Abstract. A critical component in the design of secure processors is memory encryption which provides protection for the privacy of code and data stored in off-chip memory. The overhead of the decryption op-eration that must precede a load requiring an off-chip memory access, decryption being on the critical path, can significantly degrade perfor-mance. Recently hardware counter-based one-time pad encryption tech-niques [11,13,9] have been proposed to reduce this overhead. For high-end processors the performance impact of decryption has been successfully limited due to: presence of fairly large on-chip L1 and L2 caches that reduce off-chip accesses; and additional hardware support proposed in [13,9] to reduce decryption latency. However, fo...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
This report is part of a follow-up of a project completed in 2015 that involved memory authenticati...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
It is clear that Cryptography is computationally intensive. It is also known that embedded systems h...
Over the last decade, advancements in performance and efficiency of portable computing devices have ...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
This report is part of a follow-up of a project completed in 2015 that involved memory authenticati...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
It is clear that Cryptography is computationally intensive. It is also known that embedded systems h...
Over the last decade, advancements in performance and efficiency of portable computing devices have ...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
This report is part of a follow-up of a project completed in 2015 that involved memory authenticati...