Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of a computation through its physical dimensions (current consumption, EM emission, ...). Focusing on Electromagnetic analyses (EMA), such analyses have mostly been considered on low-end devices: smartcards and microcontrollers. In the wake of recent works, we propose to analyze the effects of a modern microarchitecture on the efficiency of EMA (here Correlation Power Analysis and template attacks). We show that despite the difficulty to synchronize the measurements, the speed of the targeted core and the activity of other cores on the same chip can still be accommodated. Finally, we confirm that enabling the secure mode of TrustZone (a hardwar...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some v...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
International audienceA Trusted Execution Environment (TEE) is a software solution made to improve s...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
The original publication is available at www.springerlink.comInternational audienceIn this paper, we...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Increased complexity in modern embedded systems has presented various important challenges with rega...
Physical side-channel monitoring leverages the physical phenomena produced by a microcontroller (e....
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some v...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...
Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
International audienceA Trusted Execution Environment (TEE) is a software solution made to improve s...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
The original publication is available at www.springerlink.comInternational audienceIn this paper, we...
International audienceA fault attack is a well-known technique where the behaviour of a chip is volu...
Increased complexity in modern embedded systems has presented various important challenges with rega...
Physical side-channel monitoring leverages the physical phenomena produced by a microcontroller (e....
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
International audienceImplementation attacks are a major threat to hardware cryptographic implementa...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
This paper presents a new hardware architecture designed for protecting the key of cryptographic alg...
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some v...
With technology scaling, electronic devices are becoming ubiquitous in everyday applications (smartc...