Secure semiconductor devices usually destroy key material on tamper detection. However, data remanence effect in SRAM and Flash/EEPROM makes secure erasure process more challenging. On the other hand, data integrity of the embedded memory is essential to mitigate fault attacks and Trojan malware. Data retention issues could influence the reliability of embedded systems. Some examples of such issues in industrial and automotive applications are presented. When it comes to the security of semiconductor devices, both data remanence and data retention issues could lead to possible data recovery by an attacker. This paper introduces a new power glitching technique that reduces the data remanence time in embedded SRAM from seconds to microseconds...
Security is one of the major design criteria for modern computing system. Computing systems are beco...
International audienceToday's trend in the smart card industry is to move from ROM+EEPROM chips to F...
Trusted computing is an emerging technology to improve the trustworthiness of computing platforms. T...
Static Random-Access Memory (SRAM) has been widely applied in electronic devices to generate and sto...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
International audienceOn-chip memories, and in particular SRAMs, are among the most critical compone...
The security of data information is the most concemmg parameter for memory devices design contempor...
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, ret...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
We study the security feature of static random access memory (SRAM) against the data imprinting atta...
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they hav...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Phase change memory (PCM) is an emerging memory technol-ogy for future computing systems. Compared t...
Twenty years ago, the semiconductor industry was in-vesting millions dollars to build tools to inves...
Security is one of the major design criteria for modern computing system. Computing systems are beco...
International audienceToday's trend in the smart card industry is to move from ROM+EEPROM chips to F...
Trusted computing is an emerging technology to improve the trustworthiness of computing platforms. T...
Static Random-Access Memory (SRAM) has been widely applied in electronic devices to generate and sto...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
International audienceOn-chip memories, and in particular SRAMs, are among the most critical compone...
The security of data information is the most concemmg parameter for memory devices design contempor...
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, ret...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
We study the security feature of static random access memory (SRAM) against the data imprinting atta...
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they hav...
This dissertation explores the use of capability security hardware and software in real-time and lat...
Phase change memory (PCM) is an emerging memory technol-ogy for future computing systems. Compared t...
Twenty years ago, the semiconductor industry was in-vesting millions dollars to build tools to inves...
Security is one of the major design criteria for modern computing system. Computing systems are beco...
International audienceToday's trend in the smart card industry is to move from ROM+EEPROM chips to F...
Trusted computing is an emerging technology to improve the trustworthiness of computing platforms. T...