During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiquitous. Most of these systems use unreliable or untrusted storage (flash, RAM...)to store code or data. The confidentiality and integrity of these data can be threaten by hardware (spying on the communication bus between the processing component and the storage component) or software attacks. These attacks can disclose sensitive information to the adversary or disturb the behavior of the system. In this thesis, in the context of embedded systems, we focused on the attacks that threaten the confidentiality and integrity of data that are transmittedover the memory bus or that are stored inside the memory. Several primitives used to protect the c...
Hidden undesired functionality is an unavoidable reality in any complex hardware or software compone...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
Embedded systems have become a pervasive part of our lives and they are now the driving force behin...
During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiqu...
Ces dernières années, les systèmes informatiques (Cloud Computing, systèmes embarqués, etc.) sont de...
Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucc...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
In this paper we propose two new constructions for pro-tecting the integrity of files in cryptograph...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
Hidden undesired functionality is an unavoidable reality in any complex hardware or software compone...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
Embedded systems have become a pervasive part of our lives and they are now the driving force behin...
During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiqu...
Ces dernières années, les systèmes informatiques (Cloud Computing, systèmes embarqués, etc.) sont de...
Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucc...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
In this paper we propose two new constructions for pro-tecting the integrity of files in cryptograph...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
Hidden undesired functionality is an unavoidable reality in any complex hardware or software compone...
A cryptographic network file system has to guarantee confidentiality and integrity of its files, and...
Embedded systems have become a pervasive part of our lives and they are now the driving force behin...