International audienceRecent works have highlighted the vulnerability of System-on-a-Chip (SoC) platforms against frequency-based covert channels. An attacker might be able to leverage vulnerabilities in the SoC's firmware, the operating system, or the design tools to gain access to the underlying hardware and perform frequency modulation. Given the diversity of threats and the constant evolution of SoC platforms, it is not practical to study this attack model using physical devices. To address this issue, we propose to employ advanced simulation techniques. Our work targets heterogeneous SoCs which feature a processor system based on the ARM architecture plus an FPGA. We employ the full system simulation of gem5, which allows us to create ...
Given the need for efficient high-performance computing, computer architectures combining CPUs, GPUs...
ABSTRACTFingerprinting SoC FPGA via Measuring Communication LinkOver the past few decades, Field Pro...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
International audienceSide channel attacks (SCA) have the potential of disrupting the trust of the u...
International audienceThanks to their performance and flexibility, FPGAs are increasingly adopted fo...
In the field of System on Chip (SoC), the digital security community has mainly focused on software ...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
In this thesis we evaluate software-based hardware attacks, a novel attack family that targets conne...
International audienceAs processors become more and more complex due to performance optimizations an...
L'intérêt de la communauté de la sécurité numérique dans le domaine des Systems on Chip (SoC) s'est ...
Whether through smartphones, portable game consoles, or high performances computing, Systems-on-Chip...
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits that can be...
Increased complexity in modern embedded systems has presented various important challenges with rega...
International audienceToday, most embedded systems use Dynamic Voltage and Frequency Scaling (DVFS) ...
Given the need for efficient high-performance computing, computer architectures combining CPUs, GPUs...
ABSTRACTFingerprinting SoC FPGA via Measuring Communication LinkOver the past few decades, Field Pro...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...
International audienceThe processors (CPUs) embedded in System on Chip (SoC) have to face recent att...
International audienceSide channel attacks (SCA) have the potential of disrupting the trust of the u...
International audienceThanks to their performance and flexibility, FPGAs are increasingly adopted fo...
In the field of System on Chip (SoC), the digital security community has mainly focused on software ...
Embedded systems are spreading massively in critical infrastructures (industry 4.0, smart city, tran...
In this thesis we evaluate software-based hardware attacks, a novel attack family that targets conne...
International audienceAs processors become more and more complex due to performance optimizations an...
L'intérêt de la communauté de la sécurité numérique dans le domaine des Systems on Chip (SoC) s'est ...
Whether through smartphones, portable game consoles, or high performances computing, Systems-on-Chip...
Field-Programmable Gate Arrays (FPGAs) are versatile, reconfigurable integrated circuits that can be...
Increased complexity in modern embedded systems has presented various important challenges with rega...
International audienceToday, most embedded systems use Dynamic Voltage and Frequency Scaling (DVFS) ...
Given the need for efficient high-performance computing, computer architectures combining CPUs, GPUs...
ABSTRACTFingerprinting SoC FPGA via Measuring Communication LinkOver the past few decades, Field Pro...
Cryptography is a mean to defend against potential attackers, notably to protect confidentiality, in...