Today\u27s microprocessors often rely on microcode updates to address issues such as security or functional patches. Unfortunately, microcode update flexibility opens up new attack vectors through malicious microcode alterations. Such attacks share many features with hardware Trojans and have similar devastating consequences for system security. However, due to microcode\u27s opaque nature, little is known in the open literature about the capabilities and limitations of microcode Trojans. We introduce the design of a microcoded RISC-V processor architecture together with a microcode development and evaluation environment. Even though microcode typically has almost complete control of the processor hardware, the design of meaningful microco...
Microcontrollers and integrated circuits in general have become ubiquitous in the world today. All a...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities,...
abstract: Modern computer processors contain an embedded firmware known as microcode that controls d...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Microprocessors such as those found in PCs and smartphones are complex in their design and nature. I...
In recent years advancements have been made in computer hardware security to circumnavigate the thre...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Often overlooked, microcontrollers are the central component in embedded systems which drive the evo...
Microcontrollers and integrated circuits in general have become ubiquitous in the world today. All a...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities,...
abstract: Modern computer processors contain an embedded firmware known as microcode that controls d...
To achieve ever-higher performances, architectural optimization mechanisms have been embedded in hig...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
Microprocessors such as those found in PCs and smartphones are complex in their design and nature. I...
In recent years advancements have been made in computer hardware security to circumnavigate the thre...
Embedded system applications in diverse sectors such as transportation, healthcare, homeautomation, ...
The continuous quest for performance pushed processors to incorporate elements such as multiple core...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Fault injection attacks represent an effective threat to embedded systems. Recently, Laurent et al. ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Security and reliability in processor based systems are concerns requiring adroit solutions. Securit...
Often overlooked, microcontrollers are the central component in embedded systems which drive the evo...
Microcontrollers and integrated circuits in general have become ubiquitous in the world today. All a...
International audienceFault injection attacks represent an effective threatto embedded systems. Rece...
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities,...