Security features of modern (SoC) FPAGs permit to protect the confidentiality of hard- and software IP when the devices are powered off as well as to validate the authenticity of IP when being loaded at startup. However, these approaches are insufficient since attackers with physical access can also perform attacks during runtime, demanding for additional security measures. In particular, RAM used by modern (SoC) FPGAs is under threat since RAM stores software IP as well as all kinds of other sensitive information during runtime. To solve this issue, we present an open-source framework for building transparent RAM encryption and authentication pipelines, suitable for both FPGAs and ASICs. The framework supports various ciphers and modes of...
Abstract Authenticated encryption has long been a vital operation in cryptography by its ability to ...
International audienceComputing devices became part of our daily world. But being physically accessi...
Abstract - A multitude of privacy enhancing technologies have been presented recently to solve priva...
Field Programmable Gate Arrays (FPGAs) are reconfigurable devices which have emerged as an interesti...
System-on-Chips which include FPGAs are important platforms for critical applications since they pro...
Recently there is a growing interest in both the architecture and the security community to create a...
Abstract. Encryption of volatile FPGA bitstreams provides confiden-tiality to the design but does no...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Abstract — One of the key problems facing the computer industry today involves ensuring the integrit...
Les systèmes de communication ont besoin d'accéder, stocker, manipuler, ou de communiquer des inform...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
This dissertation outlines new approaches for test and security in a System-on-Chip (SoC) environmen...
Secure processors have become increasingly important for trustworthy computing as security breaches ...
Power consumption and electromagnetic emissions analyses are well established attack avenues for sec...
Abstract Authenticated encryption has long been a vital operation in cryptography by its ability to ...
International audienceComputing devices became part of our daily world. But being physically accessi...
Abstract - A multitude of privacy enhancing technologies have been presented recently to solve priva...
Field Programmable Gate Arrays (FPGAs) are reconfigurable devices which have emerged as an interesti...
System-on-Chips which include FPGAs are important platforms for critical applications since they pro...
Recently there is a growing interest in both the architecture and the security community to create a...
Abstract. Encryption of volatile FPGA bitstreams provides confiden-tiality to the design but does no...
textThis thesis presents an analysis of the implementation feasibility of RAM authentication and enc...
Abstract — One of the key problems facing the computer industry today involves ensuring the integrit...
Les systèmes de communication ont besoin d'accéder, stocker, manipuler, ou de communiquer des inform...
Hardware-assisted security aims at protecting computing systems against software-based attacks that ...
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers...
This dissertation outlines new approaches for test and security in a System-on-Chip (SoC) environmen...
Secure processors have become increasingly important for trustworthy computing as security breaches ...
Power consumption and electromagnetic emissions analyses are well established attack avenues for sec...
Abstract Authenticated encryption has long been a vital operation in cryptography by its ability to ...
International audienceComputing devices became part of our daily world. But being physically accessi...
Abstract - A multitude of privacy enhancing technologies have been presented recently to solve priva...