Cycle-level architectural simulation of Trusted Execution Environ- ments (TEEs) can enable extensive design space exploration of these secure architectures. Existing architectural simulators which sup- port TEEs are either based on hardware-level implementations or abstract analytic models. In this paper, we describe the implementation of the gem5 models necessary to run and evaluate the RISC- V-based open source TEE, Keystone, and we discuss how this simulation environment opens new avenues for designing and studying these trusted environments. We show that the Keystone simulations on gem5 exhibit similar performance as the previous hardware eval- uations of Keystone. We also describe three simple example use cases (understanding the reaso...
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applicatio...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
The design flow of a digital cryptographic device must take into account the evaluation of its secur...
Cycle-level architectural simulation of Trusted Execution Environ- ments (TEEs) can enable extensive...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
The discovery of hardware vulnerabilities has increasingly become more frequent in recent years. In ...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
This study shows the Gem5 simulator to evaluate the performance of a RISC-V architecture-based proce...
The open-source and community-supported gem5 simulator is one of the most popular tools for computer...
The emergence of the open-source RISC-V ISA empowers developers and engineers, device manufactures, ...
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardwa...
This paper presents TEESEC, a framework for discovering microarchitectural vulnerabilities in the co...
[[abstract]]The customization of architectures in designing the security processor-based systems typ...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applicatio...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
The design flow of a digital cryptographic device must take into account the evaluation of its secur...
Cycle-level architectural simulation of Trusted Execution Environ- ments (TEEs) can enable extensive...
Trusted Execution Environments (TEEs) offer hardware-based isolation, which protects the integrity a...
The growing complexity of modern computing platforms and the need for strong isolation protections a...
The discovery of hardware vulnerabilities has increasingly become more frequent in recent years. In ...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
This study shows the Gem5 simulator to evaluate the performance of a RISC-V architecture-based proce...
The open-source and community-supported gem5 simulator is one of the most popular tools for computer...
The emergence of the open-source RISC-V ISA empowers developers and engineers, device manufactures, ...
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardwa...
This paper presents TEESEC, a framework for discovering microarchitectural vulnerabilities in the co...
[[abstract]]The customization of architectures in designing the security processor-based systems typ...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applicatio...
The problem of secure remote computation has become a serious concern of hardware manufacturers and ...
The design flow of a digital cryptographic device must take into account the evaluation of its secur...