As computing appliances increase in use and handle more critical information and functionalities, the importance of security grows even greater. In cases where the device processes sensitive data or performs important functionality, an attacker may be able to read or manipulate it by accessing the data bus between the processor and memory itself. As it is impossible to provide physical protection to the piece of hardware in use, it is important to provide protection against revealing confidential information and securing the device\u27s intended operation. Defense against bus attacks such as spoofing, splicing, and replay attacks are of particular concern. Traditional memory authentication techniques, such as hashes and message authenticati...
As Field Programmable Gate Arrays (FPGAs) become more widely used, security concerns have been raise...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucc...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Securing off-chip main-memories is an integral component of trusted-execution environments like Inte...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Embedded systems have become a pervasive part of our lives and they are now the driving force behin...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
Bonsai Merkle tree (BMT) is a widely used data structure for authenticating data/metadata in a secur...
Recently there is a growing interest in both the architecture and the security community to create a...
Security features of modern (SoC) FPAGs permit to protect the confidentiality of hard- and software ...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Memory encryption with an authentication tree has received significant attentions due to the increas...
Abstract We define a new authentication tree in the symmetric key setting, which has the same comput...
As Field Programmable Gate Arrays (FPGAs) become more widely used, security concerns have been raise...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucc...
Abstract. Replay attacks are often the most costly attacks to thwart when dealing with off-chip memo...
Due to the widespread software copyright violations (piracy, reverse engineering and tampering), sig...
Securing off-chip main-memories is an integral component of trusted-execution environments like Inte...
Memory authentication is becoming more important in embedded systems as off chip memories are prone...
Embedded systems have become a pervasive part of our lives and they are now the driving force behin...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
Bonsai Merkle tree (BMT) is a widely used data structure for authenticating data/metadata in a secur...
Recently there is a growing interest in both the architecture and the security community to create a...
Security features of modern (SoC) FPAGs permit to protect the confidentiality of hard- and software ...
Single Chip Secure Processors have recently been proposed for variety of applications ranging from a...
Memory encryption with an authentication tree has received significant attentions due to the increas...
Abstract We define a new authentication tree in the symmetric key setting, which has the same comput...
As Field Programmable Gate Arrays (FPGAs) become more widely used, security concerns have been raise...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucc...