The growing complexity and increased networking of securi-ty and safety-critical systems expose them to the risk of ad-versarial compromise through remote attacks. These attacks can result in full system compromise, but often the attacker gains control only over some system components (e.g., a pe-ripheral) and over some applications running on the system. We consider the latter scenario and focus on enabling on-schedule execution of critical applications that are running on a partially compromised system — we call this trusted scheduling. We identify the essential properties needed for the realization of a trusted scheduling system and we design an embedded system that achieves these properties. We show that our system protects not only aga...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Modern applications often operate on data in multiple administrative domains. In this federated set...
Embedded systems (ESs) have been widely used in various application domains. It is very important to...
Abstract – Hardware Trust is an emerging problem in semiconduc-tor integrated circuit (IC) security ...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Abstract—Embedded systems (ESs) have been a prominent solution for enhancing system performance and ...
Real-time embedded systems (RTESs) have been widely used in modern society. And it is also very comm...
Cyber-security has become a critical issue for realtime distributed embedded systems in domains such...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
Industrial control systems (ICSs) in networked environments face severe cyber-security risks and cha...
Cyber-security attacks can have a critical impact on embedded systems. They may access secret inform...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Modern applications often operate on data in multiple administrative domains. In this federated set...
Embedded systems (ESs) have been widely used in various application domains. It is very important to...
Abstract – Hardware Trust is an emerging problem in semiconduc-tor integrated circuit (IC) security ...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Abstract—Embedded systems (ESs) have been a prominent solution for enhancing system performance and ...
Real-time embedded systems (RTESs) have been widely used in modern society. And it is also very comm...
Cyber-security has become a critical issue for realtime distributed embedded systems in domains such...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Building systems with rigorous security guarantees is difficult, because most programming languages ...
Industrial control systems (ICSs) in networked environments face severe cyber-security risks and cha...
Cyber-security attacks can have a critical impact on embedded systems. They may access secret inform...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a v...
Abstract — Security is emerging as an important concern in embedded system design. The security of e...
Modern applications often operate on data in multiple administrative domains. In this federated set...