Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology surrounding us, from tablets to smartphones and a large amount of invisible ones. At the core of these systems, processors gather data, process them and interact with the outside world. As such, they are excepted to meet very strict safety and security requirements. From a security perspective, the task is even more difficult considering the user has a physical access to the device, allowing a wide range of specifically tailored attacks.Confidentiality, in terms of both software code and data is one of the fundamental properties expected for such systems. The first contribution of this work is a software encryption method based on the control fl...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Un nombre important et en constante augmentation de systèmes numériques nous entoure. Tablettes, sma...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
La cryptologie est un moyen de protéger la confidentialité, d'assurer l'intégrité, ou d'authentifier...
De nos jours, les systèmes embarqués sont omniprésents et leurs applications sont de plus en plus no...
Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucc...
Processors are electronic components omnipresent in our daily lives. They are in our smartphones, co...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
Les motivations pour employer des FPGAs (Field-Programmable Gate Array) dans les applications sécuri...
In this thesis, we propose to contribute to the definition of encrypted-computing systems for the se...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Un nombre important et en constante augmentation de systèmes numériques nous entoure. Tablettes, sma...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
La cryptologie est un moyen de protéger la confidentialité, d'assurer l'intégrité, ou d'authentifier...
De nos jours, les systèmes embarqués sont omniprésents et leurs applications sont de plus en plus no...
Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucc...
Processors are electronic components omnipresent in our daily lives. They are in our smartphones, co...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
Les motivations pour employer des FPGAs (Field-Programmable Gate Array) dans les applications sécuri...
In this thesis, we propose to contribute to the definition of encrypted-computing systems for the se...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...