Today's embedded systems are considered as non trusted hosts since the owner, or anyone else whosucceeds in getting access, is a potential adversary. The bus between the System on Chip (SoC) and the externalmemory is one of the weakest points of such systems because external memories contain sensitive data (endusers private data, software code...) which are usually exchanged in clear form over the bus. Therefore anadversary may probe this bus in order to read private data or to retrieve software code (data confidentialityconcern). Another possible attack relies on code injection (data integrity concern). Thus, hardware mechanismsmust be designed to ensure data confidentiality and integrity. The conventional way to reach such a goal is toimp...
La sécurité de l'exécution du programme est souvent demandée pour les applications critiques. Malheu...
Processors are electronic components omnipresent in our daily lives. They are in our smartphones, co...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
Ces dernières années, les systèmes informatiques (Cloud Computing, systèmes embarqués, etc.) sont de...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking E...
International audienceThis paper describes a novel engine, called PE-ICE (Parallelized Encryption an...
During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiqu...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
We offer a secure hardware architecture for system boot up, secure software execution and on field u...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Un nombre important et en constante augmentation de systèmes numériques nous entoure. Tablettes, sma...
De nos jours, les systèmes embarqués sont omniprésents et leurs applications sont de plus en plus no...
La sécurité de l'exécution du programme est souvent demandée pour les applications critiques. Malheu...
Processors are electronic components omnipresent in our daily lives. They are in our smartphones, co...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...
Ces dernières années, les systèmes informatiques (Cloud Computing, systèmes embarqués, etc.) sont de...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
This paper describes a novel engine, called PE-ICE (Parallelized Encryption and Integrity Checking E...
International audienceThis paper describes a novel engine, called PE-ICE (Parallelized Encryption an...
During the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiqu...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
We offer a secure hardware architecture for system boot up, secure software execution and on field u...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Un nombre important et en constante augmentation de systèmes numériques nous entoure. Tablettes, sma...
De nos jours, les systèmes embarqués sont omniprésents et leurs applications sont de plus en plus no...
La sécurité de l'exécution du programme est souvent demandée pour les applications critiques. Malheu...
Processors are electronic components omnipresent in our daily lives. They are in our smartphones, co...
Embedded systems are ubiquitous and they have more and more applications. Most actual industrial fie...