International audienceCritical and privacy-sensitive applications of smart and connected objects such as health-related objects are now common, thus raising the need to design these objects with strong security guarantees. Many recent works offer practical hardware-assisted security solutions that take advantage of a tight cooperation between hardware and software to provide system-level security guarantees. Formally and consistently proving the efficiency of these solutions raises challenges since software and hardware verifications approaches generally rely on different representations. The paper first sketches an ideal security verification solution naturally handling both hardware and software components. Next, it proposes an evaluation...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
International audienceOver time, hardware designs have constantly grown in complexity and modern pla...
Over time, hardware designs have constantly grown in complexity and modern platforms involve multipl...
International audience<p>Critical and private applications of smart and connected objects such as he...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Embedded systems are increasingly pervasive, interdependent and in many cases critical to our every ...
As embedded systems become more complex, more connected and more involved in critical tasks, the que...
Abstract—Embedded computing devices increasingly permeate many aspects of modern life: from medical ...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
International audienceRemote attestation is a protocol to verify that a remote algorithm satisfies s...
The wide usage of hardware Intellectual Property (IP) cores from untrusted third-party vendors has r...
Software attestation has become a popular and challenging research topic at many established securit...
Remote attestation is a mechanism to securely and verifiably obtain information about the state of a...
Reusable hardware Intellectual Property (IP) based System-on-ChIP (SoC) design has emerged as a perv...
International audienceExciting new capabilities of modern trusted hardware technologies allow for th...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
International audienceOver time, hardware designs have constantly grown in complexity and modern pla...
Over time, hardware designs have constantly grown in complexity and modern platforms involve multipl...
International audience<p>Critical and private applications of smart and connected objects such as he...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Embedded systems are increasingly pervasive, interdependent and in many cases critical to our every ...
As embedded systems become more complex, more connected and more involved in critical tasks, the que...
Abstract—Embedded computing devices increasingly permeate many aspects of modern life: from medical ...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
International audienceRemote attestation is a protocol to verify that a remote algorithm satisfies s...
The wide usage of hardware Intellectual Property (IP) cores from untrusted third-party vendors has r...
Software attestation has become a popular and challenging research topic at many established securit...
Remote attestation is a mechanism to securely and verifiably obtain information about the state of a...
Reusable hardware Intellectual Property (IP) based System-on-ChIP (SoC) design has emerged as a perv...
International audienceExciting new capabilities of modern trusted hardware technologies allow for th...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
International audienceOver time, hardware designs have constantly grown in complexity and modern pla...
Over time, hardware designs have constantly grown in complexity and modern platforms involve multipl...