Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, e.g., allowing attackers to gather keys to financial accounts and personal data. Although on-chip bus encryption hardware can solve this problem, it requires hardware redesign or increases processor cost. Application redesign to prevent sensitive data from ap-pearing on the processor–memory bus is extremely difficult. We propose and evaluate a processor–memory bus encryption technique for embedded systems that requires no changes to applications or hardware. This technique exploits cache locking or scratchpad memory, features present in many embedded processors, permitting the operating system (OS) virtual memory infrastructure to automatical...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Submitted on behalf of EDAA (http://www.edaa.com/)International audienceThe widening spectrum of app...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
The address sequence on the processor-memory bus can reveal abundant information about the control o...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
Over the last decade, advancements in performance and efficiency of portable computing devices have ...
Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.This ...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
Software integrity and confidentiality play a central role in making embedded computer systems resil...
Submitted on behalf of EDAA (http://www.edaa.com/)International audienceThe widening spectrum of app...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Abstract. A critical component in the design of secure processors is memory encryption which provide...
Embedded systems are ubiquitous and widely used in a large spectrum of applications. Sensitive and s...
The address sequence on the processor-memory bus can reveal abundant information about the control o...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
International audienceOver the last 30 years, a number of secure processor architectures have been p...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Memory authentication is gaining importance in embedded systems as off-chip memories are prone to sp...
Over the last 30 years, a number of secure processor architectures have been proposed to protect sof...
Over the last decade, advancements in performance and efficiency of portable computing devices have ...
Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.This ...
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms...
Copyright © 2019 Inderscience Enterprises Ltd. The architecture of an encrypted high-performance mic...
Software integrity and confidentiality play a central role in making embedded computer systems resil...