Research
My research activity deals
with embedded systems
security and hardware security.
Previous research topics
- Adaptive computing, Rapid
system prototyping on reconfigurable
platforms, Software radio on reconfigurable platforms, Model
based design methodologies, Communication architecture exploration
for MPSoC
systems, Verification of heterogeneous systems from an
UML specification, Design space exploration for reconfigurable
architectures, Performance estimation for FPGAs from a C
specification, Hardware/software partitioning, Communication
synthesis, Performance estimation for DSP.
Current
Ph.D. Students
- Qiyang Li, Ensuring privacy in data outsourcing by mobile and IoT applications (2022 - 2025)
- Hongwei Zhao, SoC secure communication architecture against physical and logical attacks (2022 - 2025)
- Tianxu Li, Contribution to the design of hardware security mechanisms for a secured loT gateway against wireless attack (2022 - 2025)
- Nicolas Gaudin, Development and evaluation of a RISC-V processor robust against side-channel attacks (2021 - 2024)
- William Pensec, Protection of a RISC-V processor with DIFT against physical attacks (2021 - 2024)
Post-Docs
- Kamel Aizi, Evaluation of hardware security monitors against physical side-channel analysis (2022 - 2024)
- Cédric Seguin, Predictive maintenance environment for intelligent ships (2020 - 2022)
- Yohann Rioual, Trusted AI for predictive maintenance for smart ships (2021 - 2022)
- Arnab kumar Biswas, multi-core/multiprocessor hardware-assisted DIFC system (2018 - 2019)
- Martha
Johanna Sepulveda,
Security implementation in communication structure for 3D SoC
protection (2012
- 2013)
- Leandro
Fiorin, Fault tolerance
in Network on Chip (2013)
- Eduardo
Wanderley, A
Code Compression Method With Confidentiality and Integrity Checking
(2006 - 2007)
Ph.D.
Graduates
- Semih Ince, Securing cloud architectures based on the use of FPGA hardware accelerators (2021 - 2024)
- Mohamed El Bouazzati, Low-power software-defined baseband RISC-V processor for flexibility and security (2020 - 2023)
now Post-doc at Lab-STICC, Université Bretagne Sud, France
- Noura Ait Manssour, Hardware security for embedded processors against logical and physical attacks (2019-2022)
now R&D Engineer, France
- Asim Mukhtar, Enhanced cache architecture to protect embedded system security against cache-based side-channel attacks (2016 - 2022)
now Senior Embedded Software Engineer, Pakistan
- Hannah Badier Boenning, Obfuscation techniques for HLS in SaaS mode (2017 - 2021)
- Maria Mushtaq, Software-based Detection and Mitigation of Microarchitectural Attacks on Intel’s x86 Architecture (2016 - 2019)
now Associate Professor at Telecom Paris, France
- Muhammad Abdul Wahab, Hardware coprocessor for Dynamic Information Flow Tracking in MPSoC systems (2015 - 2018)
now R&D Engineer at Ultraflux, France
- Maria
Mendez, Spatial Isolation against Logical Cache-based Side-Channel Attacks in Many-Core Architectures (2014 - 2017)
now Associate Professor at IETR-Polytech Nantes, France
- Vincent
Migliore, Hardware Cyber-Security and Design of Dedicated Components for Homomorphic Encryption Schemes (2014-2017)
now Associate Professor at INSA Toulouse, France
- Safae
Dahmani, Cooperative
caching for CMP (2012-2015)
now Associate Professor at Institut National des Postes et Télécommunications, Maroc
- Simon
Fau, Cryptocomputing systems, compilation and runtime (2011-2016)
now Consultant in Cybersecurity at ADENTIS, France
- Vianney
Lapotre,
Management of reconfigurable multi-standards ASIPs-based receiver (2010
- 2013)
now Associate
Professor at ENSIBS/Lab-STICC, Lorient, France
- Pascal
Cotret, Distributed
security for communications and memories in a multiprocessor
architecture (2009 - 2012)
now Associate Professor at ENSTA Bretagne, Brest, France
- Sébastien
Guillet,
Modeling and Formal Control of Partial Dynamic Reconfiguration (2009 -
2012)
now Lecturer at ENSIBS/Lab-STICC, Lorient, France
- Martha
Johanna Sepúlveda Flórez,
Proposition of NoC architectures and design tool for quality of service
and security challenges (2008 - 2011)
now Senior Scientist Secure Communications at Airbus Defence and Space - Intelligence, Germany
- Jérémie
Crenne, Embedded system security (2008 - 2011)
now Associate
Professor at ENSEIRB-MATMECA/IMS, Bordeaux, France
- Michael
Grand,
Cryptoprocessor for Software Defined Radio
(2008 - 2011)
now R&D Manager, Deputy Technical Manager and Process Improvement Manager at SERMA Safety & Security, France
- Linfeng
Ye, Self-adaptative Multi-processor System-on-Chip :
Architecture, Methodology and Decision (2007 - 2010)
now Assistant Professor
at Guangdong University of Technology, Guangzhou, P.R China
- Jorgiano
vidal, Dynamic and partial reconfigurable embedded systems
design with UML (2007 - 2010)
now Associate Professor
at Federal Tecnological Education Center of Rio Grande do Norte, Brazil
- Rasmus
Abildgren, Implementation Effort and Parallelism - Metrics for
Guiding Hardware/Software Partitioning in Embedded System Design (2006
- 2010)
now Bluetooth Standards Architect at Bose Corporation, Denmark
- Gaël
Abgrall, Software
Defined Radio and dynamic reconfiguration (2007 - thesis interruption
in 2010)
now engineer at
DC-DIRISI, Paris, France
- Yassine
Aoudni, Rapid system
prototyping of reconfigurable platforms (2003
- 2010)
now Assistant
Professor at ENIS, Sfax, Tunisia
- Romain
Vaslin, Hardware Core for
Off-chip Memory Security Management in Embedded Systems (2005 -
2008)
now engineer at
Thales Communications, Cholet, France
- Issam
Maalej, Communication
architecture exploration for MPSoC systems (2002 - 2006)
now R&D engineer
at SYLEPS Group, Lorient, France
- Samuel
Rouxel, Modeling and
characterization of heterogeneous SoC platform: Application to SDR (2002 - 2006)
now R&D engineer
at CRESITT Industrie, Orléans, France
- Lilian Bossuet,
Design space
exploration of
reconfigurable architectures (2001 - 2004)
now Professor
at Université Jean Monnet Saint-Etienne, Telecom Saint-Etienne, France
- Sébastien
Bilavarn, Architectural
exploration from a C specification: FPGAs case study (1999 -
2002)
now Associate
Professor at University of Nice-Sophia Antipolis, France
M.Sc.
Graduates
- Md Sadik Tasrif Anubhove,
Comparison of different machine learning techniques for human activity
recognition and analyzing the importance of sensor data privacy for
physically challenged people - 2024
- Jérémy Bricq, Detection of cache-based side-channel attacks at the OS level - 2018
- Samy Rida, Implementation
of countermeasure techniques for cache-based timing side-channel
attacks in multi- & many-core systems - 2018
- Djelar Esperance Asngar, Analysis and comparison of GEM5 and OVPsim simulators - 2015
- Thomas Toublanc, OS-integrated Multiprocessor platform implementation on FPGA - 2015
- Satyajit Das, A Diffie Hellman
reconfigurable security architecture in NOC-based MPSoC architectures -
2014
- Cédric Maignan, Network Contention-aware Method to Evaluate Data Consistency Protocols within a Compilation Toolchain - 2014
- Hamza Chaker, Cycle-based Model to
Evaluate Consistency Protocols within a Multi-protocol Compilation
Toolchain - 2014
- Soukaina Benamar, Design of
Multiprocessor Systems on Chip - 2011
- Said Louizi, Firewall for
communication protection within embedded systems - 2011
- Cedric Seguin, Reconfigurable
architecture and security: how to handle remote partial reconfiguration
securely - 2010
- Naoufel Belfathi,
Multithreading on XilKernel for multiprocessor systems - 2010
- Abdessalam Chafik, Communication
protection within embedded systems - 2010
- Jérémie crenne, Remote
partial reconfiguration through network protocol - 2008
- Yaset Oliva, Bitstream server for
reconfigurable system on chip - 2008
- Zui Tao,
Asymetric Encryption Algorithm: Implemntation on Nios-based systems -
2007
- Sylvain Ducloyer,
Hardware architecture for haching functions: Application to
MD5/SHA-1/SHA-2 - 2007
- Arnaud Dumérat, Fault
detection and fault tolerant ECC algorithm - 2006,
- Jérémie
Guillot, Cryptography
and self dynamic reconfiguration on an FPGA platform – 2004
- Jean Philippe
Delahaye, Software radio and
dynamic reconfiguration on a DSP/FPGA platform – 2003
- Erwan Piriou,
Reconfigurable technologies and
programmable technologies: a comparison – 2003
- Samuel Rouxel,
Routing cost on FPGA architectures – 2002
- Issam Maalej,
Interface synthesis for SoC – 2002
- Lilian Bossuet,
Modeling of reconfigurable architectures: toward a generic approach
– 2001
- Said Chaboun,
Implementation of audio coding onto heterogeneous architectures –
1999
|
Funding
Several fundings support
my research activity: CNRS, RNRT, RNTL, DGA, CMCU,
Brittany State, ANR...
Below is a summary of most relevant projects:
- SCAMA (2024-2028):
The goal of the SCAMA project is to tackle microarchitectural attacks
at the intersection of software and hardware to propose
secure-by-design computing.
- TrustGW (2021-2025):
The TrustGW project aims to develop a heterogeneous,
dynamically reconfigurable and trusted hardware-software gateway
architecture. The TrustGW project addresses three main scientific
challenges: Design a trusted, dynamically reconfigurable
software-hardware heterogeneous gateway architecture; Propose a trusted
hypervisor for deploying virtual machines on a heterogeneous
software-hardware architecture with resource virtualization; Guarantee application security within virtual machines.
- SCRATCHS (2021-2024): The goal of the SCRATCHS project is to co-design a
RISC-V processor and a compiler toolchain to ensure by construction
that a security sensitive code is immune to timing side-channel attacks
while running at maximal speed. Our claim is that a co-design is
essential to get end-to-end security: cooperation between the compiler
and hardware is necessary to avoid time leaks due to the
micro-architecture with minimal overhead.
- HardBlare (2015-2019):
The general context of the HardBlare project is to address
hardware-assisted Dynamic Information Flow Control (DIFC) that
generally consists in attaching marks to denote the type of information
that are saved or generated within the system. These marks are then
propagated when the system evolves and information flow control is
performed in order to guarantee a safe execution and storage within the
system.
- TSUNAMY project
(2013-2017): The TSUNAMY
project addresses the
problem of secure handling of personal data and privacy in manycore
architectures. The TSUNAMY project aims to propose a solution of trust
building to execute many independent applications in parallel, safely
and ensuring respect for the privacy of users. For this,
several contributions are proposed: 1) development of a processing
cluster to run both algorithms for processing information and
cryptographic algorithms (with a strong level of coupling for
performance reasons but while ensuring no leakage of information), 2)
development of a manycore architecture integrating heterogeneous
clusters for secure cryptographic, 3) development of mechanisms for
logical isolation (in software) and physical (hardware level) to ensure
execution of partitioned applications, 4) joint development of software
layers (driver, API ...) and hardware to provide a chain of trust and
5) development of strategies for dynamically distributing applications
on a manycore architecture . All of these contributions will be
validated through simulation modeling using SystemC CABA. SoCLib
environment and the TSAR architecture and the ALMOS operating system
will be used to validate the project. The TSUNAMY project aims to
provide the scientific community of academic and industrial with models
of architectures and software libraries to efficiently and securely
deploy applications on
manycore architectures.
- FAMOUS
project (2010-2013): This project aims at introducing a
complete methodology that takes the reconfigurability of the hardware
as an essential design concept and proposes the necessary mechanisms to
fully exploit those capabilities at runtime. The project covers
research in system models, compile time and run time methods, and
analysis and verification techniques. These tools will provide
high-quality designs with improved designer productivity, while
guaranteeing consistency with the initial requirements for adaptability
and the final implementation.
- SecReSoC project
(2010-2013): The goals of the
SecReSoC project are to increase the security level of reconfigurable
technologies (FPGAs) at the logic, architectural and system levels.
FPGA technology has been selected as it becomes widespread in many
application domains and corresponds to a strong vector to prototype and
to evaluate the security level of cryptographic architectures. A
generic MPSoC architecture enabling the integration into an FPGA of an
application requiring a multilevel security data protection will be
designed, implemented and tested. This multiprocessor architecture will
include an optimized cryptoprocessor for implementation of
cryptographic protocols and encryption modes; some standard processors
for multitasking OS implementation; internal data memories and an
interface to external data memories; input/output units and an internal
communication structure integrating and enabling several security
levels. Tools for secured device reconfiguration will be proposed also.
System security will be evaluated and side-channel attacks
will be considered during system design and evaluation. The final aim
of the project will be the design of a prototype to evaluate the cost
and the efficiency of the proposed techniques.
- MOPCOM
projet (2006 -
2009):
The MOPCOM project is focused on model engineering using MDA approaches
to develop SoC/SoPC. The project aims to provide a formalized
design process (design methodology) and the associated tools in order
to target: The design at different levels of abstraction, from system
TLM level down to architecture RTL level. The design of reconfigurable
systems that may be reconfigured at run time. A MDA/MDE prototype tool
will be developed during the project that will perform code generation
(SystemC and VHDL) from a specification description using UML. This
prototype will rely on adapted profiles for real time embedded system
from the system description down to the architecture description.
- AEther Project (2006 - 2009):
European citizens are now living in a world of "pervasive computing",
where virtually every object has a processing power. Undoubtedly,
computing devices are more ubiquitous and interconnected than ever,
fulfilling the most varied tasks with little human intervention. The
size of these "pervasive computing" networks is significantly
increasing, as well as the variety of the computing devices, both at
chip (multicore and reconfigurable architectures) and system level
(distributed processing). As their scope of application broadens,
processing resources require greater flexibility and scalability to
meet the various needs of users. AETHER's
main objectives are to study, evaluate and propose novel computing
architectures responding to the most demanding embedded
applications in the next 10+ years. In particular, the AETHER project
aims to tackle the issues related to the performance and technological
scalability, increased complexity and programmability of future
embedded computing architectures by introducing self-adaptive
technologies in computing resources.
- ICTeR Project (2006 - 2009):
Digital integrated systems have supplanted the paper as the media
through which the information is transmitted, thus a great interest for
cryptology has emerged at all levels of the integrated circuit design
flow. The physical implementation has indeed become the Achille’s
Heel of secured platforms while side channel attacks such as the
Differential Power Analysis have become common and popular. It is now
well known and accepted that side channel attacks are the most
efficient attacks since they require only little knowledge and material
to be successfully applied. In this context, this project aims at
analysing the potential benefits in terms of security of physical
reconfigurable platforms and devices. More precisely, this projects
aims at (a) defining ad-hoc integration techniques of cryptography
primitives on such platforms and (b) and at defining what is the ideal
reconfigurable platform allowing the best possible integration of
cryptography primitives.
- SANES
Project (2004 - 2005):
Embedded
System Security is becoming a major issue to enable the vision of
ubiquitous computing. Numerous challenges need to be addressed to
promote security within future embedded systems. Our research aims at
defining new solutions to leverage embedded systems security by taking
benefit
of reconfigurable architectures and on-chip hardware monitoring. We
also propose new solutions to improve security within future NoC.
- A3S
Project (2003 - 2005): This
project defines a new methodology for software radio systems
validation, entirely based on UML. Right at the modeling step it will
be
possible to perform non-functional coherence verification of software
radio
architecture specifications and application requirements with UML based
models.
The interest of such an approach is to give the designers the
opportunity to
investigate, before beginning any development step, the array of
potential
solutions and enabling selection of some by verification of the
coherency. This
approach enables design cost saving by drastic reduction of time
and
minimization of the number of prototypes.
- EPICURE
Project (2001 - 2003):
This project defines a new design methodology able to bridge the gap
between an abstract specification and an heterogeneous reconfigurable
architecture. The EPICURE contribution is the result of a joint study
on abstraction/refinement methods and a smart reconfigurable
architecture within the formal Esterel design tools suite. The original
points of this work are: i) a generic HW/SW interface model, ii) a
specification methodology that handles the control, and includes
efficient verification and HW/SW synthesis capabilities, iii) a method
for parallelism exploration based on abstract resources/performance
estimation expressed in terms of area/delay tradeoffs, iv) a HW/SW
partitioning approach that refines the specification into explicit HW
configurations and the associated SW control. The EPICURE framework
shows how a cooperation of complementary methodologies and CAD tools
associated with a relevant architecture can significantly improve the
designer productivity, especially in the context of reconfigurable
architectures.
|