Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tampering with buses, memory, and I/O devices; and reverse engineering. In this paper we describe an efficient hardware mechanism that protects software integrity and guarantees software confidentiality. To provide software integrity, each instruction block is signed during program installation with a cryptographically secure signature. The signatures embedded in the code are verified during program execution. Software confidentiality is provided by encrypting instruction blocks. To achieve low performance overhead, the proposed mechanism combines several architectural e...
We present a lightweight authentication mechanism which verifies the authenticity of code and thereb...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
With more computing platforms connected to the Internet each day, computer system security has becom...
With more computing platforms connected to the Internet each day, computer system security has becom...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceIn the last few decades embedded processors have invaded the modern lifestyle....
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
International audienceThe increasing complexity of software and hardware layers makes them likely to...
Many embedded systems have relatively strong security requirements because they handle confidential ...
We present a lightweight authentication mechanism which verifies the authenticity of code and thereb...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
With more computing platforms connected to the Internet each day, computer system security has becom...
With more computing platforms connected to the Internet each day, computer system security has becom...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceIn the last few decades embedded processors have invaded the modern lifestyle....
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Building applications that ensure confidentiality of sensitive data is a non-trivial task. Such appl...
International audienceThe increasing complexity of software and hardware layers makes them likely to...
Many embedded systems have relatively strong security requirements because they handle confidential ...
We present a lightweight authentication mechanism which verifies the authenticity of code and thereb...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...