Powered by OpenAIRE graph
Found an issue? Give us feedback

LCIS

Laboratoire de Conception et d'Intégration des Systèmes
12 Projects, page 1 of 3
  • Funder: French National Research Agency (ANR) Project Code: ANR-11-SEED-0004
    Funder Contribution: 745,849 EUR

    The ACLIRSYS project includes 4 industrial companies (two manufacturers of thermal equipments, CIAT and Cristopia, the European specialist of compressors for refrigeration systems, DANFOSS ,and CMDL MANASLU Ing., a company specialized in the energetic equipments for buildings) and 3 public research laboratories (LAGEP, LCIS, LGP2S). The objective of this project is to work out an integrated refrigeration system able to ensure the thermal comfort of energy-saving tertiary buildings (BBC in French). This kind of buildings is characterized by high efficiency insulation, important glazed surfaces and low thermal inertia. Therefore a specific refrigeration system has to be designed for them. The solution able to adapt itself to this new environment which is proposed in the project includes a refrigeration group with a variable speed compressor, fast dynamics and very few refrigerant liquid. This is made available using innovative technologies for the components. The refrigeration system also includes a water loop between the building and the refrigeration group which is connected to an innovative compact thermal storage system. This storage system can sustain low level thermal demand on short time period instead of the refrigeration group. This will allow the design of a global control architecture, suitable for this kind of low inertia thermal systems, which will make the integrated system able to satisfy the typical comfort and energy saving control objectives and won’t make use of classical “stop and go” techniques which are not suitable anymore for BBC buildings. To realize these objectives, the ACLIRSYS project integrates the development of new dynamical port-based modelling approaches for thermodynamics systems, as well as advanced control strategies for complex systems. It also includes the characterization and identification of new components technologies: compact thermal heat exchangers, variable speed compressors of spiro-orbital and centrifugal kinds and compact storage systems. The whole approach will be validated on a laboratory-scale experimental facility which will be built and exploited within the duration of the project. The ACLIRSYS technical and scientific approach will also allow significant energy savings and an increased reliability thanks to the control architecture and optimization of the “cold loop” and to the use of new technologies for thermal passive (heat exchanger, storage) and active (compressors) components.

    more_vert
  • Funder: French National Research Agency (ANR) Project Code: ANR-21-CE48-0018
    Funder Contribution: 438,527 EUR

    The IMPACTS project aims at an ever-increasing integration of modeling, numerics and control design for complex multi-physical implicit systems described by both ordinary and partial differential equations. This integration is achieved considering the novel class of Implicit port Hamiltonian (PH) Systems, analyzing their system properties and developing new dedicated methods for numerical simulation and control design. Implicit PH Systems arise from the modeling of systems with non-local constitutive relations, implicit geometric discretization in time and space or control by interconnection. The methodological contributions of this project will concern the modeling and control of implicit PH systems using irreversible Thermodynamics, geometric numerical methods for space-time discretization and order reduction, canonical implicit discrete-time PH systems and energy-based control design, and in domain/boundary control of distributed parameter systems under implicit interconnections.

    more_vert
  • Funder: French National Research Agency (ANR) Project Code: ANR-21-CE39-0004
    Funder Contribution: 396,496 EUR

    Secure circuits embed hardware primitives that provide security properties: Physical Unclonable Functions (PUFs) or attack sensors, for example. These only fulfil their role when powered, which makes a new class of attacks that would be carried out when the targeted circuit is powered off particularly worrying. The aim of our project is precisely to verify the feasibility of laser attacks on powered-off devices and to propose suitable countermeasures to protect against these attacks. In order to carry out this work, we first plan to design in-house and then have an external service provider manufacture a test circuit with carefully selected elementary blocks and simple security primitives for characterisation, testing and modelling purposes. We then plan to carry out laser injection campaigns on this circuit, but also on other circuits already available from the project partners. These experimental campaigns can therefore start at the beginning of the project. This first stage will lead to the development of a fault model, describing the observed faults as exhaustively as possible, at different levels of abstraction: physical, logical and functional. Once we understand the effects of laser attacks on powered-off devices, we plan to apply the resulting fault model to two classical examples of safety primitives. For the PUF, the aim will be to disprove the unclonability property, by experimentally modifying the statistical distribution of the identifiers generated by the PUF. This could go as far as gaining precise control of individual bits of the response obtained. The second application will be the deactivation of an attack sensor before its use, by exposing it to laser radiation when it is powered off. The aim here is to render the sensor non-functional once it is powered. Finally, we plan to illustrate the developed fault model by applying it to two existing systems, resulting from previous ANR projects, and which use the security primitives described above. Thus, we will first target the intellectual property protection system of the SALWARE project, protecting IP cores against illegal copying. This system is based on the intrinsic identification of the different instances of an IP core using a PUF, and the possibility of cloning the PUF would make it possible to illegally activate several components from a single legal activation. The second target device is an integrated substrate current sensor, known as BBICS, from the ANR LIESSE project. The objective here is to raise the detection threshold of the sensor to make it insensitive to the currents induced by a laser attack carried out later. Finally, once this original threat has been clearly identified and validated, we will propose countermeasures that are adapted and suitably designed.

    more_vert
  • Funder: French National Research Agency (ANR) Project Code: ANR-12-INSE-0008
    Funder Contribution: 658,316 EUR

    Many aspects of our current life rely on the exchange of data through electronic media. Powerful encryption algorithms guarantee the security, privacy and authentication of these exchanges. Nevertheless, those algorithms are implemented in electronic devices that may be the target of attacks despite their proven robustness. Several means of attacking integrated circuits are reported in the literature (for instance analysis of the computation time [1], of the correlation between the processed data and the current consumption [2][3], of electromagnetic emanation, of the noise caused by the emitted photons, etc.). Among them, laser illumination of the device has been reported to be one important and effective mean to perform attacks. The principle is to illuminate the circuit by mean of a laser and then to induce a faulty behavior. For instance, in so-called Differential Fault Analysis (DFA) [4], an attacker can deduce the secret key used in the crypto-algorithms by comparing the faulty result and the correct one. Other types of attacks exist, also based on fault injection but not requiring a differential analysis; the safe error attacks or clocks attacks are such examples. In all cases, the need for an initial perturbation, well-controlled in space and time, is similar thus the interest for the laser-based perturbations. Several papers have been published on such attacks, but mainly from a theoretical perspective i.e. by assuming some characteristics of the errors due to the injected faults. For instance, if it is supposed that one is able to change the value of a given bit at a given moment, then it is shown that it is possible to derive the secret key used during an encryption. Conversely, relatively few studies have shown the actual possibility to inject such appropriate faults in a circuit (i.e. with the expected characteristics) and especially onto deep-submicron technology circuits (65 nm, 40nm and 22 nm technologies). The main goals of this project are 1/ to study and model the effect of laser shots onto submicronic circuits and 2/ to provide efficient tools to circuit designers to prevent such laser attacks. For that, a first sub-goal is to model the effect of laser shots onto deep submicron integrated circuits and to derive electrical and logico-temporal fault models that can be used in a design flow. A second goal of this project is to develop tools helping the designers to validate their solutions against laser injections without neither actually having access to expensive laser equipment, nor to fabricate ICs. These tools will allow simulating the laser effects on the basis of the laser fault models developed within the project itself; the designers will thus benefit from the possibility to evaluate soon in the design flow the behavior of the systems with respect to the different parameters and variables highlighted during the experimentation campaigns. In order to accelerate the evaluation process, emulation will be taken into account: generic tools are already available at the partners and they will be refined and adapted to the results obtained during the project. A third goal is to anticipate new attacks based on the effects on these advanced technologies and thus to propose counter-measures for near-future circuits. A final objective of this project is the exploitation of the data collected during the experimental campaigns: the derived error models will be the basis for the definition of new attacks to secured cryptographic systems, potentially protected against the known threats. Countermeasures will be also suggested, in order to provide designers with a complete analysis toolbox for their designs, from the possible failure sources to the solutions to avoid them.

    more_vert
  • Funder: French National Research Agency (ANR) Project Code: ANR-18-CE39-0002
    Funder Contribution: 549,191 EUR

    Counterfeiting and more generally identity theft, is a phenomenon that affects all the industrial sectors, from luxury to mass distribution and whose losses are colossal for economy, employment, brand image: in France a cost of 7.3 €billion (0.3% of the Gross Domestic Product) and of 25 000 jobs (about 300 €billion worldwide), adding health and technological risks associated with the counterfeit of certain products. In this context, the ambition of AUSTRAL project is to propose new solutions for authentication applications using two large frequency ranges: millimeter-wave (MW) and Terahertz (THz). These solutions will be low costs, consistent with the techniques of paper industry for mass production, biobased and easily recyclable, these latter two criteria promote a more sustainable development. Project objectives result from previous developments in the field of identification (ANR VERSO "THID", 2009-2013). This project has demonstrated the ability to associate two coding solutions on a single tag: a surface solution for MW encoding and volume solution for a THz encoding. A further study has since been performed on these structures that showed that the quantity of information contained in the electromagnetic signature of such tags is potentially usable for unitary authentication applications. This concept is based on the idea that it can be extremely difficult to reproduce exactly some materials that have a random part, in the image of the distribution of cellulose fibers in a sheet of paper. From this finding, the tag principle for authentication is to put this randomness on the EM tag signature. However, unicity does not ensure it is not possible to clone the tag and to fight against counterfeiting, we must ensure the authenticity of the tag by comparing two signatures: the first generally measured of chain outlet manufacturing and the second when a user needs to authenticate. To enhance security solution, we will look into this project to integrate the solution directly into the materials that comprise the objects, the packaging, or the Mariana on the bottles ... to perform a tamper proof fingerprint. Moreover, we will evaluate the quantity of information contained in such fingerprint that is a key point for applications of interest. More specifically, we propose to design, manufacture, characterize and analyze the quantity of information in several structures using surface and volume encodings that use the MW and THz frequency ranges. Finally, we will choose the most relevant MW and THz structures to achieve an efficient encoding solution and we will define the specifications of a whole encoding system (MW and THz structures, method for information encoding, readers, regulatory aspects). From its main objective, which is to provide new security solutions to fight against a non-violent form of crime that is fraud and counterfeiting, this project fits naturally and primarily in the challenge B.9 (Freedom and security of Europe, its citizens and its residents) - axis 1 (Fundamental research related to the challenge). It indexes several major areas of this challenge about "the safety of persons", "methods for proof research" and "traceability of consumer goods". The expected results of this project affect secondarily the challenge B.7 (Information and communication society) -axis 7 (Micro and nanotechnology for information processing and communication), as the project targets demonstrating quantifiable performance improvements" and "breaks with existing knowledge", based on RF and THz technologies in electronics and photonics, notably in response to the application challenges related to the fight against counterfeiting.

    more_vert
  • chevron_left
  • 1
  • 2
  • 3
  • chevron_right
2 Organizations, page 1 of 1

Do the share buttons not appear? Please make sure, any blocking addon is disabled, and then reload the page.

Content report
No reports available
Funder report
No option selected
arrow_drop_down

Do you wish to download a CSV file? Note that this process may take a while.

There was an error in csv downloading. Please try again later.