Processors are electronic components omnipresent in our daily lives. They are in our smartphones, computers, web servers etc. Processors are responsible for executing the different operations and then have access to system data. For many years, studies have shown the isolation issue between users of the same processor. By executing code, it becomes possible for an attacker to influence the execution or recover information from another user. This threat has grown until the discovery in 2018 of Spectre and Meltdown, complex attacks targeting the most modern processors. This thesis aims to rethink processor designs to efficiently implement security constraints. It particularly focuses on the implementation of protections against timing attacks...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...
This PhD researches a global methodology enabling to improve the dependability and security level ag...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...
Processors are electronic components omnipresent in our daily lives. They are in our smartphones, co...
Les processeurs sont des composants électroniques omniprésents dans notre quotidien. On en retrouve ...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
Embedded processors can be subject to physical attacks due to some proximity between an attacker and...
Un nombre important et en constante augmentation de systèmes numériques nous entoure. Tablettes, sma...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
L'isolation des processus est la contrainte de sécurité la plus importante imposée par les systèmes ...
Les processeurs embarqués peuvent faire l’objet d’attaques physiques en raison de la proximité entre...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...
This PhD researches a global methodology enabling to improve the dependability and security level ag...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...
Processors are electronic components omnipresent in our daily lives. They are in our smartphones, co...
Les processeurs sont des composants électroniques omniprésents dans notre quotidien. On en retrouve ...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
Embedded processors can be subject to physical attacks due to some proximity between an attacker and...
Un nombre important et en constante augmentation de systèmes numériques nous entoure. Tablettes, sma...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Embedded processors are today ubiquitous, dozen of them compose and orchestrate every technology sur...
L'isolation des processus est la contrainte de sécurité la plus importante imposée par les systèmes ...
Les processeurs embarqués peuvent faire l’objet d’attaques physiques en raison de la proximité entre...
Les attaques par canaux auxiliaires telles que l'analyse différentielle de la consommation de couran...
Les systèmes embarqués sont de plus en plus présents dans notre quotidien (e.g. cartes de crédits, s...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...
This PhD researches a global methodology enabling to improve the dependability and security level ag...
National audienceIn recent years, computer systems have evolved quickly. This evolution concerns dif...