Contents
Academic literature on the topic 'Systèmes embarqués (informatique) – Protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Systèmes embarqués (informatique) – Protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Systèmes embarqués (informatique) – Protection"
McMullan, John L., and David C. Perrier. "La sécurité du jeu et le jeu de la sécurité : piratage, loi et politique publique." Criminologie 39, no. 1 (June 26, 2006): 83–106. http://dx.doi.org/10.7202/013127ar.
Full textAuger, Reginald, and Allison Bain. "Anthropologie et archéologie." Anthropen, 2016. http://dx.doi.org/10.17184/eac.anthropen.030.
Full textDissertations / Theses on the topic "Systèmes embarqués (informatique) – Protection"
Teglia, Yannick. "Ingénierie et robustesse des systèmes embarqués sécuritaires." Paris 6, 2011. http://www.theses.fr/2011PA066183.
Full textSchweppe, Hendrik. "Sécurité et protection de la vie privée dans les systèmes embarqués automobiles." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0062/document.
Full textElectronic equipment has become an integral part of a vehicle's network architecture, which consists of multiple buses and microcontrollers called Electronic Control Units (ECUs). These ECUs recently also connect to the outside world. Navigation and entertainment system, consumer devices, and Car2X functions are examples for this. Recent security analyses have shown severe vulnerabilities of exposed ECUs and protocols, which may make it possible for attackers to gain control over a vehicle. Given that car safety-critical systems can no longer be fully isolated from such third party devices and infotainment services, we propose a new approach to securing vehicular on-board systems that combines mechanisms at different layers of the communication stack and of the execution platforms. We describe our secure communication protocols, which are designed to provide strong cryptographic assurances together with an efficient implementation fitting the prevalent vehicular communication paradigms. They rely on hardware security modules providing secure storage and acting as root of trust. A distributed data flow tracking based approach is employed for checking code execution against a security policy describing authorized communication patterns. Binary instrumentation is used to track data flows throughout execution (taint engine) and also between control units (middleware), thus making it applicable to industrial applications. We evaluate the feasibility of our mechanisms to secure communication on the CAN bus, which is ubiquitously implemented in cars today. A proof of concept demonstrator also shows the feasibility of integrating security features into real vehicles
Elbaz, Reouven. "Mécanismes matériels pour des transferts processeur mémoire sécurisés dans les systèmes embarqués." Montpellier 2, 2006. http://www.theses.fr/2006MON20119.
Full textAkkar, Mehdi-laurent. "Attaques et méthodes de protections de systèmes cryptographiques embarqués." Versailles-St Quentin en Yvelines, 2004. http://www.theses.fr/2004VERS0014.
Full textEn 1998, les attaques par consommation de courant et par injection de fautes commençaient à peine à apparaître. C'est ainsi que j'ai eu la chance de suivre,et de participer parfois, aux innovations qui ont conduit tant à mettre en oeuvre de nouvelles attaques, qu'à élaborer de nouvelles contre-mesures. Ce mémoire de thèse présente mon travail tant d'un point de vue assez théorique (modèle de consommation de la carte, protections théoriques, principes généraux de scénarios d'attaques) que pratique (vérification de la théorie, implémentations sécurisées, attaques réelles) sur les algorithmes usuels tels que le DES, l'AES ou le RSA. La plupart de ces résultats ont été publiés dans plusieurs conférences (Asiacrypt, CHES, FSE, PKC) et brevetés
Abutaha, Mohammed. "Real-Time and Portable Chaos-based Crypto-Compression Systems for Efficient Embedded Architectures." Thesis, Nantes, 2017. http://www.theses.fr/2017NANT4010/document.
Full textImage and video protection have gained a lot of momentum over the last decades. In this work, first we designed and realized in an efficient and secure way a pseudo-chaotic number generator (PCNG) implemented in sequential and parallel (with P-threads) versions. Based on these PCNGs, two central applications were designed, implemented and analyzed. The former application deals with the realization of a random number generator (RNG) based PCNG, and the obtained results are very promising. The latter application concerns the realization of a chaos-based stream cipher. The cryptographic analysis and the statistical study of the realized chaotic systems show their robustness against known attacks. This result is due to the proposed recursive architecture which has a strong non-linearity a technique of disturbance, and a chaotic multiplexing. The computation performance indicate their use in real time applications. Second, based on the previous chaotic system, we designed and implemented in effective manner a real time joint crypto-compression system for embedded architecture. An end-to-end selective encryption solution that protects privacy in the HEVC video content is realized. Then, a ROI encryption is performed at the CABAC bin string level for the most sensitive HEVC parameters including motion vectors and transform coefficients. The format compliant encryption of Intra Prediction Modes has been also investigated. It increases a little bit the bit rate. Subjective evaluation and objective rate-distortion-complexity tests showed that the proposed solution performs a protection of privacy in the HEVC video content with a small overhead in bit rate and coding complexity
Crenne, Jérémie. "Sécurité Haut-débit pour les Systèmes Embarqués à base de FPGAs." Phd thesis, Université de Bretagne Sud, 2011. http://tel.archives-ouvertes.fr/tel-00655959.
Full textAugusto, Ludovic. "Conception d'un sous-système de prédiction de collisions temps réel embarqué au sein d'un nouveau système de protection des occupants d'un véhicule." Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2001ECAP0746.
Full textOuaarab, Salaheddine. "Protection du contenu des mémoires externes dans les systèmes embarqués, aspect matériel." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0046/document.
Full textDuring the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiquitous. Most of these systems use unreliable or untrusted storage (flash, RAM...)to store code or data. The confidentiality and integrity of these data can be threaten by hardware (spying on the communication bus between the processing component and the storage component) or software attacks. These attacks can disclose sensitive information to the adversary or disturb the behavior of the system. In this thesis, in the context of embedded systems, we focused on the attacks that threaten the confidentiality and integrity of data that are transmittedover the memory bus or that are stored inside the memory. Several primitives used to protect the confidentiality and integrity of data have been proposed in the literature, including Merkle trees, a data structure that can protect the integrity of data including against replay attacks. However, these trees have a large impact on the performances and the memory footprint of the system. In this thesis, we propose a solution based on variants of Merkle trees (hollow trees) and a modified cache management mechanism to greatly reduce the impact of the verification of the integrity. The performances of this solution have been evaluated both theoretically and in practice using simulations. In addition, a proof a security equivalence with regular Merkle treesis given. Finally, this solution has been implemented in the SecBus architecture which aims at protecting the integrity and confidentiality of the content of external memories in an embedded system. A prototype of this architecture has been developed and the results of its evaluation are given
Guo, Yanli. "Confidentialité et intégrité de bases de données embarquées." Versailles-St Quentin en Yvelines, 2011. http://www.theses.fr/2011VERS0038.
Full textAs a decentralized way for managing personal data, the Personal Data Server approach (PDS) resorts to Secure Portable Token, combining the tamper resistance of a smart card microcontroller with the mass storage capacity of NAND Flash. The data is stored, accessed and its access rights controlled using such devices. To support powerful PDS application requirements, a full-fledged DBMS engine is embedded in the SPT. This thesis addresses two problems with the confidentiality and integrity of personal data: (i) the database stored on the NAND Flash remains outside the security perimeter of the microcontroller, thus potentially suffering from attacks; (ii) the PDS approach relies on supporting servers to provide durability, availability, and global processing functionalities. Appropriate protocols must ensure that these servers cannot breach the confidentiality of the manipulated data. The proposed solutions rely on cryptography techniques, without incurring large overhead
Cotret, Pascal. "Protection des architectures hétérogènes multiprocesseurs dans les systèmes embarqués : Une approche décentralisée basée sur des pare-feux matériels." Phd thesis, Université de Bretagne Sud, 2012. http://tel.archives-ouvertes.fr/tel-00789541.
Full textBooks on the topic "Systèmes embarqués (informatique) – Protection"
Larcher, Éric. L' Internet sécurisé: Comment crypter ses mails, lutter contre le spam et les virus, protéger son anonymat sur le Web. Paris: Eyrolles, 2000.
Find full textBauer, Friedrich Ludwig. Decrypted secrets: Methods and maxims of cryptology. Berlin: Springer, 1997.
Find full textSecurity in computing systems: Challenges, approaches and solutions. Berlin: Springer, 2009.
Find full textInternational Seminar on Statistical Confidentiality (1992 Dublin, Ireland). Internationales Seminar über die statistische Geheimhaltung: Protokolle = International Seminar on Statistical Confidentiality : proceedings, 8-10 September 1992, Dublin, Ireland. Luxembourg: Office des publications officielles des Communautés européennes, 1993.
Find full textBen-Natan, Ron. Implementing database security and auditing: A guide for DBAs, information security administrators and auditors. Burlington, MA: Elsevier Digital Press, 2005.
Find full textOntario. Esquisse de cours 12e année: Systèmes informatiques ice4e cours préemploi. Vanier, Ont: CFORP, 2002.
Find full textOntario. Esquisse de cours 12e année: Systèmes informatiques ice4m cours préuniversitaire. Vanier, Ont: CFORP, 2002.
Find full textStefan, Katzenbeisser, and Sadeghi Ahmad-Reza, eds. Information hiding: 11th international workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009 : revised selected papers. Berlin: Springer, 2009.
Find full textGarfinkel, Simson. Practical UNIX and Internet Security. 2nd ed. Bonn: O'Reilly & Associates, 1996.
Find full textGarfinkel, Simson. Practical UNIX and Internet security. 3rd ed. Beijing: O'Reilly, 2003.
Find full text