The increasing number of hardware-based security attacks along with prevalence of embedded systems in critical applications necessitate robust methods for designing digital circuits with regards to security expectations. However, state of the art secure hardware design practices are mainly based on manual code review and security audit which do not provide formal guarantees of security despite being time-consuming and cumbersome. Thus, a systematic approach for identifying and fixing security vulnerabilities in hardware designs is required.Information flow analysis presents a coherent and systematic method for evaluation of broad types of security policies. Information flow models capture how security-critical data propagates throug...
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementin...
Abstract—Modern embedded computing systems such as med-ical devices, airplanes, and automobiles cont...
Modern embedded computing systems such as medical devices, airplanes, and automobiles continue to do...
Secure hardware design is a challenging task that goes far beyond ensuring functional correctness. I...
Computers are being placed in charge of the systems and devices we trust with our safety and securit...
This thesis presents an architectural solution that provides secure and reliable execution of an app...
The verification of information flow properties of security devices is difficult because it involves...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
Hardware has become an increasingly attractive target for attackers, yet we still largely lack tools...
Hardware intellectual property (IP) cores from untrusted vendors are widely used, raising security c...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
Content file updated by author on 15 January 2015.Timing channels pose a real security risk, but met...
This book provides a comprehensive introduction to hardware security, from specification to implemen...
Security is a prime concern in the design of a wide variety of embedded systems and security process...
Information security can be compromised by leakage via low-level hardware features. One recently pro...
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementin...
Abstract—Modern embedded computing systems such as med-ical devices, airplanes, and automobiles cont...
Modern embedded computing systems such as medical devices, airplanes, and automobiles continue to do...
Secure hardware design is a challenging task that goes far beyond ensuring functional correctness. I...
Computers are being placed in charge of the systems and devices we trust with our safety and securit...
This thesis presents an architectural solution that provides secure and reliable execution of an app...
The verification of information flow properties of security devices is difficult because it involves...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
Hardware has become an increasingly attractive target for attackers, yet we still largely lack tools...
Hardware intellectual property (IP) cores from untrusted vendors are widely used, raising security c...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
Content file updated by author on 15 January 2015.Timing channels pose a real security risk, but met...
This book provides a comprehensive introduction to hardware security, from specification to implemen...
Security is a prime concern in the design of a wide variety of embedded systems and security process...
Information security can be compromised by leakage via low-level hardware features. One recently pro...
Hardware-based mechanisms for software isolation are becoming increasingly popular, but implementin...
Abstract—Modern embedded computing systems such as med-ical devices, airplanes, and automobiles cont...
Modern embedded computing systems such as medical devices, airplanes, and automobiles continue to do...