International audienceComputing devices became part of our daily world. But being physically accessible they are exposed to a very large panel of physical attacks, which are most of the time underestimated. These systems must include protections against these attacks in order to keep user data secret and safe. In this work, we argue that addressing the security requirements of embedded processors with independent countermeasures is not the most efficient strategy and may introduce security flaws in the process. Instead, we suggest a more monolithic approach to security design. Following this idea, we propose a new efficient and flexible memory encryption & authentication mechanism called CONFIDAENT, that can protect code and data in embedde...
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse a...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
A processor plays an important role in the security of an entire embedded system. There are two reas...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applicatio...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse a...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
A processor plays an important role in the security of an entire embedded system. There are two reas...
Embedded systems have become pervasive and are built into a vast number of devices such as sensors, ...
Control-Flow Integrity (CFI) is a popular technique to de- fend against State-of-the-Art exploits, b...
Attacks on real-time embedded systems can endanger lives and critical infrastructure. Despite this, ...
With more applications being deployed on embedded platforms, software protection becomes increasingl...
International audienceIn this paper we present a hardware based solution to verify simultaneously Co...
Embedded systems are being adopted in applications requiring mixed levels of criticality and securit...
Control-flow integrity (CFI) is a general defense against code-reuse exploits that currently constit...
The trustworthiness of microcontroller-class devices is crucial for a growing spectrum of applicatio...
Memory corruption vulnerabilities, mainly present in C and C++ applications, may enable attackers to...
Control-flow integrity (CFI) is considered as a general and promising method to prevent code-reuse a...
The pervasive presence of smart objects in almost every corner of our everyday life urges the securi...
International audienceCyber-attacks are widely known to be a major threat on computing devi...