Follow
Thevenon Pierre-Henri
Thevenon Pierre-Henri
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
On the weakness of contactless systems under relay attacks
PH Thevenon, O Savry, S Tedjini
SoftCOM 2011, 19th International Conference on Software, Telecommunications …, 2011
222011
A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms
NF Polychronou, PH Thevenon, M Puys, V Beroulle
ACM Transactions on Design Automation of Electronic Systems (TODAES) 27 (1 …, 2021
202021
Attacks on the HF physical layer of contactless and RFID systems
PH Thevenon, O Savry, S Tedjini, R Malherbi-Martins
Current Trends and Challenges in RFID, 2011
142011
Method of securing a wireless communication, receiver device and communication system implementing this method
SB Hamida, JB Pierrot, O Savry, PH Thevenon, C Castelluccia
US Patent 8,892,031, 2014
112014
Method of protection in a contactless radiofrequency communication
O Savry, PH Thevenon
US Patent 8,653,938, 2014
112014
Method for detection of a contactless receiver
PH Thevenon, O Savry
US Patent 8,699,949, 2014
102014
Sécurisation de la couche physique des communications sans contact de type RFID et NFC
PH Thevenon
Université de Grenoble, 2011
102011
An open-source hardware-in-the-loop virtualization system for cybersecurity studies of scada systems
S Mocanu, M Puys, PH Thevenon
C&esar 2019-Virtualization and Cybersecurity, 1-16, 2019
92019
Madman: Detection of software attacks targeting hardware vulnerabilities
NF Polychronou, PH Thevenon, M Puys, V Beroulle
2021 24th Euromicro Conference on Digital System Design (DSD), 355-362, 2021
82021
Detecting relay attacks in RFID systems using physical layer characteristics
STB Hamida, PH Thevenon, JB Pierrot, O Savry, C Castelluccia
6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-8, 2013
82013
Hardware-in-the-loop labs for SCADA cybersecurity awareness and training
M Puys, PH Thevenon, S Mocanu
Proceedings of the 16th International Conference on Availability …, 2021
72021
Securing iot/iiot from software attacks targeting hardware vulnerabilities
NF Polychronou, PH Thevenon, P Maxime, V Beroulle
2021 19th IEEE International New Circuits and Systems Conference (NEWCAS), 1-4, 2021
72021
Implementation of a countermeasure to relay attacks for contactless HF systems
PH Thevenon, O Savry
Radio Frequency Identification from System to Applications, 67-84, 2013
72013
iMRC: Integrated Monitoring & Recovery Component, a Solution to Guarantee the Security of Embedded Systems.
PH Thevenon, S Riou, DM Tran, M Puys, NF Polychronou, M El-Majihi, ...
J. Internet Serv. Inf. Secur. 12 (2), 70-94, 2022
52022
SCADA cybersecurity awareness and teaching with Hardware-In-The-Loop platforms
M Puys, PH Thevenon, S Mocanu, M Gallissot, C Sivelle
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2022
32022
WonderCloud, une plateforme pour l’analyse et l’émulation de micrologiciels ainsi que la composition de pots de miels
M Gallissot, M Puys, PH Thevenon
Proc. of the 27th C&esar conference on Deceptive Security (C&esar 2020 …, 2020
32020
Minimization of energy consumption in passive HF contactless and RFID systems
PH Thevenon, O Savry, S Tedjini
SoftCOM 2011, 19th International Conference on Software, Telecommunications …, 2011
32011
System for detecting malwares in a resources constrained device
N Polychronou, PH Thevenon, P Maxime, V Beroulle
US Patent App. 18/109,815, 2023
22023
Research for a new solution for the detection of malwares in iot/iiot devices
N Polychronou, PH Thevenon, M Puys
Journée Code et Cryptographie 2022, 2022
22022
Process and circuit for verifying the integrity of a software application
PH Thevenon, D Hely
US Patent App. 18/349,156, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20