[HTML][HTML] Thwarting code-reuse and side-channel attacks in embedded systems
Embedded devices are increasingly present in our everyday life. They often process critical
information, and hence, rely on cryptographic protocols to achieve security. However …
information, and hence, rely on cryptographic protocols to achieve security. However …
The teamplay project: Analysing and optimising time, energy, and security for cyber-physical systems
Non-functional properties, such as energy, time, and security (ETS) are becoming
increasingly important in Cyber-Physical Systems (CPS) programming. This article …
increasingly important in Cyber-Physical Systems (CPS) programming. This article …
Towards Specification-Guarded Refactoring
Refactoring is a common task in writing and maintaining software. Refactoring tools are
available for a wide variety of programming languages, and they are intended to transform …
available for a wide variety of programming languages, and they are intended to transform …
Towards Specification-Guarded
AD Barwell, C Brown, S Sarkar - Logic-Based Program Synthesis …, 2024 - books.google.com
Refactoring is a common task in writing and maintaining software. Refactoring tools are
available for a wide variety of program-ming languages, and they are intended to transform …
available for a wide variety of program-ming languages, and they are intended to transform …
Generating Optimized and Secure Binary Code
RM Tsoupidi - 2023 - diva-portal.org
The increased digitalization of modern societies has resulted in a proliferation of a broad
spectrum of embedded devices, ranging from personal smartphones and heart pacemakers …
spectrum of embedded devices, ranging from personal smartphones and heart pacemakers …
Interleaved Ladders: One more Step on Generalizing the Montgomery Ladder
Iterative conditional branchings appear in various sensitive algorithms, like the modular
exponentiation in the RSA cryptosystem or the scalar multiplication in elliptic-curve …
exponentiation in the RSA cryptosystem or the scalar multiplication in elliptic-curve …