Abstract. A persistent problem with program execution, despite nu-merous mitigation attempts, is its inherent vulnerability to the injec-tion of malicious code. Equally unsolved is the susceptibility of firmware to reverse engineering, which undermines the manufacturer’s code con-fidentiality. We propose an approach that solves both kinds of security problems employing instruction-level code encryption combined with the use of a physical unclonable function (PUF). Our novel Secure Execution PUF-based Processor (SEPP) architecture is designed to minimize the attack surface, as well as performance impact, and requires no significant changes to the development process. This is possible based on a tight integration of a PUF directly into the pr...
Secure processors have been recently introduced, which enable new applications involving software an...
International audienceComputing devices became part of our daily world. But being physically accessi...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
A persistent problem with program execution, despite numerous mitigation attempts, is its inherent v...
In his invited talk, joint between CHES 2016 and CRYPTO 2016 on the Future of Embedded Security, Pau...
This paper presents a novel security mechanism for sensitive data stored, acquired or processed by a...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
In most PUF-based authentication schemes, a central server is usually engaged to verify the response...
As Internet of Things (IoT) devices are increasingly used in industry and become further integrated ...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Cybersecurity is an increasingly important aspect of the modern world since most of the communicatio...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
International audiencePhysically Unclonable Functions (PUFs) are well-known to be solutions for sili...
Secure processors have been recently introduced, which enable new applications involving software an...
International audienceComputing devices became part of our daily world. But being physically accessi...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
A persistent problem with program execution, despite numerous mitigation attempts, is its inherent v...
In his invited talk, joint between CHES 2016 and CRYPTO 2016 on the Future of Embedded Security, Pau...
This paper presents a novel security mechanism for sensitive data stored, acquired or processed by a...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
In most PUF-based authentication schemes, a central server is usually engaged to verify the response...
As Internet of Things (IoT) devices are increasingly used in industry and become further integrated ...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Many applications are built upon private algorithms, and executing them in untrusted, remote enviro...
Cybersecurity is an increasingly important aspect of the modern world since most of the communicatio...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
International audiencePhysically Unclonable Functions (PUFs) are well-known to be solutions for sili...
Secure processors have been recently introduced, which enable new applications involving software an...
International audienceComputing devices became part of our daily world. But being physically accessi...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...