Secure processors enable new sets of applications such as commercial grid computing, software copy-protection, and secure mobile agents by providing security from both physical and software attacks. This paper proposes new hardware mechanisms for memory integrity verification and encryption, which are two key primitives required in single-chip secure processors. The integrity verification mecha-nism offers significant performance advantages over exist-ing ones when the checks are infrequent as in grid comput-ing applications. The encryption mechanism improves the performance in all cases. 1
Memory integrity protection is crucial for many applications that store critical data in the memory....
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
International audienceEmbedded systems have to increasingly support cryptographic primitives such as...
International audienceThis paper describes a novel engine, called PE-ICE (Parallelized Encryption an...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking E...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
Non-volatile memories provide energy efficiency, tolerance against power failure, and “instant-on” p...
Secure processor architecture enables tamper-proof protec-tion on software that addresses many dicul...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
The increasing need for security has caused system designers to consider placing some security suppo...
Memory integrity protection is crucial for many applications that store critical data in the memory....
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
International audienceEmbedded systems have to increasingly support cryptographic primitives such as...
International audienceThis paper describes a novel engine, called PE-ICE (Parallelized Encryption an...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Abstract — This paper presents the Trusted Computing problem and proposes a reconfigurable approach ...
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking E...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
Non-volatile memories provide energy efficiency, tolerance against power failure, and “instant-on” p...
Secure processor architecture enables tamper-proof protec-tion on software that addresses many dicul...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
The increasing need for security has caused system designers to consider placing some security suppo...
Memory integrity protection is crucial for many applications that store critical data in the memory....
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
International audienceEmbedded systems have to increasingly support cryptographic primitives such as...