Patents by Inventor Thibault PORTEBOEUF
Thibault PORTEBOEUF has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11733966Abstract: A device of executing a cryptographic operation on bit vectors, the execution of the cryptographic operation includes the execution of at least one arithmetic addition operation between a first operand and a second operand. Each operand comprises a set of components, each component corresponding to a given bit position of the operand. The device comprises a set of elementary adders, each elementary adder being associated with a given bit position of the operands and being configured to perform a bitwise addition between a component of the first operand at the given bit position and the corresponding component of the second operand at the given bit position using the carry generated by the computation performed by the elementary adder corresponding to the previous bit position. Each elementary adder has a sum output corresponding to the bitwise addition and a carry output, the result of the arithmetic addition operation being derived from the sum outputs provided by each elementary adder.Type: GrantFiled: December 18, 2018Date of Patent: August 22, 2023Assignee: SECURE-IC SASInventors: Sylvain Guilley, Thibault Porteboeuf
-
Publication number: 20230114084Abstract: There is disclosed a circuit for monitoring the security of a processor, wherein the circuit is configured to access a memory configured to store execution context data of a software program executed by the processor; to determine one or more signatures from said execution context data; and to compare said signatures with predefined signatures to monitor the security of the processor (110). Developments describe that context data can comprise control flow data, that a signature can comprise a hash value or a similarity signature, or that the integrity of signatures can be verified for example by using a secret key (e.g. obtained by random, or by using a physically unclonable function). Further developments describe various controls or retroactions on the processor, as well as various countermeasures if cyber attacks are determined.Type: ApplicationFiled: December 12, 2022Publication date: April 13, 2023Applicant: SECURE-IC SASInventor: Thibault PORTEBOEUF
-
Patent number: 11537715Abstract: There is disclosed a circuit for monitoring the security of a processor, wherein the circuit is configured to access a memory configured to store execution context data of a software program executed by the processor; to determine one or more signatures from said execution context data; and to compare said signatures with predefined signatures to monitor the security of the processor (110). Developments describe that context data can comprise control flow data, that a signature can comprise a hash value or a similarity signature, or that the integrity of signatures can be verified for example by using a secret key (e.g. obtained by random, or by using a physically unclonable function). Further developments describe various controls or retroactions on the processor, as well as various countermeasures if cyber attacks are determined.Type: GrantFiled: March 1, 2018Date of Patent: December 27, 2022Assignee: SECURE-IC SASInventor: Thibault Porteboeuf
-
Patent number: 11378616Abstract: A production method for producing a circuit optimized to be protected against radiation includes a preliminary characterization stage performed on a reference circuit. The preliminary characterization stage includes the steps of: irradiating the reference circuit a plurality of times; after each irradiation, if one or more reference elements of the reference circuit have failed, locating said reference element(s); and mapping the impact of the irradiations on the reference surface of the reference circuit. The production method further includes an optimization stage comprising the step of adapting the position of at least one optimized radiation-sensitive element on at least one optimized surface of the optimized circuit as a function of the mapping performed on the reference circuit.Type: GrantFiled: June 17, 2019Date of Patent: July 5, 2022Assignee: SAFRAN ELECTRONICS & DEFENSEInventors: Cédric Autie, Thibault Porteboeuf
-
Patent number: 11120168Abstract: A protection method for protecting an FPGA against natural radiation, the method comprising the steps of: defining at least one category of constraining signals defined so that a predetermined placement and routing tool cannot route more than a determined maximum number of different constraining signals to any one zone of the surface of the FPGA; replicating an initial logic module in order to obtain a plurality of replicated logic modules forming a replicated logic cell; and associating constraining signals with the replicated logic modules in such a manner that the number of constraining signals associated with the replicated logic cell is greater than a determined maximum number in order to force the placement and routing tool to place the replicated logic modules of the replicated logic cell in distinct zones of the surface of the FPGA.Type: GrantFiled: June 19, 2019Date of Patent: September 14, 2021Assignee: SAFRAN ELECTRONICS & DEFENSEInventors: Cédric Autie, Thibault Porteboeuf
-
Publication number: 20210247441Abstract: A production method for producing a circuit optimized to be protected against radiation includes a preliminary characterization stage performed on a reference circuit. The preliminary characterization stage includes the steps of: irradiating the reference circuit a plurality of times; after each irradiation, if one or more reference elements of the reference circuit have failed, locating said reference element(s); and mapping the impact of the irradiations on the reference surface of the reference circuit. The production method further includes an optimization stage comprising the step of adapting the position of at least one optimized radiation-sensitive element on at least one optimized surface of the optimized circuit as a function of the mapping performed on the reference circuit.Type: ApplicationFiled: June 17, 2019Publication date: August 12, 2021Applicant: Safran Electronics & DefenceInventors: Cédric AUTIE, Thibault PORTEBOEUF
-
Publication number: 20210248276Abstract: A protection method for protecting an FPGA against natural radiation, the method comprising the steps of: defining at least one category of constraining signals defined so that a predetermined placement and routing tool cannot route more than a determined maximum number of different constraining signals to any one zone of the surface of the FPGA; replicating an initial logic module in order to obtain a plurality of replicated logic modules forming a replicated logic cell; and associating constraining signals with the replicated logic modules in such a manner that the number of constraining signals associated with the replicated logic cell is greater than a determined maximum number in order to force the placement and routing tool to place the replicated logic modules of the replicated logic cell in distinct zones of the surface of the FPGA.Type: ApplicationFiled: June 19, 2019Publication date: August 12, 2021Inventors: Cédric AUTIE, Thibault PORTEBOEUF
-
Publication number: 20210165633Abstract: A device of executing a cryptographic operation on bit vectors, the execution of the cryptographic operation includes the execution of at least one arithmetic addition operation between a first operand and a second operand. Each operand comprises a set of components, each component corresponding to a given bit position of the operand. The device comprises a set of elementary adders, each elementary adder being associated with a given bit position of the operands and being configured to perform a bitwise addition between a component of the first operand at the given bit position and the corresponding component of the second operand at the given bit position using the carry generated by the computation performed by the elementary adder corresponding to the previous bit position. Each elementary adder has a sum output corresponding to the bitwise addition and a carry output, the result of the arithmetic addition operation being derived from the sum outputs provided by each elementary adder.Type: ApplicationFiled: December 18, 2018Publication date: June 3, 2021Inventors: Sylvain GUILLEY, Thibault PORTEBOEUF
-
Patent number: 10607006Abstract: There is disclosed a system for monitoring the security of a target system (110) with a circuit (120), the target system (110) comprising at least one processor (111) and wherein: the circuit (120) comprises a finite-state machine (122) configured to receive data from one or more sensors (130) distributed in the target system (110), at least one sensor (1303) being located on the processor (111) of the target system (110); the finite-state machine (122) is configured to determine a state output in response to data received from sensors (130); the system monitoring the security based on said state output. Developments describe the use of a self-alarm mechanism comprising an encoder to encode states with redundancy, the application of an error correction code, comparisons with predefined valid encoded states, the triggering of an alarm to the processor, the determination of actions and/or retroactions on sensors and/or diagnostics and countermeasures.Type: GrantFiled: July 27, 2017Date of Patent: March 31, 2020Assignee: SECURE-IC SASInventors: Jean-Luc Danger, Sylvain Guilley, Thibault Porteboeuf
-
Patent number: 10571313Abstract: There is provided a calibration device for calibrating a digital sensor (3), said digital sensor being configured to protest a target digital circuit (30) fed by a clock signal having a clock period by triggering an alarm depending on a condition between said clock signal and an optimal alarm threshold, said optimal alarm threshold being determined by minimizing a quantity depending on the probability of occurrence of false positives and on the probability of occurrence of false negatives.Type: GrantFiled: June 26, 2015Date of Patent: February 25, 2020Assignee: SECURE-IC SASInventors: Sylvain Guilley, Thibault Porteboeuf
-
Patent number: 10354064Abstract: According to the invention, there is provided a computer implemented method for controlling dynamically the execution of a code by a processing system, said execution being described by a control flow graph comprising a plurality of basic blocks composed of at least an input node and an output node, a transition in the control flow graph corresponding to a link between an output node of origin belonging to a first basic block and an input node of a second basic block, a plurality of initialization vectors being associated to the output nodes at the time of generating the code, an a priori control word being associated to each input node which is linked to the same output node of origin according the control flow graph, said a priori control word being precomputed at the time of generating the code by applying a predefined deterministic function F to the initialization vector associated to its output node of origin, the following steps being applied once the execution of the output node belonging to a first baType: GrantFiled: June 19, 2015Date of Patent: July 16, 2019Assignee: SECURE-IC SASInventors: Sylvain Guilley, Thibault Porteboeuf
-
Patent number: 10236262Abstract: Embodiments of the invention provide a system for protecting an integrated circuit (IC) device from attacks, the IC device (100) comprising a substrate (102) having a front surface (20) and a back surface (21), the IC device further comprising a front side part (101) arranged on the front surface of the substrate (102) and stacked layers, at least one of said layers comprising a data layer comprising wire carrying data, the front side part having a front surface (13). The system comprises an internal shield (12) arranged in a layer located below said data layer and a verification circuit configured to check the integrity of at least one portion of the internal shield.Type: GrantFiled: December 28, 2016Date of Patent: March 19, 2019Inventors: Sylvain Guilley, Thibault Porteboeuf, Jean-Luc Danger
-
Publication number: 20180260564Abstract: There is disclosed a circuit for monitoring the security of a processor, wherein the circuit is configured to access a memory configured to store execution context data of a software program executed by the processor; to determine one or more signatures from said execution context data; and to compare said signatures with predefined signatures to monitor the security of the processor (110). Developments describe that context data can comprise control flow data, that a signature can comprise a hash value or a similarity signature, or that the integrity of signatures can be verified for example by using a secret key (e.g. obtained by random, or by using a physically unclonable function). Further developments describe various controls or retroactions on the processor, as well as various countermeasures if cyber attacks are determined.Type: ApplicationFiled: March 1, 2018Publication date: September 13, 2018Applicant: SECURE-IC SASInventor: Thibault PORTEBOEUF
-
Publication number: 20180032723Abstract: There is disclosed a system for monitoring the security of a target system (110) with a circuit (120), the target system (110) comprising at least one processor (111) and wherein: the circuit (120) comprises a finite-state machine (122) configured to receive data from one or more sensors (130) distributed in the target system (110), at least one sensor (1303) being located on the processor (111) of the target system (110); the finite-state machine (122) is configured to determine a state output in response to data received from sensors (130); the system monitoring the security based on said state output. Developments describe the use of a self-alarm mechanism comprising an encoder to encode states with redundancy, the application of an error correction code, comparisons with predefined valid encoded states, the triggering of an alarm to the processor, the determination of actions and/or retroactions on sensors and/or diagnostics and countermeasures.Type: ApplicationFiled: July 27, 2017Publication date: February 1, 2018Applicant: SECURE-IC SASInventors: Jean-Luc DANGER, Sylvain GUILLEY, Thibault PORTEBOEUF
-
Publication number: 20170186706Abstract: Embodiments of the invention provide a system for protecting an integrated circuit (IC) device from attacks, the IC device (100) comprising a substrate (102) having a front surface (20) and a back surface (21), the IC device further comprising a front side part (101) arranged on the front surface of the substrate (102) and stacked layers, at least one of said layers comprising a data layer comprising wire carrying data, the front side part having a front surface (13). The system comprises an internal shield (12) arranged in a layer located below said data layer and a verification circuit configured to check the integrity of at least one portion of the internal shield.Type: ApplicationFiled: December 28, 2016Publication date: June 29, 2017Applicant: SECURE-IC SASInventors: Sylvain GUILLEY, Thibault PORTEBOEUF, Jean-Luc DANGER
-
Publication number: 20170160112Abstract: There is provided a calibration device for calibrating a digital sensor (3), said digital sensor being configured to protest a target digital circuit (30) fed by a clock signal having a clock period by triggering an alarm depending on a condition between said clock signal and an optimal alarm threshold, said optimal alarm threshold being determined by minimizing a quantity depending on the probability of occurrence of false positives and on the probability of occurrence of false negatives.Type: ApplicationFiled: June 26, 2015Publication date: June 8, 2017Applicant: SECURE-IC SASInventors: Sylvain GUILLEY, Thibault PORTEBOEUF
-
Publication number: 20170124322Abstract: According to the invention, there is provided a computer implemented method for controlling dynamically the execution of a code by a processing system, said execution being described by a control flow graph comprising a plurality of basic blocks composed of at least an input node and an output node, a transition in the control flow graph corresponding to a link between an output node of origin belonging to a first basic block and an input node of a second basic block, a plurality of initialization vectors being associated to the output nodes at the time of generating the code, an a priori control word being associated to each input node which is linked to the same output node of origin according the control flow graph, said a priori control word being precomputed at the time of generating the code by applying a predefined deterministic function F to the initialization vector associated to its output node of origin, the following steps being applied once the execution of the output node belonging to a first baType: ApplicationFiled: June 19, 2015Publication date: May 4, 2017Applicant: SECURE-IC SASInventors: Sylvain GUILLEY, Thibault PORTEBOEUF