Using the challenge of securing cars as a motivational example, we give an overview of the different options to create assurance via deploying security primitives such as e.g. keys as distributed system, ranging from process isolation, via dedicated coprocessors, dedicated cores to dedicated chips. The presentation includes an example where the PikeOS MILS separation kernel used keys stored in a dedicated secure environment
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
As software security expert Bruce Schneier argues, the pervasive vulnerability of embedded systems t...
We introduce SysML-Sec, a SysML-based Model-Driven Engineering environment aimed at foster-ing the c...
Increasingly, software (SW) in embedded systems can be updated due to the rising share of flashable ...
International audienceSecurity issues become more and more mportant during the development of mobile...
Cyber-security attacks can have a critical impact on embedded systems. They may access secret inform...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
Thesis (Ph.D.)--University of Washington, 2014Today, our life is pervaded by computer systems embedd...
This thesis focuses on securing different attack surfaces of embedded systems while meeting the stri...
International audienceThe development of embedded software for automotive applications has seen dram...
Embedded systems have been almost invisibly pervading our daily lives for several decades. They faci...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Abstract The gmwing number of instances of breaches in information security in the last few years ha...
International audience. In recent years, we have observed a shift and a blurring of boundaries betwe...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
As software security expert Bruce Schneier argues, the pervasive vulnerability of embedded systems t...
We introduce SysML-Sec, a SysML-based Model-Driven Engineering environment aimed at foster-ing the c...
Increasingly, software (SW) in embedded systems can be updated due to the rising share of flashable ...
International audienceSecurity issues become more and more mportant during the development of mobile...
Cyber-security attacks can have a critical impact on embedded systems. They may access secret inform...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
Nowadays embedded systems in many application areas such as automotive, medical and industrial autom...
Thesis (Ph.D.)--University of Washington, 2014Today, our life is pervaded by computer systems embedd...
This thesis focuses on securing different attack surfaces of embedded systems while meeting the stri...
International audienceThe development of embedded software for automotive applications has seen dram...
Embedded systems have been almost invisibly pervading our daily lives for several decades. They faci...
Hardware-assisted security solutions, and the isolation guarantees they provide, constitute the basi...
Abstract The gmwing number of instances of breaches in information security in the last few years ha...
International audience. In recent years, we have observed a shift and a blurring of boundaries betwe...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
As software security expert Bruce Schneier argues, the pervasive vulnerability of embedded systems t...
We introduce SysML-Sec, a SysML-based Model-Driven Engineering environment aimed at foster-ing the c...