Locked History Actions

Diff for "Presentation"

Differences between revisions 4 and 5
Revision 4 as of 2016-01-27 12:35:10
Size: 491
Editor: celinux222
Comment:
Revision 5 as of 2016-01-27 13:38:11
Size: 1386
Editor: celinux222
Comment:
Deletions are marked like this. Additions are marked like this.
Line 16: Line 16:
== Summary ==
Line 17: Line 18:
=== Summary === SECODE aims at specifying and designing error correction codes suitable for an efficient protection of sensitive information in the context of Internet of Things (IoT) and connected objects. Such codes mitigate passive attacks, like memory disclosure, and active attacks, like stack smashing. The innovation of this project is to leverage these codes for protecting against both cyber and physical attacks. The main advantage is a 360° coverage of attacks of the connected embedded systems, which is considered as a smart connected device and also a physical device. The outcome of the project is first a method to generate and execute cyber-resilient software, and second to protect data and its manipulation from physical threats like side-channel attacks. Theses results are demonstrated by using a smart sensor application with hardened embedded firmware and tamper-proof hardware platform.

Welcome to the SECODE project website !

This project is funded by the CHIST-ERA and coordinated by ANR

logo_anr.png

logo_chistera.gif

What is SECODE ?

SECODE stands for Security evaluation of Physically Attacked Cryptoprocessors in Embedded Systems.

Summary

SECODE aims at specifying and designing error correction codes suitable for an efficient protection of sensitive information in the context of Internet of Things (IoT) and connected objects. Such codes mitigate passive attacks, like memory disclosure, and active attacks, like stack smashing. The innovation of this project is to leverage these codes for protecting against both cyber and physical attacks. The main advantage is a 360° coverage of attacks of the connected embedded systems, which is considered as a smart connected device and also a physical device. The outcome of the project is first a method to generate and execute cyber-resilient software, and second to protect data and its manipulation from physical threats like side-channel attacks. Theses results are demonstrated by using a smart sensor application with hardened embedded firmware and tamper-proof hardware platform.