This thesis addresses the need for a new approach to hardware sign-off verification which guarantees the security of processors at the Register Transfer Level (RTL). To this end, we introduce a formal definition of security with respect to microarchitectural vulnerabilities, formulated as a hardware property. We present a formal proof methodology based on Unique Program Execution Checking (UPEC) which can be used to systematically detect all vulnerabilities to transient execution attacks in RTL designs. UPEC does not exploit any a priori knowledge on known attacks and can therefore detect also vulnerabilities based on new, so far unknown, types of channels. This is demonstrated by the new attack scenarios discovered in our experiments with...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Verification for hardware security has become increasingly important in recent years as our infrastr...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
International audienceIn recent years, the disclosure of several significant security vulnerabilitie...
Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing conf...
The increasing number of hardware-based security attacks along with prevalence of embedded systems ...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
This dissertation shows that the bounded property verification of hardware Register Transfer Level (...
International audienceRemote attestation is a protocol to verify that a remote algorithm satisfies s...
Abstract—To address computer security issues, a hardware-based intrusion detection technique is prop...
We introduce a proof-carrying based framework for assessing the trustworthiness of third-party hardw...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
To address computer security issues, a hardware-based intrusion detection technique is proposed. Thi...
Privacy and integrity are important security concerns. These concerns are addressed by controlling i...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Verification for hardware security has become increasingly important in recent years as our infrastr...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
International audienceIn recent years, the disclosure of several significant security vulnerabilitie...
Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing conf...
The increasing number of hardware-based security attacks along with prevalence of embedded systems ...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
This dissertation shows that the bounded property verification of hardware Register Transfer Level (...
International audienceRemote attestation is a protocol to verify that a remote algorithm satisfies s...
Abstract—To address computer security issues, a hardware-based intrusion detection technique is prop...
We introduce a proof-carrying based framework for assessing the trustworthiness of third-party hardw...
Recently, there is a growing interest in the research community to employ tamper-resistant processor...
To address computer security issues, a hardware-based intrusion detection technique is proposed. Thi...
Privacy and integrity are important security concerns. These concerns are addressed by controlling i...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
Abstract—Embedded system security is often compromised when “trusted ” software is subverted to resu...
Verification for hardware security has become increasingly important in recent years as our infrastr...