International audienceOver the last 30 years, a number of secure processor architectures have been proposed to protect software integrity and confidentiality during its distribution and execution. In such architectures, encryption (together with integrity checking) is used extensively, on any data leaving a defined secure boundary. In this paper, we show how encryption can be achieved at the instruction level using a stream cipher. Thus encryption is more lightweight and efficient, and is maintained deeper in the memory hierarchy than the natural off-chip boundary considered in most research works. It requires the control flow graph to be used and modified as part of the off-line encryption process, but thanks to the LLVM framework, it can ...
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and ...
Abstract. A persistent problem with program execution, despite nu-merous mitigation attempts, is its...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceComputing devices became part of our daily world. But being physically accessi...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Abstract. Most present symmetric encryption algorithms result from a tradeoff between implementation...
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and ...
Abstract. A persistent problem with program execution, despite nu-merous mitigation attempts, is its...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceComputing devices became part of our daily world. But being physically accessi...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Security in the area of embedded systems has been drawing enormous attention lately. Although recent...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Abstract. Most present symmetric encryption algorithms result from a tradeoff between implementation...
Most present symmetric encryption algorithms result from a tradeoff between implementation cost and ...
Abstract. A persistent problem with program execution, despite nu-merous mitigation attempts, is its...
With more applications being deployed on embedded platforms, software protection becomes increasingl...