Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically offer no such protection. Several reconfigurable cores are often integrated onto a single chip where they share external resources such as mem-ory. While this enables small form factor and low cost designs, it opens up the opportunity for modules to intercept or even interfere with the operation of one another. We investi-gate the design and synthesis of an FPGA memory protection mechanism capable of enforcing access control policies and a methodology for translating formal policy descrip-tions into FPGA...
International audienceThe growing evolution in field programmable gate array (FPGA) performances app...
Abstract. Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominat...
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based...
Abstract. While processor based systems often enforce memory pro-tection to prevent the unintended s...
Abstract — One of the key problems facing the computer industry today involves ensuring the integrit...
International audienceEmbedded systems are parts of our daily life and used in many fields. They can...
International audienceSystem security is an increasingly important design criterion for many embedde...
International audienceThe FPGA world recently experienced significant changes with the introduction ...
System security is an increasingly important design criterion for many embedded systems. These syste...
System security is an increasingly important design criterion for many embedded systems. These syste...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
With reconfigurable devices fast becoming complete systems in their own right, interest in their sec...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceComputing devices became part of our daily world. But being physically accessi...
International audienceThe growing evolution in field programmable gate array (FPGA) performances app...
Abstract. Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominat...
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based...
Abstract. While processor based systems often enforce memory pro-tection to prevent the unintended s...
Abstract — One of the key problems facing the computer industry today involves ensuring the integrit...
International audienceEmbedded systems are parts of our daily life and used in many fields. They can...
International audienceSystem security is an increasingly important design criterion for many embedde...
International audienceThe FPGA world recently experienced significant changes with the introduction ...
System security is an increasingly important design criterion for many embedded systems. These syste...
System security is an increasingly important design criterion for many embedded systems. These syste...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
With reconfigurable devices fast becoming complete systems in their own right, interest in their sec...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceComputing devices became part of our daily world. But being physically accessi...
International audienceThe growing evolution in field programmable gate array (FPGA) performances app...
Abstract. Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominat...
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based...