loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Damien Couroussé 1 ; Bruno Robisson 2 ; Jean-Louis Lanet 3 ; Thierno Barry 1 ; Hassan Noura 1 ; Philippe Jaillon 4 and Philippe Lalevée 4

Affiliations: 1 Univ. Grenoble Alpes, CEA and LIST, France ; 2 Commissariat à l’Énergie Atomique et aux Énergies Alternatives (CEA), France ; 3 University of Limoges, France ; 4 École Nationale Suprieure des Mines de Saint-Etienne (ENSM.SE), France

ISBN: 978-989-758-045-1

Keyword(s): Code Polymorphism, Runtime Code Generation, Physical Attacks, Embedded Devices.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Information and Systems Security ; Insider Threats and Countermeasures ; Secure Software Development Methodologies ; Security and Privacy in Pervasive/Ubiquitous Computing ; Security Engineering ; Security in Information Systems ; Software Security

Abstract: In this paper, we advocate the use of code polymorphism as an efficient means to improve security at several levels in electronic devices. We analyse the threats that polymorphism could help thwart, and present the solution that we plan to demonstrate in the scope of a collaborative research project called COGITO. We expect our solution to be effective to improve security, to comply with the computing and memory constraints of embedded devices, and to be easily generalisable to a large set of embedded computing platforms.

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.221.75.68

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Couroussé D., Robisson B., Lanet J., Barry T., Noura H., Jaillon P. and Lalevée P. (2014). COGITO: Code Polymorphism to Secure Devices.In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 451-456. DOI: 10.5220/0005113704510456

@conference{secrypt14,
author={Damien Couroussé and Bruno Robisson and Jean-Louis Lanet and Thierno Barry and Hassan Noura and Philippe Jaillon and Philippe Lalevée},
title={COGITO: Code Polymorphism to Secure Devices},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={451-456},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005113704510456},
isbn={978-989-758-045-1},
}

TY - CONF

JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - COGITO: Code Polymorphism to Secure Devices
SN - 978-989-758-045-1
AU - Couroussé D.
AU - Robisson B.
AU - Lanet J.
AU - Barry T.
AU - Noura H.
AU - Jaillon P.
AU - Lalevée P.
PY - 2014
SP - 451
EP - 456
DO - 10.5220/0005113704510456

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.