Over the last 30 years, a number of secure processor architectures have been proposed to protect software integrity and confidentiality during its distribution and execution. In such architectures, encryption (together with integrity checking) is used extensively, on any data leaving a defined secure boundary. In this paper, we show how encryption can be achieved at the instruction level using a stream cipher. Thus encryption is more lightweight and efficient, and is maintained deeper in the memory hierarchy than the natural off-chip boundaries considered in most research works. It requires the control flow graph to be used and modified as part of the off-line encryption process, but thanks to the LLVM framework, it can be integrated easily...
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and ...
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciph...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
International audienceComputing devices became part of our daily world. But being physically accessi...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
Abstract. A persistent problem with program execution, despite nu-merous mitigation attempts, is its...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
Abstract. Most present symmetric encryption algorithms result from a tradeoff between implementation...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and ...
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciph...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
International audienceComputing devices became part of our daily world. But being physically accessi...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
Abstract. A persistent problem with program execution, despite nu-merous mitigation attempts, is its...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
Abstract. Most present symmetric encryption algorithms result from a tradeoff between implementation...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and ...
In Fast Software Encryption (FSE) 2015, while presenting a new idea (i.e., the design of stream ciph...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...