Many embedded systems have relatively strong security requirements because they handle confidential data or support secure electronic transactions. A prototypical example are payment terminals. To ensure that sensitive data such as cryptographic keys cannot leak, security-critical parts of these systems are implemented as separate chips, and hence physically isolated from other parts of the system. But isolation can also be implemented in software. Higher-end computing platforms are equipped with hardware support to facilitate the implementation of virtual memory and virtual machine monitors. However many embedded systems lack such hardware features. In this paper, we propose a design for a generic and very lightweight hardware mechanism th...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Sanctum offers the same promise as SGX, namely strong provable isolation of software modules running...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
We consider the problem of how to provide an execution environment where the application's secrets a...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
While security has become important in embedded systems, commodity operating systems often fail in e...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
With the rise of Internet of Things (IoT) accessories such as network attached cameras, light bulbs ...
Blurring the line between software and hardware, re-configurable devices strike a balance between th...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Over the last years, security-kernels have played a promising role in reshaping the landscape of pla...
Sanctum offers the same promise as SGX, namely strong provable isolation of software modules running...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
We consider the problem of how to provide an execution environment where the application's secrets a...
Abstract—We consider the problem of how to provide an execution environment where the application’s ...
While security has become important in embedded systems, commodity operating systems often fail in e...
Our society increasingly depends on computing devices. Customers rely on laptops and mobile devices ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
With the rise of Internet of Things (IoT) accessories such as network attached cameras, light bulbs ...
Blurring the line between software and hardware, re-configurable devices strike a balance between th...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
National audienceAs far as one is concerned by security in virtual embedded systems, one can say tha...
The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come...