Different layers of the computer system, from the low-level hardware accelerators and networks-on-chip (NoC) in multi-core systems, to the upper-level operating systems and software applications, rely on the sharing of hardware computing resources. Unfortunately such sharing, when not carefully managed, can introduce a host of protection problems and sources of information leakage. We describe a set of methods by which it is possible to systematically scale performance via hardware sharing without exacerbating security properties by being aware of the design and characteristics of individual layers and components. The key to this is efficiently dealing with security vulnerabilities introduced by sharing in terms of time and space through ...
Mobile electronics are undergoing a convergence of what were formerly muliple single application dev...
Modern mobile platforms are embracing not only heterogeneous but also loosely coupled computational ...
In the last decade, multi-threaded systems and resource sharing have brought a number of technologie...
In this thesis we explore methods for exploiting concurrency to improve the security and performance...
We explore how many-core platforms can be used to enhance the security of future systems and to supp...
Despite the variety of choices regarding hardware and software, to date a large number of computer s...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Current trend in automotive industry is moving towards adopting the multicore microcontrollers in El...
Commodity monolithic systems are enormous, having lots of unprotection that leads to attacks. In thi...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Modern systems are mainly composed of IoT devices and Smartphones.Most of these devices use ARM proc...
People store increasing amounts of personal data digitally, from emails to credit cards. Two prevale...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Modern systems are mainly composed of IoT devices and Smartphones. Most of these devices use ARM pro...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Mobile electronics are undergoing a convergence of what were formerly muliple single application dev...
Modern mobile platforms are embracing not only heterogeneous but also loosely coupled computational ...
In the last decade, multi-threaded systems and resource sharing have brought a number of technologie...
In this thesis we explore methods for exploiting concurrency to improve the security and performance...
We explore how many-core platforms can be used to enhance the security of future systems and to supp...
Despite the variety of choices regarding hardware and software, to date a large number of computer s...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
Current trend in automotive industry is moving towards adopting the multicore microcontrollers in El...
Commodity monolithic systems are enormous, having lots of unprotection that leads to attacks. In thi...
Android is widely used for the development and deployment of autonomous and smart systems, including...
Modern systems are mainly composed of IoT devices and Smartphones.Most of these devices use ARM proc...
People store increasing amounts of personal data digitally, from emails to credit cards. Two prevale...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Modern systems are mainly composed of IoT devices and Smartphones. Most of these devices use ARM pro...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Mobile electronics are undergoing a convergence of what were formerly muliple single application dev...
Modern mobile platforms are embracing not only heterogeneous but also loosely coupled computational ...
In the last decade, multi-threaded systems and resource sharing have brought a number of technologie...