This thesis deals with the memory safety issue in life-critical medical devices. Over the last few years, several vulnerabilities such as memory exploits have been identified in various Internet of Medical Things (IoMT) devices. In the worst case, such vulnerabilities allow an attacker to remotely force an application to execute malicious actions. While many countermeasures against software exploits have beenproposed so far, only a few of them seem to be suitable for medical devices. Indeed,these devices are constrained by their size, real-time performances, and safety requirements making the integration of security challenging. To address this issue,the thesis proposes two approaches. Both address the memory safety issue fromthe software d...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
This thesis addresses vulnerabilities in current Trusted Computing architecture by exploring a desig...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
This thesis deals with the memory safety issue in life-critical medical devices. Over the last few y...
Cette thèse traite de la problématique des corruptions de mémoire dans les dispositifs médicaux vita...
Real-time systems have more and more ways to communicate wirelessly with external users. These same ...
The security of embedded systems containing sensitive data has become a main concern. These widely d...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
La sécurité des systèmes embarqués contenant des données sensibles est un enjeu crucial. La disponib...
En considérant la vitesse avec laquelle la technologie des systèmes embarqués progresse, il n’est pa...
Embedded systems are increasingly present in our daily lives (e.g. credit cards, smartphones and bio...
Embedded devices are currently used in many critical systems, ranging from automotive to medical dev...
This PhD researches a global methodology enabling to improve the dependability and security level ag...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
This thesis addresses vulnerabilities in current Trusted Computing architecture by exploring a desig...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
This thesis deals with the memory safety issue in life-critical medical devices. Over the last few y...
Cette thèse traite de la problématique des corruptions de mémoire dans les dispositifs médicaux vita...
Real-time systems have more and more ways to communicate wirelessly with external users. These same ...
The security of embedded systems containing sensitive data has become a main concern. These widely d...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
La sécurité des systèmes embarqués contenant des données sensibles est un enjeu crucial. La disponib...
En considérant la vitesse avec laquelle la technologie des systèmes embarqués progresse, il n’est pa...
Embedded systems are increasingly present in our daily lives (e.g. credit cards, smartphones and bio...
Embedded devices are currently used in many critical systems, ranging from automotive to medical dev...
This PhD researches a global methodology enabling to improve the dependability and security level ag...
The most common cyber-attack vector is exploit of software vulnerability. Despite much efforts towar...
This thesis addresses vulnerabilities in current Trusted Computing architecture by exploring a desig...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...