Genre 71, n.º 2 (7 de marzo de 2022): 143–68. http://dx.doi.org/10.3917/cdge.071.0143.
Texto completoLuyet, Pierre-Philippe y Jean Gruenberg. "L’endocytose, cheval de Troie pour l’infection virale". médecine/sciences 21, n.º 11 (noviembre de 2005): 909–10. http://dx.doi.org/10.1051/medsci/20052111909.
Texto completoPerez, Frédéric. "Et aussi... Le complexe du Cheval de Troie". Dialogue 190, n.º 4 (2010): 135. http://dx.doi.org/10.3917/dia.190.0135.
Texto completoTesis sobre el tema "Cheval de Troie matériel"
Ba, Papa-Sidy. "Détection et prévention de Cheval de Troie Matériel (CTM) par des méthodes Orientées Test Logique". Thesis, Montpellier, 2016. http://www.theses.fr/2016MONTT271/document.
Texto completoIn order to reduce the production costs of integrated circuits (ICs), outsourcing the fabrication process has become a major trend in the Integrated Circuits (ICs) industry. As an inevitable unwanted side effect, this outsourcing business model increases threats to hardware products. This process raises the issue of un-trusted foundries in which, circuit descriptions can be manipulated with the aim to possibly insert malicious circuitry or alterations, referred to as Hardware Trojan Horses (HTHs). This motivates semiconductor industries and researchers to study and investigate solutions for detecting during testing and prevent during fabrication, HTH insertion.However, considering the stealthy nature of HTs, it is quite impossible to detect them with conventional testing or even with random patterns. This motivates us to make some contributions in this thesis by proposing solutions to detect and prevent HTH after fabrication (during testing).The proposed methods help to detect HTH as well during testing as during normal mode(run-time), and they are logic testing based.Furthermore, we propose prevention methods, which are also logic testing based, in order tomake harder or quasi impossible the insertion of HTH both in netlist and layout levels
Díaz, Rizo Alán Rodrigo. "Security and Trust for Wireless Integrated Circuits". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS005.
Texto completoThe origin of the hardware security threats is the massively globalized and outsourcing-based Integrated Circuit (IC) supply chain that we see today. The prohibitively cost of owning a first-rate semiconductor foundry forces IC design houses to go fabless and outsource their IC fabrication, assembly, and testing. Outsourcing these tasks intensifies the risk of IC piracy attacks and Hardware Trojan (HT) insertion, and both threats translate into know-how and financial losses for the IC owner. Moreover, complex Systems-on-Chip (SoCs) are built by integrating third-party Intellectual Property (IP) cores from multiple IP providers. However, SoC integrators and IP providers have an imbalanced trust relationship. While IP providers are vulnerable to IP overuse, IP cloning, and IC overproduction, SoC integrators fear integrating HT-infected IPs into their systems. We propose a locking-based design-for-security methodology. In addition, we develop an RF transceiver-specific locking methodology that consists in two spatially separated mechanisms. inserting a locking mechanism into the circuit that unlocks with a single secret key in the form of a digital word. To assess the security of wireless ICs, we propose an HT attack that leaks sensitive information from the transmitter within a legitimate transmission
Courbon, Franck. "Rétro-conception matérielle partielle appliquée à l'injection ciblée de fautes laser et à la détection efficace de Chevaux de Troie Matériels". Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0788/document.
Texto completoThe work described in this thesis covers an integrated circuit characterization methodology based on a partial hardware reverse engineering. On one hand in order to improve integrated circuit security characterization, on the other hand in order to detect the presence of Hardware Trojans. Our approach is said partial as it is only based on a single hardware layer of the component and also because it does not aim to recreate a schematic or functional description of the whole circuit. A low cost, fast and efficient reverse engineering methodology is proposed. The latter enables to get a global image of the circuit where only transistor's active regions are visible. It thus allows localizing every standard cell. The implementation of this methodology is applied over different secure devices. The obtained image according to the methodology declined earlier is processed in order to spatially localize sensible standard cells, nay critical in terms of security. Once these cells identified, we characterize the laser effect over different location of these standard cells and we show the possibility with the help of laser fault injection the value they contain. The technique is novel as it validates the fault model over a complex gate in 90nm technology node.Finally, a Hardware Trojan detection method is proposed using the partial reverse engineering output. We highlight the addition of few non listed cells with the application on a couple of circuits. The method implementation therefore permits to detect, without full reverse-engineering (and so cheaply), quickly and efficiently the presence of Hardware Trojans
Cozzi, Maxime. "Infrared Imaging for Integrated Circuit Trust and Hardware Security". Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS046.
Texto completoThe generalization of integrated circuits and more generally electronics to everyday life systems (military, finance, health, etc) rises the question about their security. Today, the integrity of such circuits relies on a large panel of known attacks for which countermeasures have been developed. Hence, the search of new vulnerabilities represents one of the largest contribution to hardware security. The always rising complexity of dies leads to larger silicon surfaces.Circuit imaging is therefore a popular step among the hardware security community in order to identify regions of interest within the die. In this objective, the work presented here proposes new methodologies for infrared circuit imaging. In particular, it is demonstrated that statistical measurement analysis can be performed for automated localization of active areas in an integrated circuit.Also, a new methodology allowing efficient statistical infrared image comparison is proposed. Finally, all results are acquired using a cost efficient infrared measurement platform that allows the investigation of weak electrical source, detecting power consumption as low as 200 µW
Sansiaume, Elodie. "Conception et élaboration de nouvelles métalloenzymes artificielles selon la stratégie du cheval de Troie". Paris 11, 2010. http://www.theses.fr/2010PA112237.
Texto completoThe construction of artificial métalloenzymes has appeared to be one of the most promising strategies explored to induce stereoselectivity into chemical reactions. New metalloporphyrin-estradiol conjugates and testosterone conjugates have been synthesized and fully characterized, and have been further associated respectively to a monoclonal anti-estradiol antibody 7A3 and neocarzinostatin's mutants, to generate new artificial metalloenzymes following the so-called 'Trojan Horse' strategy. The spectroscopic characteristics and dissociation constants of these complexes were similar to those obtained for the artificial metalloproteins obtained by association of cationic metalloporphyrin-estradiol conjugates to 7A3. This demonstrates that the nature of the porphyrin substituents, anionic or cationic, had little influence on the association with the antibody that is mainly driven by the tight association of the estradiol anchor with the binding pocket of the antibody. These new biocatalysts appeared to have an interesting catalytic activity in oxidation reactions. The iron(III)-anionic-porphyrin-estradiol-antibody complexes and the iron(III)-anionic-porphyrin-testosterone-neocarzinostatine's mutants complexes were found able to catalyze the chemoselective and slightly enantioselective (ee = 10 % et 24 % à 40 % respectively) sulfoxidation of sulfides by H202. The Mn(III)-porphyrin-estradiol antibody complexes were found to catalyze the oxidation of styrene by KHSO5, the Mn(III)-cationic-porphyrin-estradiol-antibody complexes even showing the highest yields so far reported for the oxidation of styrene catalyzed by artificial metalloproteins
Exurville, Ingrid. "Détection non destructive de modification malveillante de circuits intégrés". Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0800/document.
Texto completoThe globalization of integrated circuits fabrication involves several questions about the integrity of the fabricated circuits. Malicious modifications called Hardware Trojans (HT) can be introduced during the circuit production process. Due to the complexity of an integrated circuit, it is really difficult to find this kind of alterations.This work focuses on a non-destructive method of HT detection. We use the paths delays of the studied design as a channel to detect HT. A model to describe paths delays is defined. It takes into account two important parameters which are the experimental conditions and the process variations.Faults attacks by clock glitches based on timing constraints violations have been performed to measure data paths delays. Reliable circuits are used for reference. After validating the relevance of this channel to get information on the internal behavior of the targeted design, experimental detections of HT inserted on two different abstraction levels (RTL and after place and route) were achieved. Process variations are taken into consideration in the studies to detect if the tested circuits are infected
Acunha, guimarães Leonel. "Techniques de Test Pour la Détection de Chevaux de Troie Matériels en Circuits Intégrés de Systèmes Sécurisés". Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT080/document.
Texto completoThe world globalization has led the semiconductor industry to outsource design and fabrication phases, making integrated circuits (ICs) potentially more vulnerable to malicious modifications at design or fabrication time: the hardware Trojans (HTs). New efficient testing techniques are thus required to disclose potential slight and stealth HTs, and to ensure trusted devices. This thesis studies possible threats and proposes two new post-silicon testing techniques able to detect HTs implanted after the generation of the IC netlist. The first proposed technique exploits bulk built-in current sensors (BBICS) -- which are originally designed to identify transient faults in ICs -- by using them as testing mechanisms that provide statistically-comparable digital signatures of the devices under test. With only 16 IC samples, the testing technique can detect dopant-level Trojans of zero-area overhead. The second proposition is a non-intrusive technique for detection of gate-level HTs in asynchronous circuits. With this technique, neither additional hardware nor alterations on the original test set-up are required to detect Trojans smaller than 1% of the original circuit. The studies and techniques devised in this thesis contribute to reduce the IC vulnerability to HT, reusing testing mechanisms and keeping security features of original devices
Elshamy, Mohamed. "Design for security in mixed analog-digital integrated circuits". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS093.
Texto completoRecently, the enormous cost of owning and maintaining a modern semiconductor manufacturing plant has coerced many companies to go fabless. By outsourcing the manufacturing IC/IP to third-party and often off-shore companies, the process has been extended to potentially untrustworthy companies. This has resulted in several security threats to the semiconductor industry such as counterfeiting, reverse engineering, and HTs insertion. In this thesis, we propose an anti-piracy countermeasure to protect AMS ICs/IPs, a novel HT attack for AMS ICs/IPs, and a novel PUF. More specifically, we propose an anti-piracy technique based on locking for programmable analog circuits. The proposed technique leverages the programmability fabric to implement a natural lock-less locking. We discuss its implementation and its resilience capabilities against foreseen attacks. The proposed HT attack for analog circuits leverages the test infrastructure. The HT is hidden effectively in a digital core and transfers its payload to the analog circuit via the test bus and the interface of the analog circuit to the test bus. Its key characteristic is that it is invisible in the analog domain. The proposed HT is demonstrated on two case studies. This thesis sheds light on the importance of developing new security and trust countermeasures tailored for analog circuits. The proposed PUF, called "neuron-PUF", uses a single spiking neuron as the source of entropy. Its key characteristic is that it uses a single PUF cell and temporal redundancy to generate an arbitrarily long key, which results in significant low area and power overheads compared to mainstream PUFs, such as delay-based and memory-based PUFs
Benhani, El mehdi. "Sécurité des systèmes sur puce complexes hétérogènes". Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES016.
Texto completoThe thesis studies the security of the ARM TrustZone technology in the context of complex heterogeneous SoCs. The thesis presents hardware attacks that affect elements of the SoCs architecture and it also presents countermeasure strategies
Lecomte, Maxime. "Système embarque de mesure de la tension pour la détection de contrefaçons et de chevaux de Troie matériels". Thesis, Lyon, 2016. http://www.theses.fr/2016LYSEM018/document.
Texto completoDue to the trend to outsourcing semiconductor manufacturing, the integrity of integrated circuits (ICs) became a hot topic. The two mains threats are hardware Trojan (HT) and counterfeits. The main limit of the integrity verification techniques proposed so far is that the bias, induced by the process variations, restricts their efficiency and practicality. In this thesis we aim to detect HTs and counterfeits in a fully embedded way. To that end we first characterize the impact of malicious insertions on a network of sensors. The measurements are done using a network of Ring oscillators. The malicious adding of logic gates (Hardware Trojan) or the modification of the implementation of a different design (counterfeits) will modify the voltage distribution within the IC.Based on these results we present an on-chip detection method for verifying the integrity of ICs. We propose a novel approach which in practice eliminates this limit of process variation bias by making the assumption that IC infection is done at a lot level. We introduce a new variation model for the performance of CMOS structures. This model is used to create signatures of lots which are independent of the process variations. A new distinguisher has been proposed to evaluate whether an IC is infected. This distinguisher allows automatically setting a decision making threshold that is adapted to the measurement quality and the process variation. The goal of this distinguisher is to reach a 100\% success rate within the set of covered HTs family. All the results have been experientially validated and characterized on a set of FPGA prototyping boards
Libros sobre el tema "Cheval de Troie matériel"
Jacques, Martin. Le cheval de Troie. Tournai, Belgique: Casterman, 1988.
Buscar texto completoOpération "Cheval de Troie". Montréal: L. Courteau, 1990.
Buscar texto completoLa société civile, un cheval de Troie? Levallois Perret: Studyrama, 2012.
Buscar texto completoMal-Maeder, D. van. Le cheval de Troie: Variations autour d'une guerre. Gollion: Infolio, 2007.
Buscar texto completoValle, Alexandre del. La Turquie dans l'Europe: Un cheval de Troie islamiste? Paris: Editions des Syrtes, 2004.
Buscar texto completoHélène de Troie: Roman. [Paris]: Albin Michel, 2007.
Buscar texto completoVolkoff, Vladimir. Petite histoire de la désinformation: Du Cheval de Troie à Internet. Monaco: Rocher, 1999.
Buscar texto completoLittle, Emily. Le cheval de Troie: Comment les Grecs ont gagne la guerre. Saint-Lambert: Heritage, 1990.
Buscar texto completoLes 1000 trucs du cavalier. 4a ed. Paris: Vigot, 2004.
Buscar texto completoJeune homme assis dans la neige, ou, Le cheval de Troie: Roman. Paris: Barrault, 1985.
Buscar texto completoCapítulos de libros sobre el tema "Cheval de Troie matériel"
Brodersen, Hans. "L’euro, « cheval de Troie » de la mondialisation ?" En France-Allemagne. Les défis de l'euro. Des politiques économiques entre traditions nationales et intégration, 212–25. Presses Sorbonne Nouvelle, 2002. http://dx.doi.org/10.4000/books.psn.3022.
Texto completo"4. Politics And The Novel: Le Cheval De Troie". En Paul Nizan: Committed Literature in a Conspiratorial World, 119–50. Princeton: Princeton University Press, 2015. http://dx.doi.org/10.1515/9781400870837-006.
Texto completoMangin, David y Sylvain Allemand. "IV. L’économie présentielle, cheval de Troie de l’urbanisme de zoning". En Cultures et créations dans les métropoles-monde, 315–26. Hermann, 2016. http://dx.doi.org/10.3917/herm.lussa.2016.01.0315.
Texto completoButon, Philippe. "Nous les Garçons et les Filles ou le cheval de Troie communiste". En Le photojournalisme des années 1930 à nos jours, 109–20. Presses universitaires de Rennes, 2014. http://dx.doi.org/10.4000/books.pur.50376.
Texto completoBelhabib, Assia. "Abdelkebir Khatibi, éloge des seuils". En D'un seuil à l'autre, 151–57. Editions des archives contemporaines, 2017. http://dx.doi.org/10.17184/eac.768.
Texto completode Nadaï, Anne. "La description géographique, un cheval de Troie de la géographicité sur le terrain des classes de lycée". En Acteurs et action, 87–100. Presses universitaires de Caen, 2016. http://dx.doi.org/10.4000/books.puc.12934.
Texto completoBourque, Dominique. "Un Cheval de Troie nommé dé-marquage : la neutralisation des catégories de sexe dans l’œuvre de Monique Wittig". En Lire Monique Wittig aujourd’hui, 67–87. Presses universitaires de Lyon, 2012. http://dx.doi.org/10.4000/books.pul.4224.
Texto completoActas de conferencias sobre el tema "Cheval de Troie matériel"
Bonnet, Gilles. "Le livre implémenté". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4127.
Texto completoCahen, Françoise. "L’éclatement du dialogue romanesque par le Net. L’exemple de deux œuvres d’Éric Reinhardt". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4155.
Texto completoRouthier, Élisabeth. "Performance auctoriale et dispositif littéraire. Autour de Pourquoi Bologne d’Alain Farah". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4167.
Texto completoBonnet, Gilles. "ARGUMENT". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4121.
Texto completoFiguerola, Carme. "Formater sa mémoire : le cas de Programme sensible d’Anne-Marie Garat". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4142.
Texto completoRossi, Marie-Laure. "Le ramdam et le gazouillis. Alain Veinstein, twitter dans le bruit du monde". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4148.
Texto completoMarie-Jeanne Zenetti, Université Lyon 2, sans prénom. "Pulsion de documentation, excès du roman contemporain : Emmanuelle Pireyre, Aurélien Bellanger, Philippe Vasset". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4137.
Texto completoBlesch, Agnès. "Recombiner les data : Féerie générale d’Emmanuelle Pireyre, un « livre-Web »". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4139.
Texto completoBaetens, Jan. "La suite sur scène. Kenneth lecteur de Goldsmith". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4163.
Texto completoRongier, Sébastien. "Le Général Instin, les vies multiples du littéraire". En Internet est un cheval de Troie. Fabula, 2017. http://dx.doi.org/10.58282/colloques.4184.
Texto completo