Below is a list of my publications. My main publications are available from DBLP database. For most of papers, a link is provided to the on-line version. Alternatively, I will happy to send you a copy available on request.

Book Chapter

  1. Barbu, G., Bouffard, G., & Iguchy-Cartigny, J. (2013). La Sécurité Logique. In S. Bouzefrane & P. Paradinas (Eds.), Les Cartes à puce (pp. 171–201). Hermes Science. Retrieved from http://editions.lavoisier.fr/notice.asp?ouvrage=2745320 (In French)

Journal Articles

  1. Idrissi, N. E. J. E., Bouffard, G., Lanet, J.-L., & Hajji, S. E. (2016). Trust Can be Misplaced. Journal Of Cryptographic Engineering. doi:10.1007/s13389-016-0142-5
  2. Bouffard, G., & Lanet, J.-L. (2015). The ultimate control flow transfer in a Java based smart card. Computers And Security, 50, 33–46. doi:10.1016/j.cose.2015.01.004
  3. Bouffard, G., Thampi, B. N., & Lanet, J.-L. (2014). Security automaton to mitigate laser-based fault attacks on smart cards. IJTMCC, 2(2), 185–205. doi:10.1504/IJTMCC.2014.064158
  4. Bouffard, G., & Lanet, J.-L. (2014). Reversing the operating system of a Java based smart card. Journal Computer Virology And Hacking Techniques, 10(4), 239–253. doi:10.1007/s11416-014-0218-7
  5. Dubreuil, J., Bouffard, G., Thampi, B. N., & Lanet, J.-L. (2013). Mitigating Type Confusion on Java Card. IJSSE, 4(2), 19–39. doi:10.4018/jsse.2013040102

International Conferences

  1. Lancia, J., & Bouffard, G. (2015). Java Card Virtual Machine Compromising from a Bytecode Verified Applet. In N. Homma & M. Medwed (Eds.), Smart Card Research and Advanced Applications - 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers (Vol. 9514, pp. 75–88). Springer. doi:10.1007/978-3-319-31271-2_5
  2. Bouffard, G., Lackner, M., Lanet, J.-L., & Loinig, J. (2014). Heap ... Hop! Heap Is Also Vulnerable. In M. Joye & A. Moradi (Eds.), Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers (Vol. 8968, pp. 18–31). Springer. doi:10.1007/978-3-319-16763-3_2
  3. Lanet, J.-L., Bouffard, G., Lamrani, R., Chakra, R., Mestiri, A., Monsif, M., & Fandi, A. (2014). Memory Forensics of a Java Card Dump. In M. Joye & A. Moradi (Eds.), Smart Card Research and Advanced Applications - 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers (Vol. 8968, pp. 3–17). Springer. doi:10.1007/978-3-319-16763-3_1
  4. Bouffard, G., Thampi, B. N., & Lanet, J.-L. (2013). Detecting Laser Fault Injection for Smart Cards Using Security Automata. In S. M. Thampi, P. K. Atrey, C.-I. Fan, & Pérez Gregorio Martı́nez (Eds.), Security in Computing and Communications - International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings (Vol. 377, pp. 18–29). Springer. doi:10.1007/978-3-642-40576-1_3
  5. Bouffard, G., Khefif, T., Lanet, J.-L., Kane, I., & Salvia, S. C. (2013). Accessing secure information using export file fraudulence. In B. Crispo, R. S. Sandhu, N. Cuppens-Boulahia, M. Conti, & J.-L. Lanet (Eds.), 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013 (pp. 1–5). IEEE. doi:10.1109/CRiSIS.2013.6766346
  6. Bouffard, G., Thampi, B. N., & Lanet, J.-L. (2013). Vulnerability Analysis on Smart Cards Using Fault Tree. In F. Bitsch, J. Guiochet, & M. Kaâniche (Eds.), Computer Safety, Reliability, and Security - 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings (Vol. 8153, pp. 82–93). Springer. doi:10.1007/978-3-642-40793-2_8
  7. Razafindralambo, T., Bouffard, G., & Lanet, J.-L. (2012). A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard. In N. Cuppens-Boulahia, F. Cuppens, & Garcı́a-Alfaro Joaquı́n (Eds.), Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings (Vol. 7371, pp. 122–128). Springer. doi:10.1007/978-3-642-31540-4_10
  8. Bouffard, G., & Lanet, J.-L. (2012). Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday. In D. Naccache (Ed.), Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Vol. 6805, pp. 405–424). Springer. doi:10.1007/978-3-642-28368-0_26
  9. Razafindralambo, T., Bouffard, G., Thampi, B. N., & Lanet, J.-L. (2012). A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. In S. M. Thampi, A. Y. Zomaya, T. Strufe, J. M. A. Calero, & T. Thomas (Eds.), Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings (Vol. 335, pp. 185–194). Springer. doi:10.1007/978-3-642-34135-9_19
  10. Dubreuil, J., Bouffard, G., Lanet, J.-L., & Cartigny, J. (2012). Type Classification against Fault Enabled Mutant in Java Based Smart Card. In Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012 (pp. 551–556). IEEE Computer Society. doi:10.1109/ARES.2012.24
  11. Bouffard, G., Lanet, J.-L., Machemie, J.-B., Poichotte, J.-Y., & Wary, J.-P. (2011). Evaluation of the Ability to Transform SIM Applications into Hostile Applications. In E. Prouff (Ed.), Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers (Vol. 7079, pp. 1–17). Springer. doi:10.1007/978-3-642-27257-8_1
  12. Bouffard, G., Iguchi-Cartigny, J., & Lanet, J.-L. Combined Software and Hardware Attacks on the Java Card Control Flow. In E. Prouff (Ed.), Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers (Vol. 7079, pp. 283–296). Springer. doi:10.1007/978-3-642-27257-8_18

Invited Conferences

  1. Bouffard, G. (2016). Security of the Java Card Secure Elements. Cyber In Bretagne Summer School 2016. Retrieved from https://project.inria.fr/cyberinbretagne/
  2. Lancia, J., & Bouffard, G. (2016). Java Card Virtual Machine Compromising from a Bytecode Verified Applet. Rendez-Vous De La Recherche Et De l’Enseignement De La Sécurité Des Systèmes d’Information (RESSI). Retrieved from http://ressi2016.sciencesconf.org/
  3. Bouffard, G. (2016). Enjeux, évolution et conséquences de la sécurité du monde mobile. Workshop SERTIF : Simulation Pour l’Evaluation De La RobusTesse Des Applications Embarquées Contre l’Injection De Fautes. Retrieved from http://sertif-projet.forge.imag.fr/pages/workshop.html (In French)
  4. Bouffard, G. (2015). Attacks against the Java Card Platform – From the Characterization to the Exploitation. Journées Thématiques: Respect De La Vie Privée Et Services Mobiles sans Contact. Retrieved from http://www.irisa.fr/prive/sgambs/journees_LYRICS.html (In French)
  5. Bouffard, G. (2015). Next-Gen Attacks against the Java Card Smart Cards. Séminaire Sécurité Des Systèmes Électroniques Embarqués. Retrieved from http://securite-elec.irisa.fr/
  6. Bouffard, G. (2014). Quelle confiance peut on faire au monde numérique? LIONS Club International Association – Limoges Céladon. (In French)
  7. Bouffard, G. (2013). L’(in)sécurité informatique Quelle confiance peut-on avoir en notre vie numérique ? Univers-SIEL. (In French)
  8. Razafindralambo, T., Bouffard, G., Iguchi-Cartigny, J., & Lanet, J.-L. (2012). Smart Card Attacks: Enter the matrix. Sécurité Des Systèmes Embarqués Du GDR SoC-SiP. Retrieved from http://www2.lirmm.fr/journees_securite/journee6.php

National Conferences

  1. Lancia, J., & Bouffard, G. (2016). Fuzzing and Overflows in Java Card Smart Cards. In Symposium sur la sécurité des technologies de l’information et des communications (SSTIC). Retrieved from https://www.sstic.org/2016/presentation/fuzzing_and_overflows_in_java_card_smart_cards/
  2. Bouffard, G., & Lanet, J.-L. (2014). Escalade de privilège dans une carte à puce Java Card. In Symposium sur la sécurité des technologies de l’information et des communications (SSTIC). Retrieved from https://www.sstic.org/2014/presentation/escalade_de_privilege_dans_une_carte_a_puce_java_card/ (In French)
  3. Bouffard, G., Lassale, M., Domene, S. O., Tadmori, H., & Lanet, J.-L. (2013). Intégration d’une politique de flot de contrôle dans un automate de sécurité. In 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d’Information (SAR-SSI). (In French)
  4. Hamadouche, S., Bouffard, G., Lanet, J.-L., Dorsemaine, B., Nouhant, B., Magloire, A., & Reygnaud, A. (2012). Subverting Byte Code Linker service to characterize Java Card API. In Seventh Conference on Network and Information Systems Security (SAR-SSI) (pp. 75–81). Retrieved from https://sarssi2012.greyc.fr/
  5. Bkakria, A., Bouffard, G., Iguchy-Cartigny, J., & Lanet, J.-L. (2011). OPAL: an open-source global platform Java Library which includes the remote application management over HTTP. Nice: e-Smart 2011.
  6. Barreaud, M., Bouffard, G., Iguchy-Cartigny, J., & Lanet, J.-L. (2011). Fuzzing du protocole HTTP sur carte à puce. Crypto’puces 2011. (In French)
  7. Barreaud, M., Bouffard, G., Kamel, N., & Lanet, J.-L. (2011). Fuzzing on the HTTP protocol implementation in mobile embedded web server. In C&ESAR (pp. 14–27). (In French)
  8. Noubissi, A. C., Al Khary Sere, A., Iguchi-Cartigny, J., Lanet, J.-L., Bouffard, G., & Boutet, J. (2009). Carte à puce : Attaques et Contremesures. In Majecstic. Retrieved from http://majecstic2009.univ-avignon.fr/session_10.html#1112 (In French)

Thesis

  1. Bouffard, G. (2014, October). A Generic Approach for Protecting Java Card Smart Card Against Software Attacks (PhD thesis). University of Limoges, 123 Avenue Albert Thomas, 87060 LIMOGES CEDEX.
  2. Bouffard, G. (2010, September). Analysis and binary transformation (Master's thesis). University of Limoges/Technicolor.

Tutorial

  1. Bouffard, G. (2015). Attacks against the Java Card Platform. CryptoBG International Summer School. Retrieved from http://cryptobg.org

Poster

  1. Bouffard, G., & Lanet, J.-L. (2011). Combined Attacks on Java Card Smart Cards (Poster). Gardanne: Phisic’11.