International audienceNowadays, many services and applications need to be secured. In this paper we present the design and the initial development of a new security-oriented open hardware and software platform easy to be integrated and capable of hiding significant complexity behind a set of simple high-level APIs. This SoC platform is called SEcube™ (Secure Environment cube). It is a single-chip design that embeds three main cores: a highly powerful processor, a Common Criteria certified smartcard, and a flexible FPGA. The SEcube™ platform provides several functional entry levels, ranging from the hardware to software APIs amenable to become service-ready in a near future. This way, developers who do not feel comfortable on security aspect...
Part 1: Full PapersInternational audienceThe development and evolution of secure open architecture s...
Under this project SETECS performed research, created the design, and the initial prototype of three...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Current trends for ubiquitous data usage have made information security as a mandatory component of ...
Secure processors have become increasingly important for trustworthy computing as security breaches ...
We propose to apply the open-source software development model to the domain of hardware/software co...
The Sancus security architecture for networked embedded devices was proposed in 2013 at the USENIX S...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
This is the factsheet of the SecOPERA project. About SecOPERA: SecOPERA will provide a one-stop hub...
This paper describes the development process of a secured Internet of Things (IoT) system. Firstly, ...
Software-defined networking (SDN) is a representative next generation network architecture, which al...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
At present, the security critical operations of terminal devices are often being executed in the ope...
© 2004-2012 IEEE. Due to the requirements of the Internet-of-Things, modern embedded systems have be...
Abstract. We describe the design and implementation of a public-key platform, secFleck, based on a c...
Part 1: Full PapersInternational audienceThe development and evolution of secure open architecture s...
Under this project SETECS performed research, created the design, and the initial prototype of three...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...
Current trends for ubiquitous data usage have made information security as a mandatory component of ...
Secure processors have become increasingly important for trustworthy computing as security breaches ...
We propose to apply the open-source software development model to the domain of hardware/software co...
The Sancus security architecture for networked embedded devices was proposed in 2013 at the USENIX S...
The extremely high cost of custom ASIC fabrication makes FPGAs an attractive alternative for deploym...
This is the factsheet of the SecOPERA project. About SecOPERA: SecOPERA will provide a one-stop hub...
This paper describes the development process of a secured Internet of Things (IoT) system. Firstly, ...
Software-defined networking (SDN) is a representative next generation network architecture, which al...
The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in ...
At present, the security critical operations of terminal devices are often being executed in the ope...
© 2004-2012 IEEE. Due to the requirements of the Internet-of-Things, modern embedded systems have be...
Abstract. We describe the design and implementation of a public-key platform, secFleck, based on a c...
Part 1: Full PapersInternational audienceThe development and evolution of secure open architecture s...
Under this project SETECS performed research, created the design, and the initial prototype of three...
Securely storing and using credentials is critical for ensuring the security of many modern distribu...