The automotive domain is witnessing a relentless transition to autonomous cars demanding high-performance processors to timely execute complex, critical, decision-making software. The other side of the coin is that high-performance processors include hardware features like shared multilevel caches and multiple cores that expose the system to significant security threats, challenge time predictability, and jeopardize reliable operation due to the use of advanced process technology. In this paper, we discuss how introducing randomization in the non-functional behavior of certain hardware components helps to achieve a three-fold objective while preserving high-average performance capabilities of high-performance processors: improving the secu...
An operating system kernel uses cryptographically secure pseudorandom number generator for creating ...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
The automotive domain is witnessing a relentless transition to autonomous cars demanding high-perfor...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
The most promising secure-cache design approaches use cache-set randomization to index cache content...
Time-randomized processor (TRP) architectures have been shown as one of the most promising approache...
International audienceThe rapid development of low power, high density, high performance SoCs has pu...
Critical Real-Time Embedded Systems (CRTES) are the subset of embedded systems with timing constrain...
Cache memories have a huge impact on software's worst-case execution time (WCET). While enabling the...
AbstractÐThis paper provides a methodology for analyzing the performance degradation of a computatio...
Fault tolerance has often been assessed separately in safety-related real-time systems, which may le...
While hardware caches are generally effective at improving application performance, they greatly co...
Cache memories are one of the hardware resources with higher potential to reduce worst-case executio...
The technique of randomization has been employed to solve numerous prob lems of computing both sequ...
An operating system kernel uses cryptographically secure pseudorandom number generator for creating ...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...
The automotive domain is witnessing a relentless transition to autonomous cars demanding high-perfor...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
The most promising secure-cache design approaches use cache-set randomization to index cache content...
Time-randomized processor (TRP) architectures have been shown as one of the most promising approache...
International audienceThe rapid development of low power, high density, high performance SoCs has pu...
Critical Real-Time Embedded Systems (CRTES) are the subset of embedded systems with timing constrain...
Cache memories have a huge impact on software's worst-case execution time (WCET). While enabling the...
AbstractÐThis paper provides a methodology for analyzing the performance degradation of a computatio...
Fault tolerance has often been assessed separately in safety-related real-time systems, which may le...
While hardware caches are generally effective at improving application performance, they greatly co...
Cache memories are one of the hardware resources with higher potential to reduce worst-case executio...
The technique of randomization has been employed to solve numerous prob lems of computing both sequ...
An operating system kernel uses cryptographically secure pseudorandom number generator for creating ...
In recent years, security has grown into a critical issue in modern information systems. Electronic ...
The effectiveness of cache hierarchies, undeniably, is of crucial importance, since they essentially...