On the weakness of contactless systems under relay attacks PH Thevenon, O Savry, S Tedjini SoftCOM 2011, 19th International Conference on Software, Telecommunications …, 2011 | 22 | 2011 |
A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms NF Polychronou, PH Thevenon, M Puys, V Beroulle ACM Transactions on Design Automation of Electronic Systems (TODAES) 27 (1 …, 2021 | 20 | 2021 |
Attacks on the HF physical layer of contactless and RFID systems PH Thevenon, O Savry, S Tedjini, R Malherbi-Martins Current Trends and Challenges in RFID, 2011 | 14 | 2011 |
Method of securing a wireless communication, receiver device and communication system implementing this method SB Hamida, JB Pierrot, O Savry, PH Thevenon, C Castelluccia US Patent 8,892,031, 2014 | 12 | 2014 |
Method of protection in a contactless radiofrequency communication O Savry, PH Thevenon US Patent 8,653,938, 2014 | 11 | 2014 |
Method for detection of a contactless receiver PH Thevenon, O Savry US Patent 8,699,949, 2014 | 10 | 2014 |
Sécurisation de la couche physique des communications sans contact de type RFID et NFC PH Thevenon Université de Grenoble, 2011 | 10 | 2011 |
An open-source hardware-in-the-loop virtualization system for cybersecurity studies of scada systems S Mocanu, M Puys, PH Thevenon C&esar 2019-Virtualization and Cybersecurity, 1-16, 2019 | 9 | 2019 |
Madman: Detection of software attacks targeting hardware vulnerabilities NF Polychronou, PH Thevenon, M Puys, V Beroulle 2021 24th Euromicro Conference on Digital System Design (DSD), 355-362, 2021 | 8 | 2021 |
Detecting relay attacks in RFID systems using physical layer characteristics STB Hamida, PH Thevenon, JB Pierrot, O Savry, C Castelluccia 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-8, 2013 | 8 | 2013 |
Hardware-in-the-loop labs for SCADA cybersecurity awareness and training M Puys, PH Thevenon, S Mocanu Proceedings of the 16th International Conference on Availability …, 2021 | 7 | 2021 |
Securing iot/iiot from software attacks targeting hardware vulnerabilities NF Polychronou, PH Thevenon, P Maxime, V Beroulle 2021 19th IEEE International New Circuits and Systems Conference (NEWCAS), 1-4, 2021 | 7 | 2021 |
Implementation of a countermeasure to relay attacks for contactless HF systems PH Thevenon, O Savry Radio Frequency Identification from System to Applications, 67-84, 2013 | 7 | 2013 |
iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems. PH Thevenon, S Riou, DM Tran, M Puys, NF Polychronou, M El-Majihi, ... J. Internet Serv. Inf. Secur. 12 (2), 70-94, 2022 | 5 | 2022 |
SCADA cybersecurity awareness and teaching with Hardware-In-The-Loop platforms M Puys, PH Thevenon, S Mocanu, M Gallissot, C Sivelle Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2022 | 3 | 2022 |
WonderCloud, une plateforme pour l’analyse et l’émulation de micrologiciels ainsi que la composition de pots de miels M Gallissot, M Puys, PH Thevenon Proc. of the 27th C&esar conference on Deceptive Security (C&esar 2020 …, 2020 | 3 | 2020 |
Minimization of energy consumption in passive HF contactless and RFID systems PH Thevenon, O Savry, S Tedjini SoftCOM 2011, 19th International Conference on Software, Telecommunications …, 2011 | 3 | 2011 |
System for detecting malwares in a resources constrained device N Polychronou, PH Thevenon, P Maxime, V Beroulle US Patent App. 18/109,815, 2023 | 2 | 2023 |
Research for a new solution for the detection of malwares in iot/iiot devices N Polychronou, PH Thevenon, M Puys Journée Code et Cryptographie 2022, 2022 | 2 | 2022 |
Process and circuit for verifying the integrity of a software application PH Thevenon, D Hely US Patent App. 18/349,156, 2024 | | 2024 |