Memory authentication is gaining importance in embedded systems as off-chip memories are prone to splicing and spoofing attacks. To maintain confidentiality and integrity of data in external memories, the data are encrypted before storing, decrypted during reading, and memory integrity tree techniques are employed to verify the authenticity of the data. However, the number of encrypt/decrypt operations for each memory access, the number of verification executed when accessing a node and number of updates executed when a node is modified, correspond to the height of the tree, i.e. log2N, where N is the number of data for a memory integrity tree with arity of 2. Also, each verification and update operation requires two memory access to fetch ...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
This report is part of a follow-up of a project completed in 2015 that involved memory authenticati...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
Embedded systems have become a pervasive part of our lives and they are now the driving force behin...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
This report is part of a follow-up of a project completed in 2015 that involved memory authenticati...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
Embedded systems have become a pervasive part of our lives and they are now the driving force behin...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Secure processors enable new sets of applications such as commercial grid computing, software copy-p...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
This paper proposes a complete hardware solution for embedded systems that fully protects off-chip m...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...