International audienceThis paper proposes a complete hardware solution for embedded systems that fully protects off-chip memory. Our security core is based on one-time pad (OTP) encryption and a CRC integrity check module. These modules safeguard external memories for embedded processors against a series of well-known attacks, including replay attacks, spoofing attacks and relocation attacks. The implementation limits memory space overhead to 18.25 or 32.75%. It also reduces memory latency from 22 cycles for an alternate approach to 11 or 3 clock cycles depending on desired performance. The loss for software execution with our solution is only 10% compared with a non-protected solution. A FPGA-based implementation of the security core has b...
Security in embedded system design, which has long been a critical problem for ensuring the confiden...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
System security is an increasingly important design criterion for many embedded systems. These syste...
International audienceSystem security is an increasingly important design criterion for many embedde...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
System security is an increasingly important design criterion for many embedded systems. These syste...
Over the last decade, advancements in performance and efficiency of portable computing devices have ...
Trusted computing is an emerging technology to improve the trustworthiness of computing platforms. T...
We offer a secure hardware architecture for system boot up, secure software execution and on field u...
The constrained operating environments of many FPGA-based embedded systems require flexible security...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security in embedded system design, which has long been a critical problem for ensuring the confiden...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
System security is an increasingly important design criterion for many embedded systems. These syste...
International audienceSystem security is an increasingly important design criterion for many embedde...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
System security is an increasingly important design criterion for many embedded systems. These syste...
Over the last decade, advancements in performance and efficiency of portable computing devices have ...
Trusted computing is an emerging technology to improve the trustworthiness of computing platforms. T...
We offer a secure hardware architecture for system boot up, secure software execution and on field u...
The constrained operating environments of many FPGA-based embedded systems require flexible security...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security in embedded system design, which has long been a critical problem for ensuring the confiden...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
The Internet of Things (IoT) has grown dramatically over the past years. Largely autonomous, lightwe...