International audienceIn recent years, the disclosure of several significant security vulnerabilities has revealed the trust put in some presumed security properties of commonplace hardware to be misplaced. We propose to design hardware systems with security mechanisms, together with a formal statement of the security properties obtained, and a machine-checked proof that the hardware security mechanisms indeed implement the sought-for security property. Formally proving security properties about hardware systems might seem prohibitively complex and expensive. In this paper, we tackle this concern by designing a realistic and accessible methodology on top of the Kôika Hardware Description Language for specifying and proving security properti...
The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised securi...
This book provides a comprehensive introduction to hardware security, from specification to implemen...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
We introduce a proof-carrying based framework for assessing the trustworthiness of third-party hardw...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
This thesis addresses the need for a new approach to hardware sign-off verification which guarantees...
Privacy and integrity are important security concerns. These concerns are addressed by controlling i...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
The increasing number of hardware-based security attacks along with prevalence of embedded systems ...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
We present a logic for reasoning about properties of secure systems. The logic is built around a con...
Processing and storage of confidential or critical information is an every day occurrence in computi...
Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing conf...
This electronic version was submitted by the student author. The certified thesis is available in th...
The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised securi...
This book provides a comprehensive introduction to hardware security, from specification to implemen...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...
We introduce a proof-carrying based framework for assessing the trustworthiness of third-party hardw...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
This thesis addresses the need for a new approach to hardware sign-off verification which guarantees...
Privacy and integrity are important security concerns. These concerns are addressed by controlling i...
For decades, software security has been the primary focus in securing our computing platforms. Hardw...
The increasing number of hardware-based security attacks along with prevalence of embedded systems ...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
We present a logic for reasoning about properties of secure systems. The logic is built around a con...
Processing and storage of confidential or critical information is an every day occurrence in computi...
Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing conf...
This electronic version was submitted by the student author. The certified thesis is available in th...
The wide usage of hardware intellectual property (IP) cores from untrusted vendors has raised securi...
This book provides a comprehensive introduction to hardware security, from specification to implemen...
Vulnerabilities in computer systems arise in part due to programmer's logical errors, and in part al...