Abstract. While processor based systems often enforce memory pro-tection to prevent the unintended sharing of data between processes, current systems built around reconfigurable hardware typically offer no such protection. Several reconfigurable cores are often integrated onto a single chip where they share external resources such as memory. While this enables small form factor and low cost designs, it opens up the op-portunity for modules to intercept or even interfere with the operation of one another. We investigate the design and synthesis of a memory protection mechanism capable of enforcing policies expressed as a formal language. Our approach includes a specialized compiler that translates a policy of legal sharing to reconfigurable ...
With reference to sensor node architectures, we consider the problem of supporting forms of memory p...
System security is an increasingly important design criterion for many embedded systems. These syste...
System security is an increasingly important design criterion for many embedded systems. These syste...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
Proceedings of the 11th European Symposium on Research in Computer Security (ESORICS), Hamburg, Germ...
Abstract — One of the key problems facing the computer industry today involves ensuring the integrit...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
With reference to sensor node architectures, we consider the problem of supporting forms of memory ...
Abstract—Hardware interlocks that enforce semantic in-variants and allow fine-grained privilege sepa...
Blurring the line between software and hardware, re-configurable devices strike a balance between th...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
International audienceSystem security is an increasingly important design criterion for many embedde...
Tagged architectures have seen renewed interest as a means to improve the security and reliability o...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
With reference to sensor node architectures, we consider the problem of supporting forms of memory p...
System security is an increasingly important design criterion for many embedded systems. These syste...
System security is an increasingly important design criterion for many embedded systems. These syste...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
Proceedings of the 11th European Symposium on Research in Computer Security (ESORICS), Hamburg, Germ...
Abstract — One of the key problems facing the computer industry today involves ensuring the integrit...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
With reference to sensor node architectures, we consider the problem of supporting forms of memory ...
Abstract—Hardware interlocks that enforce semantic in-variants and allow fine-grained privilege sepa...
Blurring the line between software and hardware, re-configurable devices strike a balance between th...
This thesis proposes a formal methodology for defining, specifying, and reasoning about micro-polici...
International audienceSystem security is an increasingly important design criterion for many embedde...
Tagged architectures have seen renewed interest as a means to improve the security and reliability o...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
With reference to sensor node architectures, we consider the problem of supporting forms of memory p...
System security is an increasingly important design criterion for many embedded systems. These syste...
System security is an increasingly important design criterion for many embedded systems. These syste...