The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applications involving embedded and industrial systems, ranging from robotics to avionics, from sensor networks to health. In that respect, integrating security-aware processes into design methodologies can lead to products that are more resilient to attacks and provide native protection mechanisms capable of mitigating system vulnerabilities, hence reducing damages and recovery costs. Based on the increasing interest in open-source hardware and relying on the non-proprietary RISC-V specification, in this work we aim to explore architectural extensions serving as a baseline for establishing a Trusted Execution Environment (TEE) in microcontroller-class...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
The migration of the computation from the cloud into edge devices, i.e., Internet-of-Things (IoTs) d...
Part 2: Secure Resource Sharing and Access ControlInternational audienceLow-end embedded devices and...
© IFIP International Federation for Information Processing 2015. Low-end embedded devices and the In...
International audienceComputing devices became part of our daily world. But being physically accessi...
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardwa...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
A processor plays an important role in the security of an entire embedded system. There are two reas...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Embedded systems are increasingly pervasive, interdependent and in many cases critical to our every ...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...
The migration of the computation from the cloud into edge devices, i.e., Internet-of-Things (IoTs) d...
Part 2: Secure Resource Sharing and Access ControlInternational audienceLow-end embedded devices and...
© IFIP International Federation for Information Processing 2015. Low-end embedded devices and the In...
International audienceComputing devices became part of our daily world. But being physically accessi...
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardwa...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
A processor plays an important role in the security of an entire embedded system. There are two reas...
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virt...
Embedded systems are increasingly pervasive, interdependent and in many cases critical to our every ...
We are currently living in the era in which through the ever-increasing dissemination of inter-conne...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
This talk is inspired by a number of presentations I followed in previous years at QA&Test: I believ...
Malware often injects and executes new code to infect hypervisors, OSs and applications on a wide ra...
International audienceThis paper proposes a complete hardware solution for embedded systems that ful...
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large-sc...