[HTML][HTML] Thwarting code-reuse and side-channel attacks in embedded systems

RM Tsoupidi, E Troubitsyna, P Papadimitratos - Computers & Security, 2023 - Elsevier
Embedded devices are increasingly present in our everyday life. They often process critical
information, and hence, rely on cryptographic protocols to achieve security. However …

The teamplay project: Analysing and optimising time, energy, and security for cyber-physical systems

B Rouxel, C Brown, E Ebeid, K Eder… - … , Automation & Test …, 2023 - ieeexplore.ieee.org
Non-functional properties, such as energy, time, and security (ETS) are becoming
increasingly important in Cyber-Physical Systems (CPS) programming. This article …

Towards Specification-Guarded Refactoring

AD Barwell, C Brown, S Sarkar - … on Logic-Based Program Synthesis and …, 2024 - Springer
Refactoring is a common task in writing and maintaining software. Refactoring tools are
available for a wide variety of programming languages, and they are intended to transform …

Towards Specification-Guarded

AD Barwell, C Brown, S Sarkar - Logic-Based Program Synthesis …, 2024 - books.google.com
Refactoring is a common task in writing and maintaining software. Refactoring tools are
available for a wide variety of program-ming languages, and they are intended to transform …

Generating Optimized and Secure Binary Code

RM Tsoupidi - 2023 - diva-portal.org
The increased digitalization of modern societies has resulted in a proliferation of a broad
spectrum of embedded devices, ranging from personal smartphones and heart pacemakers …

Interleaved Ladders: One more Step on Generalizing the Montgomery Ladder

Y Marquer, T Richmond, P Véron - 2024 - hal.science
Iterative conditional branchings appear in various sensitive algorithms, like the modular
exponentiation in the RSA cryptosystem or the scalar multiplication in elliptic-curve …