The last decade has recorded an increase in security protocols for integrated circuits and memory systems, because of device specific attacks such as side-channel monitoring and cold boot and also because sensitive information is stored in such devices. The scope of this study is to propose new security measures which can be applied in memory systems, in order to make the stored data unusable, if retrieved successfully by any type of attack. The security technique uses interleaved scrambling vectors to scramble the data retained in a memory system and employs several dissemination rules. The proposed technique is investigated and assessed from several perspectives, such as power consumption, time performance and area overhead
Secure semiconductor devices usually destroy key material on tamper detection. However, data remanen...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Memory systems security has increased over the last decade due to the sensitive information which is...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
Abstract — Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory ...
Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence i...
A wide range of attacks that target cache memories in secure systems have been reported in the last ...
Memory remanence in SRAMs and DRAMs is usually exploited through cold-boot attacks and the targets ...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
Cotutela Universitat Politècnica de Catalunya i Universitatea Tehnica din Cluj-NapocaThe main objec...
Secure semiconductor devices usually destroy key material on tamper detection. However, data remanen...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Memory systems security has increased over the last decade due to the sensitive information which is...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
Abstract — Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory ...
Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence i...
A wide range of attacks that target cache memories in secure systems have been reported in the last ...
Memory remanence in SRAMs and DRAMs is usually exploited through cold-boot attacks and the targets ...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
Cotutela Universitat Politècnica de Catalunya i Universitatea Tehnica din Cluj-NapocaThe main objec...
Secure semiconductor devices usually destroy key material on tamper detection. However, data remanen...
Computer security and privacy are becoming extremely important nowadays. The task of protecting comp...
Due to their high-density and near-zero leakage power consumption, non-volatile memories (NVMs) are ...