International audienceSecure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. Moreover, they require embedded data management techniques. However, secure chips have severe hardware constraints, which make traditional database techniques irrelevant. The main problem faced by secure chip DBMS designers is to be able to assess various design choices and trade-offs for different applications. Our solution is to use a benchmark for secure chip DBMS in order to 1) compare different database techniques, 2) predict the limits of on-chip applications, and 3) provide codesign hints. In this paper, we propose Data management in Secure Chip (DiSC), a benchmark that reache...
Modern computer systems have critical security problems because of two wrong assumptions security sy...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
The design of very small databases for smart cards and for portable embedded systems is deeply const...
International audienceSecure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ub...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
Smart card is today the most widespread secured portable computing device. Four years ago, we addres...
Abstract. Smartcards are themost secure portable computing device today.They have been used successf...
Among other threats, secure components are subjected to physical attacks whose aim is to recover the...
International audienceAmong other threats, secure components are subjected tophysical attacks whose ...
SMaRT is a 16-bit 2.5-address RISC-type single-cycle processor, which was recently designed and succ...
International audienceIn this paper, we describe the structure of a FPGAsmart card emulator. The aim...
Smart cards are widely known for their tamper resistance, but only contain a small amount of memory....
Modern computer systems have critical security problems because of two wrong assumptions security sy...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
The design of very small databases for smart cards and for portable embedded systems is deeply const...
International audienceSecure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ub...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
International audienceSecure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous...
Smart card is today the most widespread secured portable computing device. Four years ago, we addres...
Abstract. Smartcards are themost secure portable computing device today.They have been used successf...
Among other threats, secure components are subjected to physical attacks whose aim is to recover the...
International audienceAmong other threats, secure components are subjected tophysical attacks whose ...
SMaRT is a 16-bit 2.5-address RISC-type single-cycle processor, which was recently designed and succ...
International audienceIn this paper, we describe the structure of a FPGAsmart card emulator. The aim...
Smart cards are widely known for their tamper resistance, but only contain a small amount of memory....
Modern computer systems have critical security problems because of two wrong assumptions security sy...
This master thesis developed and tested the idea that smart cards are able to help mitigate security...
The design of very small databases for smart cards and for portable embedded systems is deeply const...