Recognizing the pressing demands to secure embedded applications, ARM TrustZone has been adopted in both academic research and commercial products to protect sensitive code and data in a privileged, isolated execution environment. However, the design of TrustZone cannot prevent physical memory disclosure attacks such as cold boot attack from gaining unrestricted read access to the sensitive contents in the dynamic random access memory (DRAM). A number of system-on-chip (SoC) bound execution solutions have been proposed to thaw the cold boot attack by storing sensitive data only in CPU registers, CPU cache or internal RAM. However, when the operating system, which is responsible for creating and maintaining the SoC-bound execution environmen...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has been adopted in ...
As Moore`s law continues to reduce the cost of computation at an exponential rate, embedded computin...
abstract: The purpose of this project was to implement and analyze a new proposed rootkit that claim...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
International audienceA variety of applications are executing on a large untrusted computing base, w...
abstract: With the rise of the Internet of Things, embedded systems have become an integral part of ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
During the last decade, Trusted Execution Environment (TEE) provided by ARM TrustZone had become one...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has been adopted in ...
As Moore`s law continues to reduce the cost of computation at an exponential rate, embedded computin...
abstract: The purpose of this project was to implement and analyze a new proposed rootkit that claim...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
We propose enhancing a reconfigurable and extensible embedded RISC processor core with a protected z...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
International audienceA variety of applications are executing on a large untrusted computing base, w...
abstract: With the rise of the Internet of Things, embedded systems have become an integral part of ...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
During the last decade, Trusted Execution Environment (TEE) provided by ARM TrustZone had become one...
Software cache-based side channel attacks present serious threats to modern computer systems. Using ...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...