{SoK}:{Where's} the {“up”?}! A Comprehensive (bottom-up) Study on the Security of Arm {Cortex-M} Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - 18th USeNIX WOOT …, 2024 - usenix.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internet-of-Things devices. Despite the widespread usage, there has been …

Code to Qed, the Project Manager's Guide to Proof Engineering

N Dejon, C Gaber, G Grimaud, N Jomaa - ACM Transactions on …, 2024 - dl.acm.org
Despite growing efforts and encouraging successes in recent decades, fully formally verified
projects are still rare in the industrial landscape. The industry often lacks the tools and …

Pip-MPU: Formal verification of an MPU-based separation kernel for constrained devices

N Dejon, C Gaber, G Grimaud - International Journal of Embedded …, 2023 - hal.science
Pip-MPU is a minimalist separation kernel for constrained devices (scarce memory and
power resources). In this work, we demonstrate high-assurance of Pip-MPU's isolation …

Design of a secure kernel for constrained devices

N Dejon - 2022 - theses.hal.science
This thesis invests the field of cybersecurity for small computer systems (embedded
systems/connected objects/low-end devices, of type microcontroller) and more precisely …

Perspectives on security kernels for IoT

N Dejon, C Gaber, G Grimaud - RESSI (Rendez-Vous de la Recherche …, 2020 - hal.science
IoT market's growth surge encouraged developers to focus on fast delivery rather than
security resulting in several major attacks. Efforts to provide secure-by-design applications …