Добірка наукової літератури з теми "Sécurité logicielle et matérielle"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Sécurité logicielle et matérielle".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Sécurité logicielle et matérielle"
Bigué, L., and M. Hassenforder. "Lecteur de codes à barres : approche matérielle et logicielle unifiée." J3eA 4 (2005): 024. http://dx.doi.org/10.1051/bib-j3ea:2005724.
Повний текст джерелаJosso-Laurain, Thomas, Jonathan Ledy, Frédéric Fondement, Sébastien Bindel, Frédéric Drouhin, Françoise Simon, and Michel Basset. "Transformer le campus universitaire en laboratoire ouvert : le projet SMART-UHA." J3eA 21 (2022): 0001. http://dx.doi.org/10.1051/j3ea/20220001.
Повний текст джерелаFiorelli, Cécile, Annie Dufour, Guillaume Massein, and Cindy Sauvaigo. "Pluriactivité : entre sécurité matérielle et plaisir au travail." Pour 212, no. 5 (2011): 179. http://dx.doi.org/10.3917/pour.212.0179.
Повний текст джерела-LAMBOLAIS, Thomas. "Risques et sécurité des réseaux et des systèmes à composante logicielle (2ème partie)." Revue de l'Electricité et de l'Electronique -, no. 08 (2006): 63. http://dx.doi.org/10.3845/ree.2006.080.
Повний текст джерела-LAMBOLAIS, Thomas. "Risques et sécurité des réseaux et des systèmes à composante logicielle (1ère partie)." Revue de l'Electricité et de l'Electronique -, no. 06 (2006): 23. http://dx.doi.org/10.3845/ree.2006.101.
Повний текст джерелаAit Said, N., M. Benabdenbi, and G. Villanova Magalhães. "Prototypage Matériel-Logiciel de Systèmes Intégrés avec l'architecture RISC-V." J3eA 18 (2019): 1016. http://dx.doi.org/10.1051/j3ea/20191016.
Повний текст джерелаBruguier, F., P. Benoit, L. Dalmasso, B. Pradarelli, E. Lecointre, and L. Torres. "AMUSE : l'escape game pour s'évader en toute sécurité." J3eA 18 (2019): 1017. http://dx.doi.org/10.1051/j3ea/20191017.
Повний текст джерелаRoussel, N., O. Potin, J. B. Rigaud, and J. M. Dutertre. "Implémentation matérielle d’un algorithme de cryptographie légère pour objets connectés." J3eA 21 (2022): 1004. http://dx.doi.org/10.1051/j3ea/20221004.
Повний текст джерелаDadouche, F., and W. Uhring. "Enseignement par la pratique de la conception conjointe Hard/Soft de systèmes numériques embarqués sur cible FPGA." J3eA 21 (2022): 1018. http://dx.doi.org/10.1051/j3ea/20221018.
Повний текст джерелаCraig, Béatrice. "La transmission des patrimoines fonciers dans le Haut-Saint-Jean au XIXe siècle." Revue d'histoire de l'Amérique française 45, no. 2 (August 25, 2008): 207–28. http://dx.doi.org/10.7202/304966ar.
Повний текст джерелаДисертації з теми "Sécurité logicielle et matérielle"
Mao, Yuxiao. "Détection dynamique d'attaques logicielles et matérielles basée sur l'analyse de signaux microarchitecturaux." Thesis, Toulouse, INSA, 2022. http://www.theses.fr/2022ISAT0015.
Повний текст джерелаIn recent years, computer systems have evolved quickly. This evolution concerns different layers of the system, both software (operating systems and user programs) and hardware (microarchitecture design and chip technology). While this evolution allows to enrich the functionalities and improve the performance, it has also increased the complexity of the systems. It is difficult, if not impossible, to fully understand a particular modern computer system, and a greater complexity also stands for a larger attack surface for hackers. While most of the attacks target software vulnerabilities, over the past two decades, attacks exploiting hardware vulnerabilities have emerged and demonstrated their serious impact. For example, in 2018, the Spectre and Meltdown attacks have been disclosed, that exploited vulnerabilities in the microarchitecture layer to allow powerful arbitrary reads, and highlighted the security issues that can arise from certain optimizations of system microarchitecture. Detecting and preventing such attacks is not intuitive and there are many challenges to deal with: (1) the great difficulty in identifying sources of vulnerability implied by the high level of complexity and variability of different microarchitectures; (2) the significant impact of countermeasures on overall performance and on modifications to the system's hardware microarchitecture generally not desired; and (3) the necessity to design countermeasures able to adapt to the evolution of the attack after deployment of the system. To face these challenges, this thesis focuses on the use of information available at the microarchitecture level to build efficient attack detection methods.In particular, we describe a framework allowing the dynamic detection of attacks that leave fingerprints at the system's microarchitecture layer. This framework proposes: (1) the use microarchitectural information for attack detection, which can effectively cover attacks targeting microarchitectural vulnerabilities; (2) a methodology that assists designers in selecting relevant microarchitectural information to extract; (3) the use of dedicated connections for the transmission of information extracted, in order to ensure high transmission bandwidth and prevent data loss; and (4) the use of reconfigurable hardware in conjunction with software to implement attack detection logic. This combination (composing to the so-called detection module) reduces the performance overhead through hardware acceleration, and allows updating detection logic during the system lifetime with reconfiguration in order to adapt to the evolution of attacks. We present in detail the proposed architecture and modification needed on the operating system, the methodology for selecting appropriate microarchitectural information and for integrating this framework into a specific computer system, and we describe how the final system integrating our detection module is able to detect attacks and adapt to attack evolution. This thesis also provides two use-case studies implemented on a prototype (based on a RISC-V core with a Linux operating system) on an FPGA. It shows that, thanks to the analysis of microarchitectural information, relatively simple logic implemented in the detection module is sufficient to detect different classes of attacks (cache side-channel attack and ROP attack)
Maillot, Patrick. "Contribution à l'étude des systèmes graphiques : architectures logicielle et matérielle." Lyon 1, 1986. http://www.theses.fr/1986LYO19048.
Повний текст джерелаDuc, Guillaume. "Support matériel, logiciel et cryptographique pour une éxécution sécurisée de processus." Télécom Bretagne, 2007. http://www.theses.fr/2007TELB0041.
Повний текст джерелаThe majority of the solutions to the issue of computer security (algorithms, protocols, secure operating systems, applications) are running on insecure hardware architectures that may be vulnerable to physical (bus spying, modification of the memory content, etc. ) or logical (malicious operating system) attacks. Several secure architectures, which are able to protect the confidentiality and the correct execution of programs against such attacks, have been proposed for several years. After the presentation of some cryptographic bases and a review of the main secure architectures proposed in the litterature, we will present the secure architecture CryptoPage. This architecture guarantees the confidentiality of the code and the data of applications and the correct execution against hardware or software attacks. In addition, it also includes a mechanism to reduce the information leakage on the address bus, while keeping reasonable performances. We will also study how to delegate some security operations of the architecture to an untrusted operating system in order to get more flexibility but without compromising the security of thearchitecture. Finally, some other important mechanism are studied: encrypted processid entification, attestations of the results, management of software signals, management of the threads, inter-process communication
Crespo, Saucedo Raùl. "Plate-forme logicielle et matérielle pour le turbo codage et décodage : Turbo2000." Lorient, 2004. http://www.theses.fr/2004LORIS030.
Повний текст джерелаNguyen, Viêt Tung. "Infrastructure matérielle et logicielle pour la fusion/fission d'interface homme-machine." Grenoble INPG, 2008. http://www.theses.fr/2008INPG0107.
Повний текст джерелаNowadays, the User Interface (UI) Is changlng: it moves from centralization to distribution, from sedentary function mode to nomadic function mode. This thesis deals with the plastlcity of UI focuslng on the hardware and software infrastructure for fusion/fission of Human Computer Interface. Because of the similarity between the adaptation of the UI and the adaptation of the adaptive controls, this thesls proposes to combine these two areas. Our work revealed the requirements of the continuous estimation for context of use and for usability of UI. We have developed a system prototype capturing contexts to detect changes ln UI interaction resources. An application was developed as an Illustration of UI fusion/fission. Using the developed sensor system, the interactive system provides the user new capabilities such as (i) two-way interaction, (ii) accessing to the different services and (iii) adapting the UI
Sadde, Gérald. "Sécurité logicielle des systèmes informatiques : aspects pénaux et civils." Montpellier 1, 2003. http://www.theses.fr/2003MON10019.
Повний текст джерелаOmar, Tariq Ali. "Une architecture mixte logicielle et matérielle pour le contrôle intelligent en temps réel." Grenoble INPG, 2006. http://www.theses.fr/2006INPG0089.
Повний текст джерелаAutonomous intelligent control system for a dynamic and dangerous environment necessitates the capacity to identify the failure threats and to plan the real-time responses that ensure safety and goal achievement by the autonomous system. We propose a real-time intelligent control architecture called ORICA. It consists of an AI reasoning subsystem and a real-time response execution subsystem. The AI reasoning subsystem models the temporal and logical characteristics of the environment and plans the system responses. The real-time subsystem, which is composed of a software section and a hardware section, executes these responses to avoid failure of the autonomous system. Its performance behavior is unparalleled by the previous classical approaches (pure hardware or pure software). The software section uses behavior switching according to the frequency of external events and a unique reconfigurable intelligence behavior has been implemented in hardware section, using a reprogrammable chip (FPGA)
Laporte, Hervé. "Etude logicielle et matérielle d'un système de visualisation temps-réel basé sur la quadrique." Lille 1, 1996. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/1996/50376-1996-156.pdf.
Повний текст джерелаJordan, Harald. "Architectures logicielle et matérielle d'un contrôleur de robot multisensoriel : méthodologie et conception du système temps réel." Université Louis Pasteur (Strasbourg) (1971-2008), 1997. http://www.theses.fr/1997STR13155.
Повний текст джерелаLaurent, Johan. "Modélisation de fautes utilisant la description RTL de microarchitectures pour l’analyse de vulnérabilité conjointe matérielle-logicielle." Thesis, Université Grenoble Alpes, 2020. http://www.theses.fr/2020GRALT061.
Повний текст джерелаNowadays, digital security is of major importance to our societies. Communications, energy, transport, means of production, Internet of Things… The use of digital systems is ever increasing, making them critical to the correct working of our world. A little more than two decades ago, a new form of attack has risen: fault injection. Essentially, it consists in perturbing a circuit during computation, using various methods such as power glitches, electromagnetic injection or laser injection; in the aim of generating errors. These errors can then be exploited by an attacker to reveal secret information from the circuit, or to bypass some security measures.System complexification and technological advances make digital systems particularly vulnerable against fault injection attacks. In order to thwart these attacks effectively and at a reasonable cost, it is necessary to consider security from the early phases of the design flow. To do that, a better understanding of how faults impact processors is required. Effects provoked by fault injection can be modeled at various levels of abstraction. Currently, if the impact of faults at the hardware level is relatively well known, the same cannot be said for the software level. Security analyses at the software level are based on simple software fault models such as instruction skip, register corruption or test inversion. These models are applied without any serious consideration for the microarchitecture of the attacked processor. This brings the question of the realism of these models, leading to two types of problems: some modeled effects do not correspond to actual attacks; and, conversely, some effects lowering the security of the system are not modeled. These issues then translate to over-engineered, or, worse, under-engineered countermeasures.To face the limitations of typical software fault models, a precise study of processor microarchitectures is necessary. In this thesis, we first explore how various structures of the processor, such as the pipeline or optimization structures like forwarding and speculative execution, can influence the behavior of faults in the inner working of the processor; and how they call into question a pure software vision of how faults impact software execution. RTL injections are conducted in a RISC-V processor, to demonstrate how these effects could be exploited to counter typical software countermeasures and a hardened program that check PIN codes. Then, a method to study more generally the effects of faults in a processor is developed. The point of this method is twofold. The first is about modeling faults at the software level, with the definition of several metrics to evaluate models. The second point is about keeping a link to the RTL level, in order to be able to materialize effects obtained at the software level. Finally, to end this thesis, we study the possibility to use static analysis to analyze the security of programs against software fault models defined previously. Two methods are considered, one using abstract interpretation, and the other using symbolic execution.This thesis, financed by the IRT Nanoelec for the Pulse project, has been conducted within the LCIS laboratory in Valence, in collaboration with the CEA-Leti in Grenoble. It has been supervised by Vincent Beroulle (LCIS), and co-supervised by Christophe Deleuze (LCIS) and Florian Pebay-Peyroula (CEA-Leti)
Книги з теми "Sécurité logicielle et matérielle"
Architecture matérielle et logicielle des ordinateurs et des microprocesseurs. Paris: Armand Colin, 1990.
Знайти повний текст джерелаBowden, Mark. Worm: The first digital world war. New York: Grove, 2013.
Знайти повний текст джерелаSchüller, Christian. Le micro : Architecture matérielle et logicielle. Ellipses-Marketing, 2000.
Знайти повний текст джерелаЧастини книг з теми "Sécurité logicielle et matérielle"
GAUTIER, Matthieu, and Olivier BERDER. "Adaptation de la qualité de service dans les dispositifs IoT à récupération d’énergie." In La gestion et le contrôle intelligents des performances et de la sécurité dans l’IoT, 137–68. ISTE Group, 2022. http://dx.doi.org/10.51926/iste.9053.ch6.
Повний текст джерела"Déni de service et l’attaque ReDoS." In La sécurité logicielle: une approche défensive, 211–34. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.9.
Повний текст джерела"Le contrôle d’accès et la sécurité du système d’exploitation." In La sécurité logicielle: une approche défensive, 235–54. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.10.
Повний текст джерела"Les vulnérabilités dans la gestion des fichiers et de l’information." In La sécurité logicielle: une approche défensive, 173–210. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.8.
Повний текст джерела