Locked History Actions

Diff for "Presentation"

Differences between revisions 1 and 10 (spanning 9 versions)
Revision 1 as of 2016-01-27 12:16:52
Size: 376
Editor: celinux222
Comment:
Revision 10 as of 2016-04-21 20:18:24
Size: 1423
Editor: bny92-5-82-232-56-37
Comment:
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
#acl Known:read,write,revert All:read #acl UserGroup:read,write,revert All:read
Line 4: Line 4:
This project is funded by the CHIST-ERA and coordinated by ANR This [[http://www.chistera.eu/|CHIST-ERA]] project is coordinated by [[http://www.agence-nationale-recherche.fr//|ANR]]
Line 6: Line 6:
{{attachment:logo_ANR.gif||height="104px",width="239px"}}    {{attachment:logo_anr.png||height="104px",width="239px"}}
  {{attachment:logo_chistera.gif}}
Line 14: Line 15:
== Summary ==
Line 15: Line 17:
=== Summary === SECODE aims at specifying and designing error correction codes suitable for an efficient protection of sensitive information in the context of Internet of Things (IoT) and connected objects. Such codes mitigate passive attacks, like memory disclosure, and active attacks, like stack smashing. The innovation of this project is to leverage these codes for protecting against both cyber and physical attacks. The main advantage is a 360° coverage of attacks of the connected embedded systems, which is considered as a smart connected device and also a physical device. The outcome of the project is first a method to generate and execute cyber-resilient software, and second to protect data and its manipulation from physical threats like side-channel attacks. Theses results are demonstrated by using a smart sensor application with hardened embedded firmware and tamper-proof hardware platform.


== SECODE POSTER ==

{{attachment:poster.png}}

Welcome to the SECODE project website !

This CHIST-ERA project is coordinated by ANR

logo_anr.png

logo_chistera.gif

What is SECODE ?

SECODE stands for Security evaluation of Physically Attacked Cryptoprocessors in Embedded Systems.

Summary

SECODE aims at specifying and designing error correction codes suitable for an efficient protection of sensitive information in the context of Internet of Things (IoT) and connected objects. Such codes mitigate passive attacks, like memory disclosure, and active attacks, like stack smashing. The innovation of this project is to leverage these codes for protecting against both cyber and physical attacks. The main advantage is a 360° coverage of attacks of the connected embedded systems, which is considered as a smart connected device and also a physical device. The outcome of the project is first a method to generate and execute cyber-resilient software, and second to protect data and its manipulation from physical threats like side-channel attacks. Theses results are demonstrated by using a smart sensor application with hardened embedded firmware and tamper-proof hardware platform.

SECODE POSTER

poster.png