Hardware mechanisms for memory authentication: A survey of existing techniques and engines

R Elbaz, D Champagne, C Gebotys, RB Lee… - … Science IV: Special …, 2009 - Springer
Trusted computing platforms aim to provide trust in computations performed by sensitive
applications. Verifying the integrity of memory contents is a crucial security service that these …

[KİTAP][B] On-chip communication architectures: system on chip interconnect

S Pasricha, N Dutt - 2010 - books.google.com
Over the past decade, system-on-chip (SoC) designs have evolved to address the ever
increasing complexity of applications, fueled by the era of digital convergence …

NOC-centric security of reconfigurable SoC

JP Diguet, S Evain, R Vaslin… - … on Networks-on-Chip …, 2007 - ieeexplore.ieee.org
This paper presents a first solution for NoC-based communication security. Our proposal is
based on simple network interfaces implementing distributed security rule checking and a …

Tec-tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks

R Elbaz, D Champagne, RB Lee, L Torres… - … and Embedded Systems, 2007 - Springer
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory
integrity. With a trusted System-on-Chip, the existing countermeasures against replay …

[PDF][PDF] Protecting data in-use from firmware and physical attacks

S Weis - Black Hat, 2014 - blackhat.com
Defending computers from unauthorized physical access, malicious hardware devices, or
other low-level attacks has proven extremely challenging. The risks from these attacks are …

Minimal kernel: an operating system architecture for {TEE} to resist board level physical attacks

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - … International Symposium on …, 2019 - usenix.org
ARM specifications recommend that software residing in TEE's (Trusted Execution
Environment) secure world should be located in the on-chip memory to prevent board level …

Towards fast hardware memory integrity checking with skewed merkle trees

J Szefer, S Biedermann - Proceedings of the Third Workshop on …, 2014 - dl.acm.org
Protection of a computer's memory's integrity is crucial in situations where physical attacks
on the computer system are a threat. Such attacks can happen during physical break in into …

Protection of heterogeneous architectures on FPGAs: An approach based on hardware firewalls

P Cotret, G Gogniat, MJS Flórez - Microprocessors and Microsystems, 2016 - Elsevier
Embedded systems are parts of our daily life and used in many fields. They can be found in
smartphones or in modern cars including GPS, light/rain sensors and other electronic …

Configurable memory security in embedded systems

J Crenne, R Vaslin, G Gogniat, JP Diguet… - ACM Transactions on …, 2013 - dl.acm.org
System security is an increasingly important design criterion for many embedded systems.
These systems are often portable and more easily attacked than traditional desktop and …

Secbus, a software/hardware architecture for securing external memories

J Brunel, R Pacalet, S Ouaarab… - 2014 2nd IEEE …, 2014 - ieeexplore.ieee.org
Embedded systems are ubiquitous nowadays. In many cases, they manipulate sensitive
applications or data and may be the target of logical or physical attacks. On systems that …