International audienceThe FPGA world recently experienced significant changes with the introduction of new SoCs embedding high-end microprocessors and programmable logic on the same integrated circuit. The architecture of these SoCs can be exploited to offer an unprecedented level of monitoring of the memory accesses of running software components, a key element of safety and security analysis. This paper presents the hardware / software implementation of such a memory tracing tool on one of these SoCs. It also proposes example applications in the security field and two attacks - a pass-phrase retrieval and an access control bypass - to demonstrate the power of hardware-assisted memory tracing.</p
Since the widespread adoption of the internet, computer security has become one of the primary conce...
System security is an increasingly important design criterion for many embedded systems. These syste...
System security is an increasingly important design criterion for many embedded systems. These syste...
ABSTRACTFingerprinting SoC FPGA via Measuring Communication LinkOver the past few decades, Field Pro...
Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs a...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
The hardware security of embedded systems is raising more and more concerns in numerous safety-criti...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
Abstract—Memory trace analysis is an important technology for architecture research, system software...
At this moment in the field of FPGA, only RAM tests have been carried out to evaluate its performanc...
With the rapid development of embedded systems, the systems’ security has become more and more impor...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Current CPU architectures provide only weak support for software seg-mentation, a key underpinning f...
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they hav...
International audienceSystem security is an increasingly important design criterion for many embedde...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
System security is an increasingly important design criterion for many embedded systems. These syste...
System security is an increasingly important design criterion for many embedded systems. These syste...
ABSTRACTFingerprinting SoC FPGA via Measuring Communication LinkOver the past few decades, Field Pro...
Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs a...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
The hardware security of embedded systems is raising more and more concerns in numerous safety-criti...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
Abstract—Memory trace analysis is an important technology for architecture research, system software...
At this moment in the field of FPGA, only RAM tests have been carried out to evaluate its performanc...
With the rapid development of embedded systems, the systems’ security has become more and more impor...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Current CPU architectures provide only weak support for software seg-mentation, a key underpinning f...
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they hav...
International audienceSystem security is an increasingly important design criterion for many embedde...
Since the widespread adoption of the internet, computer security has become one of the primary conce...
System security is an increasingly important design criterion for many embedded systems. These syste...
System security is an increasingly important design criterion for many embedded systems. These syste...