Abstract — One of the key problems facing the computer industry today involves ensuring the integrity of end-user applications and data. Researchers in the relatively new field of software protection investigate the development and evaluation of controls that prevent the unauthorized modification or use of system software. While many previously developed protection schemes have provided a strong level of security, their overall effectiveness has been hindered by a lack of transparency to the user in terms of performance overhead. Other approaches take to the opposite extreme and sacrifice security for the sake of this need for transparency. In this work we present an architecture for software protection that provides for a high level of bot...
Computing systems designed using reconfigurable hardware are now used in many sensitive applications...
Computer security has largely been the domain of software for the last few decades. Although this ap...
Abstract. The use of FPGAs for cryptographic applications is highly attractive for a variety of reas...
A strong level of trust in the software running on an embedded processor is a prerequisite for its w...
International audienceEmbedded systems are parts of our daily life and used in many fields. They can...
Field Programmable Gate Arrays (FPGAs) are reconfigurable devices which have emerged as an interesti...
Abstract. While processor based systems often enforce memory pro-tection to prevent the unintended s...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
Abstract. Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominat...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
We propose to apply the open-source software development model to the domain of hardware/software co...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
With the new and powerful Field Programmable Gate Array (FPGA) families, new possibilities have been...
Computing systems designed using reconfigurable hardware are now used in many sensitive applications...
Computer security has largely been the domain of software for the last few decades. Although this ap...
Abstract. The use of FPGAs for cryptographic applications is highly attractive for a variety of reas...
A strong level of trust in the software running on an embedded processor is a prerequisite for its w...
International audienceEmbedded systems are parts of our daily life and used in many fields. They can...
Field Programmable Gate Arrays (FPGAs) are reconfigurable devices which have emerged as an interesti...
Abstract. While processor based systems often enforce memory pro-tection to prevent the unintended s...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
Abstract. Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominat...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
Over the last decade attacks have repetitively demonstrated that bitstream protection for SRAM-based...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
We propose to apply the open-source software development model to the domain of hardware/software co...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
With the new and powerful Field Programmable Gate Array (FPGA) families, new possibilities have been...
Computing systems designed using reconfigurable hardware are now used in many sensitive applications...
Computer security has largely been the domain of software for the last few decades. Although this ap...
Abstract. The use of FPGAs for cryptographic applications is highly attractive for a variety of reas...