Stack Redundancy to Thwart Return Oriented Programming in Embedded Systems C Bresch, D Hély, A Papadimitriou, A Michelet-Gignoux, L Amato, T Meyer IEEE Embedded Systems Letters, 2018 | 15 | 2018 |
A red team blue team approach towards a secure processor design with hardware shadow stack C Bresch, A Michelet, L Amato, T Meyer, D Hely Verification and Security Workshop (IVSW), 2017 IEEE 2nd International, 57-62, 2017 | 14 | 2017 |
TrustFlow-X: A Practical Framework for Fine-grained Control-flow Integrity in Critical Systems C Bresch, D Hély, R Lysecky, S Chollet, I Parissis ACM Transactions on Embedded Computing Systems (TECS) 19 (5), 1-26, 2020 | 8 | 2020 |
Towards an inherently secure run-time environment for medical devices C Bresch, S Chollet, D Hély 2018 IEEE International Congress on Internet of Things (ICIOT), 140-147, 2018 | 8 | 2018 |
SecPump: A Connected Open-Source Infusion Pump for Security Research Purposes C Bresch, D Hély, S Chollet, R Lysecky IEEE Embedded Systems Letters 13 (1), 21-24, 2020 | 6 | 2020 |
TrustFlow: A trusted memory support for data flow integrity C Bresch, D Hély, S Chollet, I Parissis 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 308-313, 2019 | 3 | 2019 |
Approches, Stratégies, et Implémentations de Protections Mémoire dans les Systèmes Embarqués Critiques et Contraints C Bresch Université Grenoble Alpes, 2020 | 2 | 2020 |
BackFlow: Backward edge control flow enforcement for low end ARM microcontrollers C Bresch, R Lysecky, D Hély 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2020 | 2 | 2020 |
CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes E Aerabi, D Hély, C Bresch, A Papadimitriou, M Fazeli Cryptography 5 (2), 13, 2021 | | 2021 |